BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//HasGeek//NONSGML Funnel//EN
DESCRIPTION:On security\, network engineering and distributed systems
X-WR-CALDESC:On security\, network engineering and distributed systems
NAME:Rootconf Pune edition
X-WR-CALNAME:Rootconf Pune edition
REFRESH-INTERVAL;VALUE=DURATION:PT12H
SUMMARY:Rootconf Pune edition
TIMEZONE-ID:Asia/Kolkata
X-PUBLISHED-TTL:PT12H
X-WR-TIMEZONE:Asia/Kolkata
BEGIN:VEVENT
SUMMARY:Check-in and onsite registrations
DTSTART:20190921T032500Z
DTEND:20190921T035500Z
DTSTAMP:20260429T013308Z
UID:session/FfF5QrfPxe6hQWCzE14qCN@hasgeek.com
SEQUENCE:0
CREATED:20190628T060529Z
DESCRIPTION:\n
LAST-MODIFIED:20190807T051643Z
LOCATION:Pune\, YMCA Pune
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
BEGIN:VALARM
ACTION:display
DESCRIPTION:Check-in and onsite registrations in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Introduction to Rootconf Pune\; how to navigate the schedule
DTSTART:20190921T035500Z
DTEND:20190921T040500Z
DTSTAMP:20260429T013308Z
UID:session/HjxEfmKVsGDTs7j37FWKxS@hasgeek.com
SEQUENCE:0
CREATED:20190628T061106Z
DESCRIPTION:\n
GEO:18.538341882797692;73.8858146639541
LAST-MODIFIED:20190807T051646Z
LOCATION:St. Laurn Hotel Main auditorium - St. Laurn Hotel\nPune\nIN
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
BEGIN:VALARM
ACTION:display
DESCRIPTION:Introduction to Rootconf Pune\; how to navigate the schedule i
 n St. Laurn Hotel Main auditorium in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Let's talk about TLS 1.3
DTSTART:20190921T040500Z
DTEND:20190921T044500Z
DTSTAMP:20260429T013308Z
UID:session/NBJq9xucvpBCkqeyJU9m2P@hasgeek.com
SEQUENCE:2
CATEGORIES:Full talk,Intermediate,Full talk (40 mins),Security
CREATED:20190628T112707Z
DESCRIPTION:We will talk about what SSL/TLS is\, why it is important for t
 he internet. Then take a brief look at few of the security flaws in the pr
 otocol over the years. The finally look at security and performance improv
 ements in TLS 1.3. Lastly why should this affect you as a systems engineer
 \, system administrator\, developer or even as a normal user.\n\n### Speak
 er bio\n\nI work as a Principal Product Security Engineer with Red Hat. I 
 have been involved with high impact security flaws specially related to SS
 L/TLS over the last 10 years. I am a part of various upstream security tea
 ms and a contributor to Fedora security team.\n
GEO:18.538341882797692;73.8858146639541
LAST-MODIFIED:20230810T072606Z
LOCATION:St. Laurn Hotel Main auditorium - St. Laurn Hotel\nPune\nIN
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
URL:https://hasgeek.com/rootconf/2019-pune/schedule/lets-talk-about-tls-1-
 3-NBJq9xucvpBCkqeyJU9m2P
BEGIN:VALARM
ACTION:display
DESCRIPTION:Let's talk about TLS 1.3 in St. Laurn Hotel Main auditorium in
  5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Application security workflow automation using Docker and Kubernet
 es
DTSTART:20190921T044500Z
DTEND:20190921T052500Z
DTSTAMP:20260429T013308Z
UID:session/TcUTi211hXamHqCpvb4UQJ@hasgeek.com
SEQUENCE:2
CATEGORIES:Full talk,Intermediate,Full talk (40 mins),Rehearsal to be sche
 duled,Automation
CREATED:20190628T112729Z
DESCRIPTION:* An Application Security Workflow - How does it look like\n* 
 Mapping an app sec workflow to 3rd party free security tools\n* Designing 
 a Distributed System using Kubernetes to execute app sec workflows\n    - 
 Architecture diagram\n    - High level overview of various components invo
 lved in the system\n    - Producing and consuming events to drive the work
 flow\n    - Adapter pattern for tool integration\n* Packaging 3rd party fr
 ee security tools as docker containers\n* Deploying in Kubernetes\n* Demo\
 n\n### Speaker bio\n\nAn accomplished security professional with over a de
 cade of experience in information security solution engineering\, services
 \, vulnerability research\, reverse engineering and security tools develop
 ment.\n\nExperienced in security solution development using Cloud Native a
 nd Kubernetes Native technologies. Developed tools and technology to find 
 vulnerabilities in web applications\, network servers\, client-side applic
 ations. Conducted product security audit of enterprise applications and cr
 edited with vulnerability discovery (CVE) for the same.\n\nCredited with m
