Sep 2019
16 Mon
17 Tue
18 Wed
19 Thu
20 Fri
21 Sat 08:55 AM – 06:20 PM IST
22 Sun
Accepting submissions till 21 Aug 2019, 10:30 AM
Not accepting submissions
##We are accepting talks on the following topics:
##Types and duration of talks:
You can also suggest a topic for someone else to speak/teach a workshop. If we find a speaker/trainer for the topic you proposed, we will send you a Rootconf t-shirt.
##Participant profile for Rootconf Pune will include:
This profile will help you to understand who will be the audience for your talk, and therefore, how you should structure you talk and takeaways.
##We don’t accept:
##Guidelines for submitting proposals for Rootconf Pune:
Note that reviews will carried out on the proposal pages only, as comments. Proposers must check their proposals for new comments, and to respond to earlier comments.
We pay an honorarium of Rs. 3,000 to speakers. Confirmed speakers also get a pass to the conference and a discount code which they can share with their colleagues, communities they are part of, and on social media channels. We do not provide free passes for speakers’ colleagues and spouses. Please don’t ask us for this.
Travel grants are available for international and domestic speakers based on the event’s budget. If you require a grant, mention it in the field where you add your location.
##Last date for submission is 15 August, 11:59 PM
If you have queries, write to rootconf.editorial@hasgeek.com
Accepting submissions till 21 Aug 2019, 10:30 AM
Building a continuous secure delivery pipelineIn today’s fast paced software development world, we have seen teams facing difficulties keeping up with security requirements. Regular security breach in news highlights how a simple security miss can result into big financial and reputation loss. more
Technical level: Beginner
Section: Full talk (40 mins)
Category: DevSecOps
|
Cortex: Horizontally Scalable, Distributed PrometheusIn this talk we’ll present a horizontally scalable, distributed, Prometheus API-compatible monitoring system called Cortex. Cortex was built to offer a different solution to Prometheus HA and virtually infinite retention. We’ll discuss its architecture, tradeoffs and evolution, with special reference given to the distributed systems algorithms use to provide failure tolerance and scalability. more
Technical level: Intermediate
|
Application Security Workflow Automation using Docker and KubernetesWe are in an age when there are just too many attacker tools, techniques and procedures (TTP). It is pointless to build automation that follow a fixed workflow — a fixed way or order of doing things, which may work for one but will not fit into the requirement of others. more
Section: Full talk
Technical level: Intermediate
Section: Full talk (40 mins)
Category: Automation
|
Lets talk about TLS 1.3SSL/TLS is probably the most widely used security protocol on the internet. Since heartbleed was discovered a few years back, this protocol has been constantly audited and evaluated by security researchers around the world. TLS 1.3 is the latest version of the protcol designed from ground up to be more secure than its previous versions. This talk discusses new features and security improvements i… more
Section: Full talk
Technical level: Intermediate
Section: Full talk (40 mins)
Category: Security
|
MUDPIPE - Malicious URL Detection for Phishing Identification and PreventionSocial engineering is one of the most dangerous threats facing every individual and modern organization. Phishing is a well-known, computer-based, social engineering technique. Attackers use disguised emails as a weapon to target large companies. Numerous fake websites have been developed to mimic trusted websites, with the aim of stealing financial assets from users and organizations. With the h… more
Section: Crisp talk
Technical level: Intermediate
Session type: Demo
|
Abstractions of a Managed Stream Processing platform and how we provide them at scale in Flipkart.We live in an age of ML models, deeply personalised user experiences and quick data driven business decisions. The common denominator enabling all of it is data processing systems, especially real time ones. more
Section: Full talk of 40 mins duration
Technical level: Advanced
Session type: Full talk of 40 mins
Section: Full talk (40 mins)
Category: Distributed systems
|
eBPF: BPF kernel InfrastructureeBPF is an upcoming in-kernel mechanism that provides ability inject arbitrary user space code into the kernel in a safe manner. more
Section: Full talk (40 mins)
Category: Network engineering
|
Lets talk about fuzzingFuzzing ia a software testing technique, which consists of throwing malformed data at an application in an automated way and observing how the application behaves. Fuzzing for security has been a recent trend, with companies like Google doing this on a massive scale. This BoF discusses some of these techniques and how fuzzing is generally useful. more
Section: Birds of Feather (BOF) session
Category: Security
|
