Submissions
Rootconf Pune edition

Rootconf Pune edition

On security, network engineering and distributed systems

Make a submission

Submissions are closed for this project

St. Laurn Hotel, Pune

Submission guidelines

We are accepting talks on the following topics: Security – tooling and automation Network engineering and security Monitoring, logging and alerting – running small-scale and large-scale systems Micro-services – including costs of micro-services and success metricsexpand

We are accepting talks on the following topics:

  1. Security – tooling and automation
  2. Network engineering and security
  3. Monitoring, logging and alerting – running small-scale and large-scale systems
  4. Micro-services – including costs of micro-services and success metrics
  5. Case studies of shift from batch processing to stream processing
  6. Real-life examples of service discovery
  7. Optimizing infrastructure

Types and duration of talks:

  1. Full talks: 40 mins duration including Q&A
  2. Crisp talks: 20 mins duration including Q&A
  3. Birds of Feather (BOF) sessions of 1 hour duration
  4. Hands-on workshops, of 3-6 hour duration.

You can also suggest a topic for someone else to speak/teach a workshop. If we find a speaker/trainer for the topic you proposed, we will send you a Rootconf t-shirt.

Participant profile for Rootconf Pune will include:

  1. SRE
  2. Distributed systems practitioners
  3. Network engineers
  4. DevOps programmers
  5. Security and DevSecOps professionals

This profile will help you to understand who will be the audience for your talk, and therefore, how you should structure you talk and takeaways.

We don’t accept:

  1. How-to and introductory-level talks.
  2. Tooling talks without a clear problem statement. Instead, tell us what problems the tool solves for you, and why you advocate community members to use the tool.
  3. Proposals where source code is closed or where you cannot reveal code and implementation details.

Guidelines for submitting proposals for Rootconf Pune:

  1. Write the proposal in gender neutral language. Use the words ‘they/them’ instead of ‘he/she’.
  2. Explain the problem you are solving when submitting a proposal. We give weightage to novelty of problems and problem-solving approaches.
  3. Focus on narrowing down what the audience will learn from your talk. The best way to do this is by putting yourself in the audience’s shoes: what do you want to learn (that will make you a better practitioner) if you were in the audience listening to your own talk?
  4. Provide implementation details. But the implementation details – code samples, architecture approach, etc – in the context of the larger problem you are solving.
  5. Never lose sight of the problem!

Note that reviews will carried out on the proposal pages only, as comments. Proposers must check their proposals for new comments, and to respond to earlier comments.

Passes and honorarium for speakers:

We pay an honorarium of Rs. 3,000 to speakers. Confirmed speakers also get a pass to the conference and a discount code which they can share with their colleagues, communities they are part of, and on social media channels. We do not provide free passes for speakers’ colleagues and spouses. Please don’t ask us for this.

Travel grants for outstation speakers:

Travel grants are available for international and domestic speakers based on the event’s budget. If you require a grant, mention it in the field where you add your location.

Last date for submission is 15 August, 11:59 PM

If you have queries, write to rootconf.editorial@hasgeek.com

Make a submission

Submissions are closed for this project

Submissions

S

Shirish

Building a continuous secure delivery pipeline

In today’s fast paced software development world, we have seen teams facing difficulties keeping up with security requirements. Regular security breach in news highlights how a simple security miss c…more
  • 8 comments
  • Rejected
  • Sat, 13 Apr
Technical level: Beginner Section: Full talk (40 mins) Category: DevSecOps
GV

Goutham Veeramachaneni

Cortex: Horizontally Scalable, Distributed Prometheus

In this talk we’ll present a horizontally scalable, distributed, Prometheus API-compatible monitoring system called Cortex. Cortex was built to offer a different solution to Prometheus HA and virtual…more
  • 1 comments
  • Rejected
  • Thu, 14 Feb
Technical level: Intermediate
AD

Abhisek Datta

Application Security Workflow Automation using Docker and Kubernetes

We are in an age when there are just too many attacker tools, techniques and procedures (TTP). It is pointless to build automation that follow a fixed workflow — a fixed way or order of doing things,…more
  • 3 comments
  • Confirmed & scheduled
  • Fri, 05 Apr
Section: Full talk Technical level: Intermediate Section: Full talk (40 mins) Category: Automation
HS

Huzaifa Sidhpurwala

Lets talk about TLS 1.3

SSL/TLS is probably the most widely used security protocol on the internet. Since heartbleed was discovered a few years back, this protocol has been constantly audited and evaluated by security resea…more
  • 5 comments
  • Confirmed & scheduled
  • Sun, 10 Mar
Section: Full talk Technical level: Intermediate Section: Full talk (40 mins) Category: Security
AB

Arjun BM

MUDPIPE - Malicious URL Detection for Phishing Identification and Prevention

Social engineering is one of the most dangerous threats facing every individual and modern organization. Phishing is a well-known, computer-based, social engineering technique. Attackers use disguise…more
  • 6 comments
  • Rejected
  • Fri, 24 May
Section: Crisp talk Technical level: Intermediate Session type: Demo
AK

Arya Ketan

Abstractions of a Managed Stream Processing platform and how we provide them at scale in Flipkart.

