Oπe\n Conf 2025
Speeches

Oπe\n 2025 - Day1 (Fri) 21 November 2025
09:00 - 10:00

Registration - Coffee

Auditorium

Grab your badge, gift bag, coffee and breakfast

10:00 - 10:30

Intro - Welcome - Warmup

Auditorium

Let's get started with a great warmup session

10:30 - 11:15

Keynote: Never Trust a Monkey: The Chasm, the Craft, and the Chain of AI-Assisted Code

Auditorium

THEME: AI

We’re in the middle of another abstraction leap.
Just like compilers, cloud, and containers before it, AI-generated code started with hype, fear, and broken things—and might still end with progress.
But only if we build it right.
LLMs aren’t evil—they’re just monkeys with GPUs.
They’ll generate code with confidence, validate it with tests they wrote themselves (if any), and call it a job well done.
This talk introduces a working model for AI-assisted development that actually holds up under real-world use. It’s built on three ideas:
- The Chasm: the dangerous gap between what we meant and what we asked for.
- The Craft: the human skill to spot when AI gets it “technically right” but still wrong.
- The Chain: the Intent Integrity Chain, a structured flow of prompt → spec → test → code, where each output is validated externally—by humans or deterministic systems, never by the same model that generated it.

This isn’t a thought experiment or a product pitch. It’s a blueprint for building real software with AI, without sacrificing trust or intent.

Trust your knowledge.
Trust your tests.
Never trust a monkey.

TAGS: prompt-driven-development, intent-integrity-chain

11:15 - 11:35

Platinum Sponsor speech

Auditorium

11:40 - 12:15

Coffee - Networking

Open Space

12:15 - 12:50

Security in the Quantum Era

Auditorium

THEME: CYBERSECURITY

As we stand on the brink of the quantum computing revolution, traditional cryptographic systems face unprecedented risks. This session will explore the emerging quantum threat to data security, focusing on how quantum algorithms could compromise current encryption methods.

We will delve into post-quantum cryptography (PQC), examining the race to develop encryption schemes resistant to quantum attacks. Additionally, we’ll address the ongoing efforts in PQC standardization, and the complex challenges involved in transitioning from classical to quantum-resistant systems.

Attendees will gain valuable insights into the future of cybersecurity in a world where quantum computing reshapes the landscape.

TAGS: security, cryptography, quantum computing, migration

12:50 - 13:00

eShare GOLD sponsor speech

Auditorium

13:00 - 13:35

Magical journey through regex engine internals

Auditorium

THEME: SW CRAFTMANSHIP

How does computer know that `^\w+\d$` should match "java8" but not "jvm15"? There must be some magic that allows a computer to recognise that certain strings match the pattern, right? Yes and we, geeks, love learning how such magic works!

Join me on a highly technical journey through the internals of regex engines. First, we will analyse ancient scripts explaining the theory - finite automata and regular languages. Then we will hack through thickets of various regex flavours to arrive at the cave of regular expression engine where we'll explore deep recesses of performance corner-cases. To add a bit of an adventure we'll intentionally fall into a trap of exponentially slow patterns and crash a real app. Finally, we'll read inscriptions left by the survivors of Stackoverflow and Cloudflare outages, both caused by regular expressions.

It's a geeky talk and you'll learn geeky stuff: how a small and neat language of regular expression is implemented and interpreted. But it's not all in vain: you'll be able to optimise the performance of regular expressions and prevent your app from being killed by a badly-crafted regex.

TAGS: regex text performance internals

13:40 - 14:40

Lunch - Networking

Open Space

Enjoy your Lunch with great Networking

14:40 - 15:15

Best practices for serverless developers

Auditorium

THEME: SW CRAFTMANSHIP

Do you want to take advantage of the full power of serverless architectures for your production workloads? Are you wondering how events can help your applications scale? Have you been trying to tune your applications for higher performance and lower cost?

This session provides architectural best practices, optimizations, and useful shortcuts that experts can use to build secure, high-scale, and high-performance serverless applications.

TAGS: AWS serverless

15:15 - 15:25

XM GOLD Sponsor Speech

Auditorium

15:25 - 16:00

From Vibe to Movie: Building a GenAI Powered Recommender That Understands Emotion

Auditorium

THEME: AI

How do you build a recommender system that goes beyond genres and understands how people feel?
In this talk, we’ll share the journey of building Movie Groovy, a GenAI-powered application that recommends movies based on vibes and emotional preferences. You’ll get a look into how we combined LLMs, Agents in Python, Vector DBs, and custom UX logic to create an easy and emotionally-aware experience.
Along the way, we’ll highlight the technical challenges, design decisions, and surprising insights that came from balancing user trust, AI accuracy, and creative UX. If you are interested in GenAI, recommender systems, human-centered design, or just … movies, this talk will give you actionable ideas and inspiration for your own projects.