Web-based booking applicationI am going to expalin The project in DevOps - Build Real World Processes is a web-based online booking application.I will explain the THE INFRASTRUCTURE which I have used in my applicatio using dev ops , will eloborate more into CONTINUOUS INTEGRATION, CONTINUOUS DELIVERY, CONTINUOUS MASTER INTEGRATION, CONTINUOUS MASTER INTEGRATION. more
Section: Workshop
Category: DevOps
|
Understanding and Exploiting 433Mhz Frequencies in Connected WorldIoT- Internet of things, a current trend which means connected world directly or indirectly to share or receive data. When devices communicate to share or receive data, the communication medium is required either web services or wireless or wired. more
Section: Full talk (40 mins)
Category: Security
|
The Art of Exfiltration : Digital SkimmingThe explosion of online digital e-commerce platforms has triggered a race for customer acquisition which no retailer wants to lose or be left out of. As businesses look to deliver faster, easier and better services, security has always been an important factor in the customer value-chain. E-commerce websites continue to be lucrative targets to threat actors, who seek to compromise sensitive guest… more
Section: Crisp talk (20 mins)
Category: Security
|
Let us Gossip about it!!!My talk will include the basics of gossip protocol along with in-depth knowledge of it’s working mechanism. This talk will give an overview of the entire protocol including very minute details along with the mathematics involved. I will also use a code snippet to explain the practical implemenation of the protocol. more
Section: Full talk of 40 mins duration
Technical level: Beginner
Section: Full talk (40 mins)
Category: Encryption
|
Software/Site Reliability of Distributed SystemsEvery product either dies a hero or lives long enough to hit Reliability issues. Whether it’s your code or a service that you connect to, there will be a disk that will fail, a network that will experience partition, a CPU that will throttle, or a Memory that will fill up. While you go about fixing this, What is the cost, both in terms of effort and business lost, of failure and how much does eac… more
Section: Full talk (40 mins)
Category: Distributed systems
|
Running Spark on KubernetesApache Spark is an essential tool for data scientists, offering a robust platform for a variety of applications ranging from large scale data transformation to analytics to machine learning. more
Section: Full talk (40 mins)
Category: Distributed systems
|
Making people happy - a story of complianceOver the last couple of years, I have seen an ever-growing trend: a software engineer writes some bit of code which is checked by a senior engineer of the team and is, later, deployed to production with little or no manual testing. This is the story of how I handled PCI-DSS compliance systems at a small FinTech in Delhi and how a team of 2 people designed, developed, deployed (a lovely alliterati… more
Section: Full talk (40 mins)
Category: Security
|
10x faster query performance with Jaeger, Prometheus and Correlation!We hack on cortex, a Open-Source CNCF project for distributed Prometheus, and run it in production. But as we started adding scale, we noticed poor query performance. We found ourselves adding new metrics on each rollout to test our theories, many a time shooting in the dark, only to have our assumptions invalidated after a lot of experimentation. We then decided to turn to Jaeger and things inst… more
Section: Full talk (40 mins)
Category: Distributed systems
|
Implementing distributed tracing in FaaSMicroservices as well as functions have changed the way applications are built and deployed now a days. Adoption of these distributed architectures have helped teams to implement scalable, efficient and reliable systems. Operational tasks like debugging have became quite tricky with this change. With functions, these tasks become more complicated when you have message queues like Kafka in between… more
Section: Full talk (40 mins)
Category: Monitoring and logging
|
KubeVirt: Virtualization in Cloud-Native WorldKubernetes and Containers have become the new defacto standard for application deployments, but where do our VirtualMachines go in this new world? Project KubeVirt aims to solve this gap and provide a converging path for best of both worlds more
Section: Full talk (40 mins)
Category: DevOps
|
Container network securiy and replacement of docker with podman & buildahSecuring network with SDN is not quiet easy and best practise idea will be about taking daemon less approach to manage image and containers alog with container security in terms of network and infrastructure and bound in root jail. more
Section: Full talk (40 mins)
Category: DevSecOps
|
OpenQA - Life too short for Manual TestingNowadays, we have a new upgrade for any OS every three or six months with diversified nature as they are supported on different platforms with different flavor making difficult for QE’s to test each and every new release manually. In this session I will cover how we can automate tests for installation process of an operating system in a wide combination of software and hardware configurations. Ta… more
