Submissions
Rootconf Pune edition

Rootconf Pune edition

On security, network engineering and distributed systems

Tickets

Loading…

Accepting submissions till 21 Aug 2019, 10:30 AM

Not accepting submissions

##We are accepting talks on the following topics: Security -- tooling and automation Network engineering and security Monitoring, logging and alerting -- running small-scale and large-scale systems Micro-services -- including costs of micro-services and success metrics expand

##We are accepting talks on the following topics:

  1. Security -- tooling and automation
  2. Network engineering and security
  3. Monitoring, logging and alerting -- running small-scale and large-scale systems
  4. Micro-services -- including costs of micro-services and success metrics
  5. Case studies of shift from batch processing to stream processing
  6. Real-life examples of service discovery
  7. Optimizing infrastructure

##Types and duration of talks:

  1. Full talks: 40 mins duration including Q&A
  2. Crisp talks: 20 mins duration including Q&A
  3. Birds of Feather (BOF) sessions of 1 hour duration
  4. Hands-on workshops, of 3-6 hour duration.

You can also suggest a topic for someone else to speak/teach a workshop. If we find a speaker/trainer for the topic you proposed, we will send you a Rootconf t-shirt.

##Participant profile for Rootconf Pune will include:

  1. SRE
  2. Distributed systems practitioners
  3. Network engineers
  4. DevOps programmers
  5. Security and DevSecOps professionals

This profile will help you to understand who will be the audience for your talk, and therefore, how you should structure you talk and takeaways.

##We don’t accept:

  1. How-to and introductory-level talks.
  2. Tooling talks without a clear problem statement. Instead, tell us what problems the tool solves for you, and why you advocate community members to use the tool.
  3. Proposals where source code is closed or where you cannot reveal code and implementation details.

##Guidelines for submitting proposals for Rootconf Pune:

  1. Write the proposal in gender neutral language. Use the words ‘they/them’ instead of ‘he/she’.
  2. Explain the problem you are solving when submitting a proposal. We give weightage to novelty of problems and problem-solving approaches.
  3. Focus on narrowing down what the audience will learn from your talk. The best way to do this is by putting yourself in the audience’s shoes: what do you want to learn (that will make you a better practitioner) if you were in the audience listening to your own talk?
  4. Provide implementation details. But the implementation details -- code samples, architecture approach, etc -- in the context of the larger problem you are solving.
  5. Never lose sight of the problem!

Note that reviews will carried out on the proposal pages only, as comments. Proposers must check their proposals for new comments, and to respond to earlier comments.

Passes and honorarium for speakers:

We pay an honorarium of Rs. 3,000 to speakers. Confirmed speakers also get a pass to the conference and a discount code which they can share with their colleagues, communities they are part of, and on social media channels. We do not provide free passes for speakers’ colleagues and spouses. Please don’t ask us for this.

Travel grants for outstation speakers:

Travel grants are available for international and domestic speakers based on the event’s budget. If you require a grant, mention it in the field where you add your location.

##Last date for submission is 15 August, 11:59 PM

If you have queries, write to rootconf.editorial@hasgeek.com

Make a submission

Accepting submissions till 21 Aug 2019, 10:30 AM

Shirish

Building a continuous secure delivery pipeline

In today’s fast paced software development world, we have seen teams facing difficulties keeping up with security requirements. Regular security breach in news highlights how a simple security miss can result into big financial and reputation loss. more
  • 8 comments
  • Rejected
  • 13 Apr 2019
Technical level: Beginner Section: Full talk (40 mins) Category: DevSecOps

Goutham Veeramachaneni

Cortex: Horizontally Scalable, Distributed Prometheus

In this talk we’ll present a horizontally scalable, distributed, Prometheus API-compatible monitoring system called Cortex. Cortex was built to offer a different solution to Prometheus HA and virtually infinite retention. We’ll discuss its architecture, tradeoffs and evolution, with special reference given to the distributed systems algorithms use to provide failure tolerance and scalability. more
  • 1 comment
  • Rejected
  • 14 Feb 2019
Technical level: Intermediate

Abhisek Datta

Application Security Workflow Automation using Docker and Kubernetes

We are in an age when there are just too many attacker tools, techniques and procedures (TTP). It is pointless to build automation that follow a fixed workflow — a fixed way or order of doing things, which may work for one but will not fit into the requirement of others. more
  • 3 comments
  • Confirmed & scheduled
  • 05 Apr 2019
Section: Full talk Technical level: Intermediate Section: Full talk (40 mins) Category: Automation