We live in an age of ML models, deeply personalised user experiences and quick data driven business decisions. The common denominator enabling all of it is data processing systems, especially real ti…more
  • 10 comments
  • Confirmed & scheduled
  • Mon, 01 Apr
Session type: Full talk of 40 mins Section: Full talk of 40 mins duration Technical level: Advanced Section: Full talk (40 mins) Category: Distributed systems
ts

tk sourabh

eBPF: BPF kernel Infrastructure

eBPF is an upcoming in-kernel mechanism that provides ability inject arbitrary user space code into the kernel in a safe manner.more
  • 0 comments
  • Confirmed & scheduled
  • Mon, 01 Jul
Section: Full talk (40 mins) Category: Network engineering
HS

Huzaifa Sidhpurwala

Lets talk about fuzzing

Fuzzing ia a software testing technique, which consists of throwing malformed data at an application in an automated way and observing how the application behaves. Fuzzing for security has been a rec…more
  • 0 comments
  • Confirmed & scheduled
  • Tue, 02 Jul
Section: Birds of Feather (BOF) session Category: Security
AN

Amit Nijhawan

Web-based booking application

I am going to expalin The project in DevOps - Build Real World Processes is a web-based online booking application.I will explain the THE INFRASTRUCTURE which I have used in my applicatio using dev o…more
  • 7 comments
  • Rejected
  • Tue, 02 Jul
Section: Workshop Category: DevOps
v(

veerababu (Mr-IoT)

Understanding and Exploiting 433Mhz Frequencies in Connected World

IoT- Internet of things, a current trend which means connected world directly or indirectly to share or receive data. When devices communicate to share or receive data, the communication medium is re…more
  • 4 comments
  • Rejected
  • Wed, 03 Jul
Section: Full talk (40 mins) Category: Security
AB

Arjun BM

The Art of Exfiltration : Digital Skimming

The explosion of online digital e-commerce platforms has triggered a race for customer acquisition which no retailer wants to lose or be left out of. As businesses look to deliver faster, easier and …more
  • 11 comments
  • Confirmed & scheduled
  • Thu, 04 Jul
Section: Crisp talk (20 mins) Category: Security
SB

Shrutirupa Banerjiee

Let us Gossip about it!!!

My talk will include the basics of gossip protocol along with in-depth knowledge of it’s working mechanism. This talk will give an overview of the entire protocol including very minute details along …more
  • 7 comments
  • Confirmed & scheduled
  • Tue, 05 Mar
Section: Full talk of 40 mins duration Technical level: Beginner Section: Full talk (40 mins) Category: Encryption

Piyush Verma

Software/Site Reliability of Distributed Systems

Every product either dies a hero or lives long enough to hit Reliability issues. Whether it’s your code or a service that you connect to, there will be a disk that will fail, a network that will expe…more
  • 0 comments
  • Confirmed & scheduled
  • Sat, 06 Jul
Section: Full talk (40 mins) Category: Distributed systems
AA

Abhishek A Amralkar

Running Spark on Kubernetes

Apache Spark is an essential tool for data scientists, offering a robust platform for a variety of applications ranging from large scale data transformation to analytics to machine learning.more
  • 1 comments
  • Rejected
  • Wed, 10 Jul
Section: Full talk (40 mins) Category: Distributed systems
SP

Shreyansh Pandey

Making people happy - a story of compliance

Over the last couple of years, I have seen an ever-growing trend: a software engineer writes some bit of code which is checked by a senior engineer of the team and is, later, deployed to production w…more
  • 0 comments
  • Rejected
  • Fri, 12 Jul
Section: Full talk (40 mins) Category: Security
GV

Goutham Veeramachaneni

10x faster query performance with Jaeger, Prometheus and Correlation!

We hack on cortex, a Open-Source CNCF project for distributed Prometheus, and run it in production. But as we started adding scale, we noticed poor query performance. We found ourselves adding new me…more
  • 2 comments
  • Rejected
  • Mon, 15 Jul
Section: Full talk (40 mins) Category: Distributed systems
BG

Bhavin Gandhi

Implementing distributed tracing in FaaS

Microservices as well as functions have changed the way applications are built and deployed now a days. Adoption of these distributed architectures have helped teams to implement scalable, efficient …more
  • 14 comments
  • Confirmed & scheduled
  • Mon, 15 Jul
Section: Full talk (40 mins) Category: Monitoring and logging
VP

Vatsal Parekh

KubeVirt: Virtualization in Cloud-Native World

Kubernetes and Containers have become the new defacto standard for application deployments, but where do our VirtualMachines go in this new world? Project KubeVirt aims to solve this gap and provide …more
  • 2 comments
  • Rejected
  • Tue, 16 Jul
Section: Full talk (40 mins) Category: DevOps
as

ashutoshh singh

Container network securiy and replacement of docker with podman & buildah

Securing network with SDN is not quiet easy and best practise idea will be about taking daemon less approach to manage image and containers alog with container security in terms of network and infras…more
  • 0 comments
  • Awaiting details
  • Wed, 17 Jul
Section: Full talk (40 mins) Category: DevSecOps
PY