TAGS: agents, ux, recommenders

16:00 - 16:40

Coffee - Networking

16:40 - 17:00

Practical AI with Machine Learning for Observability

Auditorium

THEME: AI

We will go through a practical application of AI and machine learning for observability in Netdata, focusing on the utilization of anomaly detection for individual components. We will emphasize on ML's role as an advisor rather than an alert mechanism, using multiple independent models to identify significant issues when different metrics indicate simultaneous anomalies. This method enhances the detection of unusual patterns, potentially predicting failures and identifying security breaches.

TAGS: Machine Learning, AI, Observability

17:00 - 17:10

Netcompany GOLD Sponsor Speech

Auditorium

17:10 - 17:55

Keynote (SWC)

Auditorium

17:55 - 18:05

Gold Sponsor Speech

Auditorium

18:10

CLOSING DAY 1

Oπe\n 2025 – Day1 (Fri) Stage2 21 November 2025
11:40 - 12:10

Coffee - Networking

Open Space

12:10 - 12:45

Introduction to MySQL Spatial: Features and Real-World Use Cases

Stage 2

THEME: SW Craftmanship

Spatial data is everywhere—from maps and navigation to urban planning and mobility services. MySQL provides robust support for managing and analyzing spatial data through geometry types, spatial indexes, and a comprehensive set of spatial functions.

This talk introduces MySQL’s spatial capabilities and highlights two practical use cases:
1. Transforming Between Spatial Reference Systems: Learn how to convert geometries across coordinate systems using MySQL’s built-in SRS transformation functions. This enables use cases such as the seamless integration and visualization of diverse datasets—e.g., combining GPS traces with city planning data on a unified map despite differing coordinate systems.
2. Analyzing Spatial Trajectories: Discover how to measure similarity between movement paths using trajectory data and spatial distance functions. This can support applications like identifying common travel patterns, detecting anomalies, or optimizing routes based on historical behavior.

Whether you're a developer, analyst, or GIS professional, this session will help you unlock the full potential of spatial data in MySQL.

TAGS: MySQL, Spatial Data, Geospatial, GIS, Database, SQL, Location-based Services

12:45 - 12:55

Sponsor speech

Stage 2

12:55 - 13:15

Meta Prompting and Reverse Meta Prompting: Because “Help Me” Isn’t a Strategy

Stage 2

THEME: AI

AI isn’t magic—but when you understand how to structure your input, it can function like a superpower. In this session, I’ll share how prompting, meta prompting, and even reverse meta prompting have become part of my daily life as a Product Manager working with cross-functional teams. You’ll learn how to create prompts that produce structured, relevant, and context-aware output. We’ll explore meta prompting as a way to refine your thinking before execution, and reverse prompting as a method to debug and stress-test your own inputs.
This isn’t a talk about hype—it’s about how to use AI practically, thoughtfully, and effectively in product work (and beyond). Because while AI can help us move faster, it still can’t align a team or handle trade-offs. That’s still on us.

Key Takeaways:
-What prompting, meta prompting, and reverse meta prompting actually mean (and why they matter)
-How to write AI prompts that produce useful, context-aware results
-How meta prompting can refine your problem framing before asking AI for help
-How reverse meta prompting helps you assess and improve your own thinking

TAGS: AIinProduct PromptEngineering MetaPrompting ReverseMetaPrompting ProductManagement

13:15 - 13:35

Legal Issues in Offensive Cyber Security

Stage 2

THEME: Cybersecurity

This workshop provides a comprehensive overview of the legal considerations that govern offensive cybersecurity activities, including ethical hacking, penetration testing, red teaming, and vulnerability disclosure. Participants will learn about applicable statutes (such as computer misuse and data protection laws), contractual obligations, regulatory compliance (e.g., GDPR, NIS2), and professional codes of conduct.

Through real-world case studies and judicial precedents, the session highlights risk management, liability mitigation, authorization requirements, and the distinction between lawful security assessments and illicit intrusion. Attendees will leave with practical guidelines to design and execute offensive security engagements while remaining within legal and ethical boundaries.

13:40 - 14:40

Lunch - Networking

Open Space

14:40 - 15:00

Speech (Cybersecurity)

Stage 2

15:00 - 15:35

Restoring Trust in Open-Source AI: Security Starts with Provenance

Stage 2

THEME: AI, Cybersecurity

Open-source AI is shaping how we build, deploy, and scale systems and applications today, right into production. But with the rapid adoption of upstream AI models, datasets, and orchestration tools comes a critical question: can we trust what we’re using and how it was originally created? According to PwC survey, about 50% of surveyed company leaders in 2025 admitted they don’t trust AI to be embedded in their core operations.
Unlike focusing on securing AI systems themselves, in this talk we’ll explore often overlooked topic - how data provenance, model transparency, and AI-specific supply chain security are becoming essential for building trustworthy AI systems.
I’ll cover the importance of data provenance and how they reduce risks like data poisoning, bias, and adversarial manipulation; the rise of the AI Software Bill of Materials (AI SBOM) to document model components and inference behavior; open-source tools that bring it all to life: Sigstore, KitOps, Model and Data Cards.
I will also share updates from our work in top AI standardization organizations like OASIS, OpenSSF, and LF AI & Data to define and support AI provenance standards, automation, and trusted AI guidelines.