Huzaifa Sidhpurwala

Lets talk about TLS 1.3

SSL/TLS is probably the most widely used security protocol on the internet. Since heartbleed was discovered a few years back, this protocol has been constantly audited and evaluated by security researchers around the world. TLS 1.3 is the latest version of the protcol designed from ground up to be more secure than its previous versions. This talk discusses new features and security improvements i… more
  • 5 comments
  • Confirmed & scheduled
  • 10 Mar 2019
Section: Full talk Technical level: Intermediate Section: Full talk (40 mins) Category: Security
Arjun BM

Arjun BM

MUDPIPE - Malicious URL Detection for Phishing Identification and Prevention

Social engineering is one of the most dangerous threats facing every individual and modern organization. Phishing is a well-known, computer-based, social engineering technique. Attackers use disguised emails as a weapon to target large companies. Numerous fake websites have been developed to mimic trusted websites, with the aim of stealing financial assets from users and organizations. With the h… more
  • 6 comments
  • Rejected
  • 24 May 2019
Section: Crisp talk Technical level: Intermediate Session type: Demo

Arya Ketan

Abstractions of a Managed Stream Processing platform and how we provide them at scale in Flipkart.

We live in an age of ML models, deeply personalised user experiences and quick data driven business decisions. The common denominator enabling all of it is data processing systems, especially real time ones. more
  • 10 comments
  • Confirmed & scheduled
  • 01 Apr 2019
Section: Full talk of 40 mins duration Technical level: Advanced Session type: Full talk of 40 mins Section: Full talk (40 mins) Category: Distributed systems

tk sourabh

Video thumbnail

eBPF: BPF kernel Infrastructure

eBPF is an upcoming in-kernel mechanism that provides ability inject arbitrary user space code into the kernel in a safe manner. more
  • 0 comments
  • Confirmed & scheduled
  • 01 Jul 2019
Section: Full talk (40 mins) Category: Network engineering

Huzaifa Sidhpurwala

Lets talk about fuzzing

Fuzzing ia a software testing technique, which consists of throwing malformed data at an application in an automated way and observing how the application behaves. Fuzzing for security has been a recent trend, with companies like Google doing this on a massive scale. This BoF discusses some of these techniques and how fuzzing is generally useful. more
  • 0 comments
  • Confirmed & scheduled
  • 02 Jul 2019
Section: Birds of Feather (BOF) session Category: Security

Amit Nijhawan

Web-based booking application

I am going to expalin The project in DevOps - Build Real World Processes is a web-based online booking application.I will explain the THE INFRASTRUCTURE which I have used in my applicatio using dev ops , will eloborate more into CONTINUOUS INTEGRATION, CONTINUOUS DELIVERY, CONTINUOUS MASTER INTEGRATION, CONTINUOUS MASTER INTEGRATION. more
  • 7 comments
  • Rejected
  • 02 Jul 2019
Section: Workshop Category: DevOps

veerababu (Mr-IoT)

Video thumbnail

Understanding and Exploiting 433Mhz Frequencies in Connected World

IoT- Internet of things, a current trend which means connected world directly or indirectly to share or receive data. When devices communicate to share or receive data, the communication medium is required either web services or wireless or wired. more
  • 4 comments
  • Rejected
  • 03 Jul 2019
Section: Full talk (40 mins) Category: Security
Arjun BM

Arjun BM

The Art of Exfiltration : Digital Skimming

The explosion of online digital e-commerce platforms has triggered a race for customer acquisition which no retailer wants to lose or be left out of. As businesses look to deliver faster, easier and better services, security has always been an important factor in the customer value-chain. E-commerce websites continue to be lucrative targets to threat actors, who seek to compromise sensitive guest… more
  • 11 comments
  • Confirmed & scheduled
  • 04 Jul 2019
Section: Crisp talk (20 mins) Category: Security

Shrutirupa Banerjiee

Let us Gossip about it!!!