 ultiple vulnerability discovery across enterprise products with CVEs to hi
 s name such as CVE-2015-0085\, CVE-2015-1650\, CVE-2015-1682\, CVE-2015-23
 76\, CVE-2015-2555\, CVE-2014-4117\, CVE-2014-6113.\n\nAn active participa
 nt of NULL – India’s largest open security community as a core team me
 mber responsible for technology development.\n\nAs an open source software
  contributor\, he has developed or contributed to multiple projects includ
 ing:\n\n* Wireplay\n* Penovox\n* HiDump\n* RbWinDBG\n\nHe can be reached t
 hrough:\n\n* https://github.com/abhisek\n* https://twitter.com/abh1sek\n
GEO:18.538341882797692;73.8858146639541
LAST-MODIFIED:20230810T072606Z
LOCATION:St. Laurn Hotel Main auditorium - St. Laurn Hotel\nPune\nIN
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
URL:https://hasgeek.com/rootconf/2019-pune/schedule/application-security-w
 orkflow-automation-using-docker-and-kubernetes-TcUTi211hXamHqCpvb4UQJ
BEGIN:VALARM
ACTION:display
DESCRIPTION:Application security workflow automation using Docker and Kube
 rnetes in St. Laurn Hotel Main auditorium in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Journey of Hotstar's infrastructure from EC2 to containers
DTSTART:20190921T052500Z
DTEND:20190921T055500Z
DTSTAMP:20260429T013308Z
UID:session/8avNkhvoikCBU1fjXqTup1@hasgeek.com
SEQUENCE:3
CATEGORIES:Full talk (40 mins),Rehearsal to be scheduled,DevOps
CREATED:20190730T062305Z
DESCRIPTION:1. About Hotstar \n2. Hotstar at IPL 2018\n3. Ec2 challenges a
 t Scale\n4. Migration to kubernetes\n5. Challanges in kubernetes migration
 \n6. Performance tuning for IPL'19 and WC\n7. Hotstar at IPL'19/WC\n\n### 
 Speaker bio\n\nPrakhar is Infrastructure Engineer at Hotstar\, India’s l
 eading OTT provider that holds a global concurrency record for live stream
 ing to 25Mn+ viewers. At Hotstar\, he loves automating deployments using t
 erraform and scale infrastrure of hotstar on kubernetes. He is also passio
 nate about Infra security.\n
GEO:18.538341882797692;73.8858146639541
LAST-MODIFIED:20240123T122931Z
LOCATION:St. Laurn Hotel Main auditorium - St. Laurn Hotel\nPune\nIN
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
URL:https://hasgeek.com/rootconf/2019-pune/schedule/journey-of-hotstar-inf
 ra-from-ec2-to-containers-8avNkhvoikCBU1fjXqTup1
BEGIN:VALARM
ACTION:display
DESCRIPTION:Journey of Hotstar's infrastructure from EC2 to containers in 
 St. Laurn Hotel Main auditorium in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Morning beverage break
DTSTART:20190921T055500Z
DTEND:20190921T062000Z
DTSTAMP:20260429T013308Z
UID:session/BkBadjDpP1pJfn8cTwiUzE@hasgeek.com
SEQUENCE:0
CREATED:20190628T061213Z
DESCRIPTION:\n
LAST-MODIFIED:20190911T104707Z
LOCATION:Pune\, YMCA Pune
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
BEGIN:VALARM
ACTION:display
DESCRIPTION:Morning beverage break in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:The art of exfiltration: digital skimming
DTSTART:20190921T062000Z
DTEND:20190921T065000Z
DTSTAMP:20260429T013308Z
UID:session/4VSqoJtLfroaUDbRpx6ptC@hasgeek.com
SEQUENCE:2
CATEGORIES:Crisp talk (20 mins),Rehearsal to be scheduled,Security
CREATED:20190716T050004Z
DESCRIPTION:Digital skimming is a threat which many CISOs admit\, keeps th
 em up at night. This talk is a comprehensive analysis\, articulated from a
  rare combination of theoretical understanding and applied practical exper
 ience of this threat. The real-life hands-on operational experience the sp
 eaker has had in dealing with this threat is invaluable information. The t
 alk is crisp\, concise and purposeful - focused at providing key take-away
 s to the audience and equipping them with the capability to strengthen sec
 urity controls within their own organization. The value of the message out
 weighs the time invested by the audience.\n\nINTRODUCTION TO DIGITAL SKIMM
 ING\nWHAT IS A DIGITAL SKIMMING ATTACK?\nMODUS OPERANDI OF THE ATTACK\nTHR
 EAT ACTORS AND ATTACK VECTORS\nANATOMY OF A DIGITAL SKIMMING ATTACK\nCHALL
 ENGES IN DEALING WITH THIS ATTACK\nCOUNTERMEASURES AND REMEDIATION STEPS\n
 CONCLUSION\n\n### Speaker bio\n\nArjun is a Lead Information Security Anal
 yst at Target Corporation. He is a security professional with diverse expe
 rience in architecting\, designing\, implementing & supporting IT Security
  & Vulnerability Management solutions in Enterprise & Cloud environments. 