TAGS: AI, Provenance, Trust, Standards

15:35 - 15:55

How We Rebuilt the Machine While Flying It

Stage 2

THEME: SW Craftmanship

A behind-the-scenes look at the large-scale refactoring of TalentLMS, a learning management platform with deep roots and tight constraints.

This talk covers how we tackled deeply embedded technical debt while keeping the system live and teams shipping. It walks through the architectural shifts we made, from monolith to modulith, and the cultural shifts that made those changes possible.

Alongside code, we had to refactor trust, habits, and communication. Equal parts technical and human, this is a story about moving forward without breaking what still works.

TAGS: architecture legacy culture refactoring

16:05 - 16:40

Coffee - Networking

Open Space

16:40 - 16:50

Sponsor speech

Stage 2

16:50 - 17:10

Returning to coding as a parent

Stage 2

THEME: SW Craftmanship

Back to professional life after parental leave. What mattered before and what matters after. So how you still fit and how can you now be enough in these two words, family one and professional?

Maybe there are no good answers but sure there is a discussion we should be having. Especially if we want to keep diverse talents in the workforce.

TAGS: Tech, parental leave, inclusion

Oπe\n 2025 - Day 2 (Sat) 22 November 2025
10:00 - 10:20

Coffee - Networking

Get some coffee, talk to friends before Day 2 kicks-off!!

10:20 - 10:40

Warmup Session

Auditorium

10:40 - 11:25

Keynote: Speak Human: the Unchecked Box on our Go-Live Checklist

Auditorium

THEME: CYBERSECURITY

This highly interactive two-part presentation tackles crucial communication gaps in cybersecurity engineering. The first half analyzes the problem, defining two major communication silos:

1. The Business/User Gap:Engineers struggling to communicate value to non-technical stakeholders (Sales, Clients).
2. The Specialization Gap: Engineers from different deep technical fields (e.g., hardware vs. software security) failing to communicate effectively.

This analysis shows how poor communication hinders engineer growth and obscures business value.

The second half is a practical Interactive Workshop featuring three role-playing scenarios to bridge these gaps:
1. Client Simulation: Convincing a customer of a disruptive technical fix without jargon.
2. Sales Simulation: Persuading a sales lead to halt a launch by translating risk into financial loss/reputational damage, and professional challenges.
3. Internal Simulation:Forcing a Hardware Engineer and Software Engineer to collaborate on a complex threat and solution.

The session concludes with the audience co-creating a final list of best practices based on the role-playing insights.

TAGS: cybersecurity, communication, soft skills, development teams, teams

11:25 - 11:45

Platinum Sponsor 2 speech

Auditorium

11:50 - 12:25

Coffee - Networking

12:25 - 13:00

Create Intelligent MCP based applications with Quarkus

Auditorium

THEME: AI

Model Context Protocol (MCP) is an open standard that enables seamless integration between LLM based applications and agents with external systems, thus allowing us to dynamically enhance the model/agent that acts as a client, with capabilities provided by connected MCP servers.

The Quarkus project created one of the first MCP implementations in Java. Quarkus provides an ideal runtime for coding intelligent applications and agents that use the MCP protocol to call out to external MCP servers, or conversely, let you implement powerful MCP servers that can be invoked by any compliant LLM based application written in any programming language.

Whether you want to connect to your favorite database, integrate with your company’s systems, or build something completely new, everything is possible! Quarkus will handle all the MCP plumbing and through its hundreds of extensions will help you implement any simple or complex enterprise integration scenario that can enhance your intelligent workflows.

Come to this talk to learn how MCP works and how to use it effectively with Quarkus.

TAGS: Quarkus, MCP, AI, LangChain4j

13:00 - 13:10

Intralot GOLD Sponsor Speech

Auditorium

13:10 - 13:45

Unleash the Power of AI Agents with Java: Building Intelligent Applications with Quarkus, LangChain4

Auditorium

THEME: AI

This session dives into the exciting world of Agentic AI and demonstrates how to build sophisticated, intelligent applications using Quarkus, LangChain4j, and the Oracle Database 23ai @ Azure. It provides a comprehensive overview that empowers developers to harness the full potential of Agentic AI within the Quarkus ecosystem.
We will delve into the powerful synergy between Quarkus-Agentic AI and LangChain4j and demonstrate how to leverage these tools to build intelligent, context-aware agents. We will cover the core concepts, architecture, and practical applications, illustrating the steps to develop robust and scalable Agents-driven applications.

TAGS: agentic ai, genai, java, quarkus, langchain4j, database, vector, vectorsearch, agents

13:50 - 14:45

Lunch - Networking

14:45 - 14:55

Agile Actors GOLD Sponsor Speech

Auditorium

14:55 - 15:40

Panel/ Firechat/ Debate session

Auditorium

15:40 - 15:50

Gold Sponsor speech 7

Auditorium

15:50 - 16:10

Oπe\n Ecosystem Award

Auditorium

16:10 - 16:25

Hackathon final pitching

Auditorium

16:25 - 16:35

CLOSING

Auditorium