My talk will include the basics of gossip protocol along with in-depth knowledge of it’s working mechanism. This talk will give an overview of the entire protocol including very minute details along with the mathematics involved. I will also use a code snippet to explain the practical implemenation of the protocol. more
  • 7 comments
  • Confirmed & scheduled
  • 05 Mar 2019
Section: Full talk of 40 mins duration Technical level: Beginner Section: Full talk (40 mins) Category: Encryption
Piyush Verma

Piyush Verma

Video thumbnail

Software/Site Reliability of Distributed Systems

Every product either dies a hero or lives long enough to hit Reliability issues. Whether it’s your code or a service that you connect to, there will be a disk that will fail, a network that will experience partition, a CPU that will throttle, or a Memory that will fill up. While you go about fixing this, What is the cost, both in terms of effort and business lost, of failure and how much does eac… more
  • 0 comments
  • Confirmed & scheduled
  • 06 Jul 2019
Section: Full talk (40 mins) Category: Distributed systems

Abhishek A Amralkar

Running Spark on Kubernetes

Apache Spark is an essential tool for data scientists, offering a robust platform for a variety of applications ranging from large scale data transformation to analytics to machine learning. more
  • 1 comment
  • Rejected
  • 10 Jul 2019
Section: Full talk (40 mins) Category: Distributed systems

Shreyansh Pandey

Making people happy - a story of compliance

Over the last couple of years, I have seen an ever-growing trend: a software engineer writes some bit of code which is checked by a senior engineer of the team and is, later, deployed to production with little or no manual testing. This is the story of how I handled PCI-DSS compliance systems at a small FinTech in Delhi and how a team of 2 people designed, developed, deployed (a lovely alliterati… more
  • 0 comments
  • Rejected
  • 12 Jul 2019
Section: Full talk (40 mins) Category: Security

Goutham Veeramachaneni

10x faster query performance with Jaeger, Prometheus and Correlation!

We hack on cortex, a Open-Source CNCF project for distributed Prometheus, and run it in production. But as we started adding scale, we noticed poor query performance. We found ourselves adding new metrics on each rollout to test our theories, many a time shooting in the dark, only to have our assumptions invalidated after a lot of experimentation. We then decided to turn to Jaeger and things inst… more
  • 2 comments
  • Rejected
  • 15 Jul 2019
Section: Full talk (40 mins) Category: Distributed systems

Bhavin Gandhi

Implementing distributed tracing in FaaS

Microservices as well as functions have changed the way applications are built and deployed now a days. Adoption of these distributed architectures have helped teams to implement scalable, efficient and reliable systems. Operational tasks like debugging have became quite tricky with this change. With functions, these tasks become more complicated when you have message queues like Kafka in between… more
  • 14 comments
  • Confirmed & scheduled
  • 15 Jul 2019
Section: Full talk (40 mins) Category: Monitoring and logging

Vatsal Parekh

Video thumbnail

KubeVirt: Virtualization in Cloud-Native World

Kubernetes and Containers have become the new defacto standard for application deployments, but where do our VirtualMachines go in this new world? Project KubeVirt aims to solve this gap and provide a converging path for best of both worlds more
  • 2 comments
  • Rejected
  • 16 Jul 2019
Section: Full talk (40 mins) Category: DevOps

ashutoshh singh

Container network securiy and replacement of docker with podman & buildah

Securing network with SDN is not quiet easy and best practise idea will be about taking daemon less approach to manage image and containers alog with container security in terms of network and infrastructure and bound in root jail. more
  • 0 comments
  • Awaiting details
  • 17 Jul 2019
Section: Full talk (40 mins) Category: DevSecOps

Pooja Yadav

OpenQA - Life too short for Manual Testing

Nowadays, we have a new upgrade for any OS every three or six months with diversified nature as they are supported on different platforms with different flavor making difficult for QE’s to test each and every new release manually. In this session I will cover how we can automate tests for installation process of an operating system in a wide combination of software and hardware configurations. Ta… more
  • 9 comments
  • Confirmed & scheduled
  • 18 Jul 2019
Section: Flash talk (5 mins) Category: Automation

Prasad Ghangal

BotKube - Real-time Kubernetes monitoring and debugging

Kubernetes has dramatically changed the way we deploy and manage the cloud native applications, but at the same time, it has also added new challenges for day-to-day tasks like monitoring - alerting - troubleshooting workflow, gaining more visibility into services, etc. more
  • 2 comments
  • Rejected
  • 24 Jul 2019
Section: Crisp talk (20 mins) Category: Monitoring and logging

Prakhar Joshi

Journey of Hotstar Infra from EC2 to containers

This talk will focus on Hotstar’s journey from EC2 to Kubernetes. The main reasons for migrating to kuberntes was the challenges and limitations we faced while scaling infrastructure of Hotstar at peaks. This talk will also cover challenges faced during migrations and performance tuning of applications on containers. more
  • 7 comments
  • Confirmed & scheduled
  • 26 Jul 2019
Section: Full talk (40 mins) Category: DevOps
Swapneel Patnekar