Section: Flash talk (5 mins)
Category: Automation
|
BotKube - Real-time Kubernetes monitoring and debuggingKubernetes has dramatically changed the way we deploy and manage the cloud native applications, but at the same time, it has also added new challenges for day-to-day tasks like monitoring - alerting - troubleshooting workflow, gaining more visibility into services, etc. more
Section: Crisp talk (20 mins)
Category: Monitoring and logging
|
Journey of Hotstar Infra from EC2 to containersThis talk will focus on Hotstar’s journey from EC2 to Kubernetes. The main reasons for migrating to kuberntes was the challenges and limitations we faced while scaling infrastructure of Hotstar at peaks. This talk will also cover challenges faced during migrations and performance tuning of applications on containers. more
Section: Full talk (40 mins)
Category: DevOps
|
Using DNS as a layer of defenseDNS(Domain Name System) is the crucial & ubiquitous fabric of the Internet. While we rely on accessing websites, applications, devices using a Fully Qualified Domain Name, on a daily basis, in a network, DNS can also be extremely valuable & effective defense layer in a multi-tiered security approach. This talk will give an introduction to DNS RPZ(Response Policy Zones) and how it can be leveraged… more
Section: Full talk (40 mins)
Category: Security
|
Framework For Lossless Data Compression Using PythonA lot has been done in the field of data compression, yet we don’t have a proper application for compressing daily usage files. There are appropriate and very specific tools online that provide files to be compressed and saved, but the content we use for streaming our videos, be it a Netflix video or a gaming theater play, data consumed is beyond the calculation of a user. Back-end developers kno… more
Section: Flash talk (5 mins)
Category: Others
|
Emulates Stack - Spine and Leaf for OpenStack Deployment.Hello All, The focus of this session is to provide a way in which one can utilize the power of virtualization to emulate the required pieces of hardware to build a cloud that is close to what one will be deploying in a production environment. more
Section: Full talk (40 mins)
Category: DevOps
|
Demystifying AIOpsFor years, IT has struggled to keep the lights on. Now that businesses are aggressively pursuing digital transformation, that battle is becoming even more difficult. The number of applications and services is exploding. Changes are now measured in seconds or minutes, instead of months or years. Approaches such as DevOps are driving this acceleration – but, unless IT operations can keep up, digita… more
Section: Flash talk (5 mins)
Category: DevOps
|
Technology Selection in Cloud Native EraOpen source has lead to an explosion in number of choices when it comes to technology and tooling. This abundance comes with the overhead of decision making and expecting that the decisions will be of value in future. When developing for a cloud native stack today - these choices can be mind boggling and at the same time may not solve all problems for given use case. more
Section: Birds of Feather (BOF) session
Category: DevOps
|
Building Custom Tools with Docker API & SDKAlmost everyone wants to run their application as a Docker container. While it is an unquestionably great idea, managing Docker containers running on independent servers can be challenging. more
Section: Full talk (40 mins)
Category: Automation
|
“Infrastructure as Code” (IaC) via Azure DevOps (CI Server) pipeline using Terraform (Provisioning) & Salt Stack (Configuration) toolIn today’s fast paced software development world, we need underlying Infrastructure delivery also at same paced, that provide consistency , quality delivery of infrastructure component without compromising security requirements. Today we are living in cloud computing era, were the elasticity of the cloud paradigm and disposability of cloud machines should be truly leveraged. Building production g… more
Section: Full talk (40 mins)
Category: Automation
|
Grafana Loki: like Prometheus, but for logsThere are many log aggregation systems which provide tons of features but lots of developers still SSH and grep/tail the logs on machines even today! The solutions they were using were either too pricey or complicated to run/maintain. In fact, people were being asked to log less which we think is an anti-pattern for logs. more
Section: Full talk (40 mins)
Category: Monitoring and logging
|
Scaling hotstar.com for 25 million concurrent viewersThe talk will focus on why traditional autoscaling doesn’t work for Hotstar (Disney’s OTT streaming service) who recently created a global record for live streaming to 25.3 million concurrent viewers. It will talk about challenges in scaling infrastructure for millions and how to overcome it, how we run gamedays before actual games, how we use load testing monster called Hulk to prepare for peak … more
Section: Full talk (40 mins)
Category: Others
|
Hosted by