 He is an information security enthusiast with diverse experience in areas 
 like Application Security\, Security Architecture\, DevSecOps\, Cloud Secu
 rity & Machine Learning. Currently\, Arjun is working as a Security Analys
 t ensuring end-to-end implementation\, design and governance of security m
 easures for Target’s Digital & Marketing e-commerce platforms\, aimed at
  brand protection and improving guest confidence. He has been closely foll
 owing the digital skimming threat and is actively involved within his orga
 nization to research upon and ensure that defenses are in place to counter
  this threat.\n
GEO:18.538341882797692;73.8858146639541
LAST-MODIFIED:20230810T072606Z
LOCATION:St. Laurn Hotel Main auditorium - St. Laurn Hotel\nPune\nIN
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
URL:https://hasgeek.com/rootconf/2019-pune/schedule/the-art-of-exfiltratio
 n-digital-skimming-4VSqoJtLfroaUDbRpx6ptC
BEGIN:VALARM
ACTION:display
DESCRIPTION:The art of exfiltration: digital skimming in St. Laurn Hotel M
 ain auditorium in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Scaling hotstar.com for 25 million concurrent viewers
DTSTART:20190921T065000Z
DTEND:20190921T073000Z
DTSTAMP:20260429T013308Z
UID:session/MqhUSGryXWUipGbu11gGaL@hasgeek.com
SEQUENCE:3
CATEGORIES:Full talk (40 mins),Others
CREATED:20190821T050125Z
DESCRIPTION:About Hotstar \nWhy traditional autoscaling doesn't work for H
 otstar \nChallenges in scaling\nGamedays and load testing for millions \nH
 ow we prepare for peak traffic (50M)\nChaos engineering at high level\n\n#
 ## Speaker bio\n\nGaurav is a Cloud Architect at Hotstar\, India’s leadi
 ng OTT provider that holds a global concurrency record for live streaming 
 to 25Mn+ viewers. At Hotstar\, he loves building cost-efficient infrastruc
 ture that can scale to millions in minutes. He is also passionate about ch
 aos engineering and cloud security.\n
GEO:18.538341882797692;73.8858146639541
LAST-MODIFIED:20240123T122937Z
LOCATION:St. Laurn Hotel Main auditorium - St. Laurn Hotel\nPune\nIN
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
URL:https://hasgeek.com/rootconf/2019-pune/schedule/scaling-hotstar-com-fo
 r-25-million-concurrent-viewers-MqhUSGryXWUipGbu11gGaL
BEGIN:VALARM
ACTION:display
DESCRIPTION:Scaling hotstar.com for 25 million concurrent viewers in St. L
 aurn Hotel Main auditorium in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Lunch break
DTSTART:20190921T073000Z
DTEND:20190921T082000Z
DTSTAMP:20260429T013308Z
UID:session/85BxWbnEmvCHbRtrNrEVBg@hasgeek.com
SEQUENCE:0
CREATED:20190628T061316Z
DESCRIPTION:\n
LAST-MODIFIED:20190911T104945Z
LOCATION:Pune\, YMCA Pune
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
BEGIN:VALARM
ACTION:display
DESCRIPTION:Lunch break in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Birds of Feather (BOF) session: On monitoring -- challenges faced\
 ; tooling
DTSTART:20190921T082000Z
DTEND:20190921T090000Z
DTSTAMP:20260429T013308Z
UID:session/F5BtHnH3xgYHTL5MoiNkr1@hasgeek.com
SEQUENCE:0
CREATED:20190802T063139Z
DESCRIPTION:\n
GEO:18.538341882797692;73.8858146639541
LAST-MODIFIED:20190903T033356Z
LOCATION:Birds Of Feather (BOF) session area - St. Laurn Hotel\nPune\nIN
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
BEGIN:VALARM
ACTION:display
DESCRIPTION:Birds of Feather (BOF) session: On monitoring -- challenges fa
 ced\; tooling in Birds Of Feather (BOF) session area in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Using DNS as a layer of defense