Swapneel Patnekar

Using DNS as a layer of defense

DNS(Domain Name System) is the crucial & ubiquitous fabric of the Internet. While we rely on accessing websites, applications, devices using a Fully Qualified Domain Name, on a daily basis, in a network, DNS can also be extremely valuable & effective defense layer in a multi-tiered security approach. This talk will give an introduction to DNS RPZ(Response Policy Zones) and how it can be leveraged… more
  • 4 comments
  • Confirmed & scheduled
  • 26 Jul 2019
Section: Full talk (40 mins) Category: Security

Manas Malik

Framework For Lossless Data Compression Using Python

A lot has been done in the field of data compression, yet we don’t have a proper application for compressing daily usage files. There are appropriate and very specific tools online that provide files to be compressed and saved, but the content we use for streaming our videos, be it a Netflix video or a gaming theater play, data consumed is beyond the calculation of a user. Back-end developers kno… more
  • 4 comments
  • Rejected
  • 26 Jul 2019
Section: Flash talk (5 mins) Category: Others

Nilesh Chandekar

Emulates Stack - Spine and Leaf for OpenStack Deployment.

Hello All, The focus of this session is to provide a way in which one can utilize the power of virtualization to emulate the required pieces of hardware to build a cloud that is close to what one will be deploying in a production environment. more
  • 4 comments
  • Rejected
  • 29 Jul 2019
Section: Full talk (40 mins) Category: DevOps

Jayesh Bapu Ahire

Demystifying AIOps

For years, IT has struggled to keep the lights on. Now that businesses are aggressively pursuing digital transformation, that battle is becoming even more difficult. The number of applications and services is exploding. Changes are now measured in seconds or minutes, instead of months or years. Approaches such as DevOps are driving this acceleration – but, unless IT operations can keep up, digita… more
  • 6 comments
  • Rejected
  • 29 Jul 2019
Section: Flash talk (5 mins) Category: DevOps

Vishal Biyani

Technology Selection in Cloud Native Era

Open source has lead to an explosion in number of choices when it comes to technology and tooling. This abundance comes with the overhead of decision making and expecting that the decisions will be of value in future. When developing for a cloud native stack today - these choices can be mind boggling and at the same time may not solve all problems for given use case. more
  • 5 comments
  • Confirmed & scheduled
  • 01 Aug 2019
Section: Birds of Feather (BOF) session Category: DevOps

Gaurav Gahlot

Building Custom Tools with Docker API & SDK

Almost everyone wants to run their application as a Docker container. While it is an unquestionably great idea, managing Docker containers running on independent servers can be challenging. more
  • 1 comment
  • Rejected
  • 02 Aug 2019
Section: Full talk (40 mins) Category: Automation

Sachin Shinde

“Infrastructure as Code” (IaC) via Azure DevOps (CI Server) pipeline using Terraform (Provisioning) & Salt Stack (Configuration) tool

In today’s fast paced software development world, we need underlying Infrastructure delivery also at same paced, that provide consistency , quality delivery of infrastructure component without compromising security requirements. Today we are living in cloud computing era, were the elasticity of the cloud paradigm and disposability of cloud machines should be truly leveraged. Building production g… more
  • 3 comments
  • Awaiting details
  • 02 Aug 2019
Section: Full talk (40 mins) Category: Automation

Sandeep Sukhani

Video thumbnail

Grafana Loki: like Prometheus, but for logs

There are many log aggregation systems which provide tons of features but lots of developers still SSH and grep/tail the logs on machines even today! The solutions they were using were either too pricey or complicated to run/maintain. In fact, people were being asked to log less which we think is an anti-pattern for logs. more
  • 1 comment
  • Rejected
  • 15 Aug 2019
Section: Full talk (40 mins) Category: Monitoring and logging

Gaurav Kamboj

Scaling hotstar.com for 25 million concurrent viewers

The talk will focus on why traditional autoscaling doesn’t work for Hotstar (Disney’s OTT streaming service) who recently created a global record for live streaming to 25.3 million concurrent viewers. It will talk about challenges in scaling infrastructure for millions and how to overcome it, how we run gamedays before actual games, how we use load testing monster called Hulk to prepare for peak … more
  • 4 comments
  • Confirmed & scheduled
  • 21 Aug 2019
Section: Full talk (40 mins) Category: Others
Hybrid access (members only)

Hosted by

We care about site reliability, cloud costs, security and data privacy