Pooja Yadav

OpenQA - Life too short for Manual Testing

Nowadays, we have a new upgrade for any OS every three or six months with diversified nature as they are supported on different platforms with different flavor making difficult for QE’s to test each …more
  • 9 comments
  • Confirmed & scheduled
  • Thu, 18 Jul
Category: Automation Section: Flash talk (5 mins)
PG

Prasad Ghangal

BotKube - Real-time Kubernetes monitoring and debugging

Kubernetes has dramatically changed the way we deploy and manage the cloud native applications, but at the same time, it has also added new challenges for day-to-day tasks like monitoring - alerting …more
  • 2 comments
  • Rejected
  • Wed, 24 Jul
Section: Crisp talk (20 mins) Category: Monitoring and logging
PJ

Prakhar Joshi

Journey of Hotstar Infra from EC2 to containers

This talk will focus on Hotstar’s journey from EC2 to Kubernetes. The main reasons for migrating to kuberntes was the challenges and limitations we faced while scaling infrastructure of Hotstar at pe…more
  • 7 comments
  • Confirmed & scheduled
  • Fri, 26 Jul
Section: Full talk (40 mins) Category: DevOps

Swapneel Patnekar

Using DNS as a layer of defense

DNS(Domain Name System) is the crucial & ubiquitous fabric of the Internet. While we rely on accessing websites, applications, devices using a Fully Qualified Domain Name, on a daily basis, in a netw…more
  • 4 comments
  • Confirmed & scheduled
  • Fri, 26 Jul
Section: Full talk (40 mins) Category: Security
MM

Manas Malik

Framework For Lossless Data Compression Using Python

A lot has been done in the field of data compression, yet we don’t have a proper application for compressing daily usage files. There are appropriate and very specific tools online that provide files…more
  • 4 comments
  • Rejected
  • Fri, 26 Jul
Section: Flash talk (5 mins) Category: Others
NC

Nilesh Chandekar

Emulates Stack - Spine and Leaf for OpenStack Deployment.

Hello All, The focus of this session is to provide a way in which one can utilize the power of virtualization to emulate the required pieces of hardware to build a cloud that is close to what one wil…more
  • 4 comments
  • Rejected
  • Mon, 29 Jul
Section: Full talk (40 mins) Category: DevOps
JA

Jayesh Bapu Ahire

Demystifying AIOps

For years, IT has struggled to keep the lights on. Now that businesses are aggressively pursuing digital transformation, that battle is becoming even more difficult. The number of applications and se…more
  • 6 comments
  • Rejected
  • Mon, 29 Jul
Category: DevOps Section: Flash talk (5 mins)
VB

Vishal Biyani

Technology Selection in Cloud Native Era

Open source has lead to an explosion in number of choices when it comes to technology and tooling. This abundance comes with the overhead of decision making and expecting that the decisions will be o…more
  • 5 comments
  • Confirmed & scheduled
  • Thu, 01 Aug
Section: Birds of Feather (BOF) session Category: DevOps
GG

Gaurav Gahlot

Building Custom Tools with Docker API & SDK

Almost everyone wants to run their application as a Docker container. While it is an unquestionably great idea, managing Docker containers running on independent servers can be challenging.more
  • 1 comments
  • Rejected
  • Fri, 02 Aug
Section: Full talk (40 mins) Category: Automation
SS

Sachin Shinde

“Infrastructure as Code” (IaC) via Azure DevOps (CI Server) pipeline using Terraform (Provisioning) & Salt Stack (Configuration) tool

In today’s fast paced software development world, we need underlying Infrastructure delivery also at same paced, that provide consistency , quality delivery of infrastructure component without compro…more
  • 3 comments
  • Awaiting details
  • Fri, 02 Aug
Section: Full talk (40 mins) Category: Automation
SS

Sandeep Sukhani

Grafana Loki: like Prometheus, but for logs

There are many log aggregation systems which provide tons of features but lots of developers still SSH and grep/tail the logs on machines even today! The solutions they were using were either too pri…more
  • 1 comments
  • Rejected
  • Thu, 15 Aug
Section: Full talk (40 mins) Category: Monitoring and logging
GK

Gaurav Kamboj

via Zainab Bawa (@zainabbawa)

Scaling hotstar.com for 25 million concurrent viewers

The talk will focus on why traditional autoscaling doesn’t work for Hotstar (Disney’s OTT streaming service) who recently created a global record for live streaming to 25.3 million concurrent viewers…more
  • 4 comments
  • Confirmed & scheduled
  • Wed, 21 Aug
Section: Full talk (40 mins) Category: Others
Make a submission

Submissions are closed for this project

St. Laurn Hotel, Pune

Hosted by

Rootconf is a forum for discussions about DevOps, infrastructure management, IT operations, systems engineering, SRE and security (from infrastructure defence perspective).more