DTSTART:20190921T082000Z
DTEND:20190921T090000Z
DTSTAMP:20260429T013308Z
UID:session/7aDcyjXjVXDgvcLrmX7B3W@hasgeek.com
SEQUENCE:3
CATEGORIES:Full talk (40 mins),Rehearsal to be scheduled,Security
CREATED:20190730T062340Z
DESCRIPTION:Outline - \n\n 1. Idea of a flat network & it's constriants\n 
 2. Threats and various insecurities in the network\n 3. DNS 101\n 4. Intro
 duction to DNS Response Policy Zones/DNS Firewall\n 5. Live demo\n 6. Q&A\
 n\n### Speaker bio\n\nI run Shreshta IT\, a network & security company bas
 ed in Belgaum. A essential background for this talk comes from our experie
 nces of implementing DNS Response Policy Zones in 100+ networks.\n
GEO:18.538341882797692;73.8858146639541
LAST-MODIFIED:20240123T122942Z
LOCATION:St. Laurn Hotel Main auditorium - St. Laurn Hotel\nPune\nIN
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
URL:https://hasgeek.com/rootconf/2019-pune/schedule/using-dns-as-a-layer-o
 f-defense-7aDcyjXjVXDgvcLrmX7B3W
BEGIN:VALARM
ACTION:display
DESCRIPTION:Using DNS as a layer of defense in St. Laurn Hotel Main audito
 rium in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:eBPF: BPF kernel infrastructure
DTSTART:20190921T090000Z
DTEND:20190921T094000Z
DTSTAMP:20260429T013308Z
UID:session/SNoyCy9EgfZ1BRG94PKomJ@hasgeek.com
SEQUENCE:3
CATEGORIES:Full talk (40 mins),Rehearsal to be scheduled,Network engineeri
 ng
CREATED:20190702T082731Z
DESCRIPTION:- Introduction to eBPF \n    - Tracing applications \n    - tc
 pdump: Beginning of BPF \n- What is eBPF? \n    - Features\n    - Use-case
 s\n- How does eBPF works?\n    - BPF syscall\, maps\, prog types\n    - Ho
 w is BPF safe?\n       - Overview of eBPF verfier\n- How to use eBPF?\n   
  - System requirements\n    - Writing eBPF program in python using BCC(BPF
  compiler collection)\n    - frontends\, DSL etc\n- XDP\n    - Overview\n 
    - XDP real life-scenario\n       - Test setup\n       - Benchmark compa
 rison between iptables and XDP\n- Takeaways\n- Q&A\n\n### Speaker bio\n\nP
 erformance engineer at Red Hat. Currently working on improving kernel netw
 orking performance. Open source enthusiast. Co-organizer/Volunteer of Indi
 a Linux User group Delhi.\n\nPrevious talks: \nHow command line params are
  parsed(ILUG-D): http://slides.com/tksourabh/how-command#/\nBasics: Loggin
 g in python(PyDelhi): https://slides.com/tksourabh/basics-logging-in-pytho
 n#/\nGithub: https://github.com/sourabhtk37/\n
GEO:18.538341882797692;73.8858146639541
LAST-MODIFIED:20240123T122947Z
LOCATION:St. Laurn Hotel Main auditorium - St. Laurn Hotel\nPune\nIN
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
URL:https://hasgeek.com/rootconf/2019-pune/schedule/ebpf-bpf-kernel-infras
 tructure-SNoyCy9EgfZ1BRG94PKomJ
BEGIN:VALARM
ACTION:display
DESCRIPTION:eBPF: BPF kernel infrastructure in St. Laurn Hotel Main audito
 rium in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Birds of Feather (BOF) session: Let's talk about fuzzing
DTSTART:20190921T094000Z
DTEND:20190921T102500Z
DTSTAMP:20260429T013308Z
UID:session/V1dfyHjpgfVt4FEFygqwqe@hasgeek.com
SEQUENCE:2
CATEGORIES:Birds of Feather (BOF) session,Security
CREATED:20190703T090728Z
DESCRIPTION:Fuzz testing or Fuzzing is a Black Box software testing techni
 que\, which basically consists in finding implementation bugs using malfor
 med/semi-malformed data injection in an automated fashion. Security engine
 ers have been using fuzzing for quite some time now and it has yeilded exc
