82 lines
3.8 KiB
Markdown
82 lines
3.8 KiB
Markdown
---
|
|
categories:
|
|
- conferenties
|
|
- evenementen
|
|
date: 2024-05-23T17:34:16+00:00
|
|
description: "De NLUUG najaarsconferentie is gepland op dinsdag 5 november 2024 in het Van der Valk Hotel Utrecht."
|
|
is_event: true
|
|
tags:
|
|
- conferenties
|
|
slug:
|
|
title: "NLUUG najaarsconferentie 2024"
|
|
layout: schedule-event
|
|
event_title: "NLUUG najaarsconferentie 2024"
|
|
event_start: 2024-11-05T08:30:00+02:00
|
|
event_end: 2024-11-05T18:00:00+02:00
|
|
event_timezone: Europe/Amsterdam
|
|
event_location: Van der Valk Hotel Utrecht
|
|
event_address:
|
|
street_address: "Winthontlaan 4-6"
|
|
postal_code: "3526 KV"
|
|
city: "Utrecht"
|
|
country_name: "The Netherlands"
|
|
event_attendance_mode: "offline"
|
|
event_cfp_start_date: 2024-05-22
|
|
event_cfp_close_date: 2024-09-22
|
|
event_cfp_link: https://cfp.nluug.nl/nluug-najaarsconferentie-2024/cfp
|
|
event_description: "Najaarsconferentie 2024 van de vereniging NLUUG in het Van der Valk Hotel te Utrecht"
|
|
event_images:
|
|
- /afbeeldingen/locaties/utrecht/hotel-van-der-valk-utrecht-winthontlaan.jpg
|
|
event_members_only: true
|
|
event_organizers:
|
|
- organizer:
|
|
id: nluug
|
|
name: NLUUG
|
|
event_register_start_date: 2024-09-15
|
|
event_register_end_date: 2024-11-05
|
|
event_register_link: "https://leden.nluug.nl/aanmelden/index.cgi?action=event"
|
|
event_sponsors:
|
|
- at-computing
|
|
event_status: "scheduled"
|
|
event_schedule:
|
|
hidden: true
|
|
title: Programma
|
|
description:
|
|
columns: 4
|
|
headers:
|
|
- header:
|
|
width: 10
|
|
- header:
|
|
text: Zaal 1
|
|
center: true
|
|
width: 30
|
|
- header:
|
|
text: Zaal 2
|
|
center: true
|
|
width: 30
|
|
- header:
|
|
text: Zaal 3
|
|
center: true
|
|
width: 30
|
|
---
|
|
|
|
De keynote: **From Cookies to Keyloggers: Understanding Modern Online Tracking Techniques** door Gunes Acar.
|
|
|
|
Andere lezingen (onder voorbehoud):
|
|
* [Bootstrapping a Museum with Open Source]({{< relref "talks/arnout-engelen-bootstrapping-a-museum-with-open-source.md" >}}) (Arnout Engelen)
|
|
* [Course as Code 2.0: what we have learned and done since Nov 2022]({{< relref "talks/marcel-kornegoor-course-as-code-20-what-we-have-learned-and-done-since-nov-2022.md" >}}) (Marcel Kornegoor)
|
|
* [Ervaringen met Open Source implementaties voor openEHR]({{< relref "talks/rix-groenboom-en-nils-van-der-deen-ervaringen-met-open-source-implementaties-voor-openehr.md" >}}) (Rix Groenboom, Nils van der Deen)
|
|
* [Introduction to WebAssembly: from browser-based to server-side]({{< relref "talks/alessandro-vozza-introduction-to-webassembly-from-browser-based-to-server-side.md" >}}) (Alessandro Vozza)
|
|
* [The Zero-trust hoax]({{< relref "talks/rogier-spoor-the-zero-trust-hoax.md" >}}) (Rogier Spoor)
|
|
* [Netflow-informatie snel doorzoekbaar maken]({{< relref "talks/remco-poortinga-netflow-informatie-snel-doorzoekbaar-maken.md" >}}) (Remco Poortinga)
|
|
* [Build your own Sustainable Cloud Unit from Scratch]({{< relref "talks/nick-hooijberg-build-your-own-sustainable-cloud-unit-from-scratch.md" >}}) (Nick Hooijberg)
|
|
* [Introductie MQTT, Tasmota & Node-RED]({{< relref "talks/ad-introductie-mqtt-tasmota-and-node-red.md" >}}) (Ad)
|
|
* [Zwartboek Chatcontrol]({{< relref "talks/helma-de-boer-zwartboek-chatcontrol.md" >}}) (Helma de Boer)
|
|
* Samen een open mobiel ecosysteem voor publieke organisaties ontwerpen (Marit Hoefsloot)
|
|
* [Performance analyse op basis van Linux cgroups (v2)]({{< relref "talks/gerlof-langeveld-performance-analyse-op-basis-van-linux-cgroups-v2.md" >}}) (Gerlof Langeveld)
|
|
* [De wet en de vrije software]({{< relref "talks/valentijn-sessink-de-wet-en-de-vrije-software.md" >}}) (Valentijn Sessink)
|
|
* OPNsense - ontwerp en architectuur (Ad Schellevis)
|
|
* Snakes in the grass! How to improve code quality and development processes (Arjen Lentz, Tobias Eggendorfer)
|
|
* Hacking - 30 jaar geleden (Walter Belgers)
|
|
* Detecting VPN Traffic: Techniques and Insights from Traffic Analysis (Joyatee Datta)
|
|
* FreeBSD and the absurdities of security compliance (Eirik Øverby)
|