 ellent results. Google runs a full fledged project called oss-fuzz which a
 ims to fuzz various upstream projects to find and fix security flaws in th
 em. This BoF discusses fuzzing in general\, various techniques etc\, and t
 alks about how one can get started.\n\n### Speaker bio\n\nI work as a Prin
 cipal Product Security Engineer with Red Hat. I have been involved with hi
 gh impact security flaws specially related to SSL/TLS over the last 10 yea
 rs. I am a part of various upstream security teams and a contributor to Fe
 dora security team. Also i do some security research in my spare time.\n
GEO:18.538341882797692;73.8858146639541
LAST-MODIFIED:20230810T072606Z
LOCATION:Birds Of Feather (BOF) session area - St. Laurn Hotel\nPune\nIN
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
URL:https://hasgeek.com/rootconf/2019-pune/schedule/lets-talk-about-fuzzin
 g-V1dfyHjpgfVt4FEFygqwqe
BEGIN:VALARM
ACTION:display
DESCRIPTION:Birds of Feather (BOF) session: Let's talk about fuzzing in Bi
 rds Of Feather (BOF) session area in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Implementing distributed tracing in FaaS
DTSTART:20190921T094000Z
DTEND:20190921T102000Z
DTSTAMP:20260429T013308Z
UID:session/RLUhPfJ8UJDmCK7NPZ7iPG@hasgeek.com
SEQUENCE:3
CATEGORIES:Full talk (40 mins),Rehearsal to be scheduled,Monitoring and lo
 gging
CREATED:20190723T065751Z
DESCRIPTION:1. What is observability?\n  - Logging and metrics\n  - Distri
 buted tracing\n2. About Fission\n  - Fission function environments\n3. Abo
 ut Jaeger\n  - Instrumenting applications using client libraries\n4. Archi
 tecture of demo application\n  - Kafka as message queue \n5. Instrumenting
  the functions\n  - Modifications made to the Fission's environments\n  - 
 Propagating the context through Kafka\n6. Changes made to Fission\n7. Chan
 ges made to Jaeger's Python library\n\n### Speaker bio\n\nBhavin is workin
 g with InfraCloud Technologies\, Pune. His main area of interest are Free/
 Libre and Open Source Software\, DevSecOps\, containers and Kubernetes. Ha
 ve contributed to Fission as well Jaeger's components.\n
GEO:18.538341882797692;73.8858146639541
LAST-MODIFIED:20240123T122955Z
LOCATION:St. Laurn Hotel Main auditorium - St. Laurn Hotel\nPune\nIN
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
URL:https://hasgeek.com/rootconf/2019-pune/schedule/implementing-distribut
 ed-tracing-in-faas-RLUhPfJ8UJDmCK7NPZ7iPG
BEGIN:VALARM
ACTION:display
DESCRIPTION:Implementing distributed tracing in FaaS in St. Laurn Hotel Ma
 in auditorium in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Evening tea break
DTSTART:20190921T102000Z
DTEND:20190921T104000Z
DTSTAMP:20260429T013308Z
UID:session/NVS6C4XzRBHgHLkzka7UTU@hasgeek.com
SEQUENCE:0
CREATED:20190628T061459Z
DESCRIPTION:\n
LAST-MODIFIED:20190911T105420Z
LOCATION:Pune\, YMCA Pune
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
BEGIN:VALARM
ACTION:display
DESCRIPTION:Evening tea break in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:OpenQA - Life too short for Manual Testing
DTSTART:20190921T104000Z
DTEND:20190921T104500Z
DTSTAMP:20260429T013308Z
UID:session/3Rr7V62aNiqVmhYH6oCigA@hasgeek.com
SEQUENCE:2
CATEGORIES:Flash talk (5 mins),Awaiting response from proposer,Automation
CREATED:20190807T051813Z
DESCRIPTION:OpenQA is free software. This tool solved a major issue of min
 e which I was facing while automating OS installation tests\, it helped me
  to test the OS installation in various languages. It uses virtual machine
 s to reproduce the process and using this tool we can interact with the OS
  like a user\, we can send necessary keystrokes\, clicks and commands to p
 roceed that made my work very easy. This tool help to test and match with 
 the fast upgrades and revision of the OS.\nThe session will cover followin
 g things:\n-Need for automation\n-Brief introduction about the tool \n-Arc
 hitecture\n-Basic Concepts\n-Demo\n-Result and Reporting\n\n### Speaker bi
 o\n\nI am a Quality engineer at Red Hat\, Pune and love to contribute to F
 edora events like Test days\, bug triage activity\, organizing Fedora Wome
 ns Day. I have worked on different testing tools and framework like Robot 
 Framework\, Behave\, Pytest\, OpenQA.\n
GEO:18.538341882797692;73.8858146639541
LAST-MODIFIED:20230810T072606Z
LOCATION:St. Laurn Hotel Main auditorium - St. Laurn Hotel\nPune\nIN
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
URL:https://hasgeek.com/rootconf/2019-pune/schedule/openqa-life-too-short-
 for-manual-testing-3Rr7V62aNiqVmhYH6oCigA
BEGIN:VALARM
ACTION:display
DESCRIPTION:OpenQA - Life too short for Manual Testing in St. Laurn Hotel 
 Main auditorium in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Technology Selection in Cloud Native Era
DTSTART:20190921T104000Z
DTEND:20190921T113000Z
DTSTAMP:20260429T013308Z
UID:session/Vty5dSbiP2gHQAPYQcFGRN@hasgeek.com
SEQUENCE:2
CATEGORIES:Birds of Feather (BOF) session,DevOps
CREATED:20190807T062450Z
DESCRIPTION:- There are many tools for cloud native development workflow -
  both for inner loop and outer loop of development.\n- Many tools launched
  one year ago are not actively maintained anymore and risk of being outdat
 ed\n- The new tools launched are almost a re-packaging of few of existing 
 tools still leave a lot of desired functionality not available.\n\n### Spe
 aker bio\n\nVishal is an engineer focused on programmable & scalable infra
 structure in his earlier roles and latest as a CTO at Infracloud Technolog
 ies. He is a contributor to Fission - Serverless functions for Kubernetes\
 , organizes “Pune Kubernetes & CNCF Meetup” and “Pune Serverless Mee
 tup” every month and is a Google Developer expert (https://developers.go
 ogle.com/experts/people/vishal-biyani). Oh and he likes books\, cycle and 
 natural/urban landscapes.\n
GEO:18.538341882797692;73.8858146639541
LAST-MODIFIED:20230810T072606Z
LOCATION:Birds Of Feather (BOF) session area - St. Laurn Hotel\nPune\nIN
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
URL:https://hasgeek.com/rootconf/2019-pune/schedule/technology-selection-i
 n-cloud-native-era-Vty5dSbiP2gHQAPYQcFGRN
BEGIN:VALARM
ACTION:display
DESCRIPTION:Technology Selection in Cloud Native Era in Birds Of Feather (
 BOF) session area in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Flash talks -- by participants
DTSTART:20190921T104500Z
DTEND:20190921T110000Z
DTSTAMP:20260429T013308Z
UID:session/SEs4UiPHJdJNHeUKAUg28q@hasgeek.com
SEQUENCE:0
CREATED:20190628T061444Z
DESCRIPTION:\n
GEO:18.538341882797692;73.8858146639541
LAST-MODIFIED:20190911T105301Z
LOCATION:St. Laurn Hotel Main auditorium - St. Laurn Hotel\nPune\nIN
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
BEGIN:VALARM
ACTION:display
DESCRIPTION:Flash talks -- by participants in St. Laurn Hotel Main auditor
 ium in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Emulates Stack - Spine and Leaf for OpenStack Deployment.
DTSTART:20190921T110000Z
DTEND:20190921T110500Z
DTSTAMP:20260429T013308Z
UID:session/VE2nqZ1GbQue3nkEqRCPMC@hasgeek.com
SEQUENCE:2
CATEGORIES:Full talk (40 mins),DevOps
CREATED:20190730T062407Z
DESCRIPTION:Hello All\,\n \nThe focus of this session is to provide a way 
 in which one can utilize the power of virtualization to emulate the requir
 ed pieces of hardware to build a cloud that is close to what one will be d
 eploying in a production environment.\n\nThe idea is to primarily build a 
 fully virtual lab that will consists of switches\, routers and isolated vl
 ans along with a Highly Available overcloud environment.\n\nThis will assi
 st the field teams to better plan and also potentially eliminate any poten
 tial issues that may be encountered while deploying production grade overc
 louds in actual production environments.\n\nHere's a outline of the variou
 s technologies that we will combine to emulate the stack:\n\n    A) EVE-NG
 \n    B) qemu-kvm\n    C) Openstack\n    D) Open source Router\n    E) Ope
 n source Switch\n\n### Speaker bio\n\nNilesh Chandekar (RH - STSE)\nArvind
  S. (RH - STSE)\n
GEO:18.538341882797692;73.8858146639541
LAST-MODIFIED:20230810T072606Z
LOCATION:St. Laurn Hotel Main auditorium - St. Laurn Hotel\nPune\nIN
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
URL:https://hasgeek.com/rootconf/2019-pune/schedule/emulates-stack-spine-a
 nd-leaf-for-openstack-deployment-VE2nqZ1GbQue3nkEqRCPMC
BEGIN:VALARM
ACTION:display
DESCRIPTION:Emulates Stack - Spine and Leaf for OpenStack Deployment. in S
 t. Laurn Hotel Main auditorium in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Let us Gossip about it
DTSTART:20190921T110500Z
DTEND:20190921T111000Z
DTSTAMP:20260429T013308Z
UID:session/CdXqExpABLKYKcSrLP9VAC@hasgeek.com
SEQUENCE:2
CATEGORIES:Full talk of 40 mins duration,Beginner,Full talk (40 mins),Encr
 yption,Selected as flash talk of 5 mins duration
CREATED:20190903T101436Z
DESCRIPTION:1. What is a Gossip Protocol?\n2. Key features\n3. How is the 
 information disseminated?\n4. Different States of Gossip Protocol\n5. Diff
 erent Models in Gossip Protocol\n6. Implementation in Cassandra\n7. Code S
 nippet\n\n### Speaker bio\n\nThe speaker has worked on blockchain technolo
 gies as a research intern along with experience in conducting security rev
 iews for ethereum based smart contracts. During her college\, she has impl
 emented a tool for finding vulnerabilities in ethereum based smart contrac
 ts. Currently\, she is independently researching on applied cryptography a
 nd mathematics involved in it alongside working with the WAF Research team
  at Qualys as a Web Application Security Analyst. She is also the Pune Cha
 pter Lead for the Infosecgirls community and has also presented at Owasp S
 easides 2019\, Webinars and Null Chapter Meets.\n
GEO:18.538341882797692;73.8858146639541
LAST-MODIFIED:20230810T072606Z
LOCATION:St. Laurn Hotel Main auditorium - St. Laurn Hotel\nPune\nIN
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
URL:https://hasgeek.com/rootconf/2019-pune/schedule/let-us-gossip-about-it
 -CdXqExpABLKYKcSrLP9VAC
BEGIN:VALARM
ACTION:display
DESCRIPTION:Let us Gossip about it in St. Laurn Hotel Main auditorium in 5
  minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:fStream: continuous intelligence at scale in Flipkart
DTSTART:20190921T111000Z
DTEND:20190921T115000Z
DTSTAMP:20260429T013308Z
UID:session/UdA151s6NB9W7pp9Kc329m@hasgeek.com
SEQUENCE:3
CATEGORIES:Full talk of 40 mins duration,Advanced,Intermediate,Full talk o
 f 40 mins,Full talk (40 mins),Rehearsal to be scheduled,Distributed system
 s
CREATED:20190715T100750Z
DESCRIPTION:Agenda for the talk would be : \n - Stream processing use-case
 s in e-commerce domain\n - Common problems and paradigms in stream process
 ing \n - FStream - Managed stateful stream processing platform\n - FStream
  components\n\n### Speaker bio\n\nArya Ketan has been part of Flipkart sin
 ce its early days and is currently a software architect. He is passionate 
 about developing features and debugging problems in large scale distribute
 d systems. Nowadays\, he is working in the big data platform of Flipkart w
 hich powers near real time and batch computation on eCommerce datasets. He
  completed his bachelors in engineering from NIT\,Trichy\,India in 2008.\n
GEO:18.538341882797692;73.8858146639541
LAST-MODIFIED:20240123T123000Z
LOCATION:St. Laurn Hotel Main auditorium - St. Laurn Hotel\nPune\nIN
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
URL:https://hasgeek.com/rootconf/2019-pune/schedule/fstream-continuous-int
 elligence-scale-in-flipkart-UdA151s6NB9W7pp9Kc329m
BEGIN:VALARM
ACTION:display
DESCRIPTION:fStream: continuous intelligence at scale in Flipkart in St. L
 aurn Hotel Main auditorium in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Birds of Feather session: On securing your CI/CD pipeline
DTSTART:20190921T113500Z
DTEND:20190921T123000Z
DTSTAMP:20260429T013308Z
UID:session/Rn9Kb1GQiNv2f6jC2YToG3@hasgeek.com
SEQUENCE:0
CREATED:20190807T051932Z
DESCRIPTION:\n
GEO:18.538341882797692;73.8858146639541
LAST-MODIFIED:20190917T090358Z
LOCATION:Birds Of Feather (BOF) session area - St. Laurn Hotel\nPune\nIN
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
BEGIN:VALARM
ACTION:display
DESCRIPTION:Birds of Feather session: On securing your CI/CD pipeline in B
 irds Of Feather (BOF) session area in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Software/Site Reliability of Distributed Systems
DTSTART:20190921T115000Z
DTEND:20190921T124000Z
DTSTAMP:20260429T013308Z
UID:session/58PzMsk18KDPtEUGtfJ3Qk@hasgeek.com
SEQUENCE:3
CATEGORIES:Full talk (40 mins),Rehearsal to be scheduled,Distributed syste
 ms
CREATED:20190709T053411Z
DESCRIPTION:Consider a sample application:\nA number that user sends an SM
 S text to of the form “Remind <date format> about <y>.” When it’s du
 e\, a service calls you back. User is charged for each SMS and reminders t
 hat they answer.\n\nWhere all do you think this can start failing?\n\nStat
 ic Failures:\n\n    Disks\n    Network\n    CPU\n    Memory\n\nBehaviour F
 ailures:\n\n    Degradation\n    Latency\n    Freshness\n    Correctness\n
     DDos\n\nWhat are the right tools and strategies to measure and monitor
  these failure points?\nWhat is the cost of measuring or leaving it un-mea
 sured?\n\nThere are Queues in the system. How do you monitor synchronous a
 nd asynchronous architectures?\n\nThe load has started to increase\, but b
 efore we discuss strategies Let’s discuss CAP quickly.\nHow do we decide
  if we need sharding\, better CPU or Clustering?\n\nHow do we add backups?
  Should they be asynchronous or synchronous?\nCriteria to consider before 
 picking up a strategy.\n\nSo far\, we have been reactive about failures. H
 ow do we move to a proactive model?\nAnd Meanwhile\, could you trace that 
 request from that particular user for me?\n\nAt what stage and how do we s
 tart injecting reliability as a part of the Software development process?\
 n\nLastly\, while all of this is said to improve and fix things\, how do w
 e prove that it does? How do you validate that MySQL replicas come back wh
 en the master dies. The only way to know is by simulating. How do we set u
 p Simulations? A decade ago it used to be called FMEA\; now it’s called 
 Chaos Engineering.\n\nAnd oh\, we should also discuss Site vs Software Rel
 iability.\n\n### Speaker bio\n\nI head Site Reliability Engineering at Tru
 stingsocial.com\, where we credit-score nearly half-billion users across 3
  countries\, 5 datacenters\, 3 clouds and on our way to credit-score 1-bil
 lion people across South-East Asia.\n\nI have been working on Infrastructu
 re Engineering for almost a Decade\, from the days when things would break
  they would make a sound.\nI have had the fortune of learning these skills
  from some top engineers while scaling fairly large complex database syste
 ms like Cassandra\, building an Iaas platform\, or building our own micros
 ervice communication bus.\n\nThe talk is a consortium of my learnings over
  the past 15 years and I hope that it could help engineers/architects as w
 ell.\n
GEO:18.538341882797692;73.8858146639541
LAST-MODIFIED:20240123T123009Z
LOCATION:St. Laurn Hotel Main auditorium - St. Laurn Hotel\nPune\nIN
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
URL:https://hasgeek.com/rootconf/2019-pune/schedule/software-site-reliabil
 ity-of-distributed-systems-58PzMsk18KDPtEUGtfJ3Qk
BEGIN:VALARM
ACTION:display
DESCRIPTION:Software/Site Reliability of Distributed Systems in St. Laurn 
 Hotel Main auditorium in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Closing and feedback
DTSTART:20190921T124000Z
DTEND:20190921T125000Z
DTSTAMP:20260429T013308Z
UID:session/WJhEjWjvdLHU8h6hfPSFsC@hasgeek.com
SEQUENCE:0
CREATED:20190911T105528Z
DESCRIPTION:\n
GEO:18.538341882797692;73.8858146639541
LAST-MODIFIED:20190911T105533Z
LOCATION:St. Laurn Hotel Main auditorium - St. Laurn Hotel\nPune\nIN
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
BEGIN:VALARM
ACTION:display
DESCRIPTION:Closing and feedback in St. Laurn Hotel Main auditorium in 5 m
 inutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
END:VCALENDAR
