Proposal guidelines
We are accepting talks on the following topics:
- Security – tooling and automation
- Network engineering and security
- Monitoring, logging and alerting – running small-scale and large-scale systems
- Micro-services – including costs of micro-services and success metrics
- Case studies of shift from batch processing to stream processing
- Real-life examples of service discovery
- Optimizing infrastructure
Types and duration of talks:
- Full talks: 40 mins duration including Q&A
- Crisp talks: 20 mins duration including Q&A
- Birds of Feather (BOF) sessions of 1 hour duration
- Hands-on workshops, of 3-6 hour duration.
You can also suggest a topic for someone else to speak/teach a workshop. If we find a speaker/trainer for the topic you proposed, we will send you a Rootconf t-shirt.
Participant profile for Rootconf Pune will include:
- SRE
- Distributed systems practitioners
- Network engineers
- DevOps programmers
- Security and DevSecOps professionals
This profile will help you to understand who will be the audience for your talk, and therefore, how you should structure you talk and takeaways.
We don’t accept:
- How-to and introductory-level talks.
- Tooling talks without a clear problem statement. Instead, tell us what problems the tool solves for you, and why you advocate community members to use the tool.
- Proposals where source code is closed or where you cannot reveal code and implementation details.
Guidelines for submitting proposals for Rootconf Pune:
- Write the proposal in gender neutral language. Use the words ‘they/them’ instead of ‘he/she’.
- Explain the problem you are solving when submitting a proposal. We give weightage to novelty of problems and problem-solving approaches.
- Focus on narrowing down what the audience will learn from your talk. The best way to do this is by putting yourself in the audience’s shoes: what do you want to learn (that will make you a better practitioner) if you were in the audience listening to your own talk?
- Provide implementation details. But the implementation details – code samples, architecture approach, etc – in the context of the larger problem you are solving.
- Never lose sight of the problem!
Note that reviews will carried out on the proposal pages only, as comments. Proposers must check their proposals for new comments, and to respond to earlier comments.
Passes and honorarium for speakers:
We pay an honorarium of Rs. 3,000 to speakers. Confirmed speakers also get a pass to the conference and a discount code which they can share with their colleagues, communities they are part of, and on social media channels. We do not provide free passes for speakers’ colleagues and spouses. Please don’t ask us for this.
Travel grants for outstation speakers:
Travel grants are available for international and domestic speakers based on the event’s budget. If you require a grant, mention it in the field where you add your location.
Last date for submission is 15 August, 11:59 PM
If you have queries, write to rootconf.editorial@hasgeek.com
Submissions are closed for this project
All submissions
Cortex: Horizontally Scalable, Distributed PrometheusGoutham Veeramachaneni (@gouthamve)
Technical level: Intermediate
|
Lets talk about TLS 1.3Huzaifa Sidhpurwala (@huzaifas)
Section: Full talk
Technical level: Intermediate
Section: Full talk (40 mins)
Category: Security
|
Let us Gossip about it!!!Shrutirupa Banerjiee (@shrutirupa)
Section: Full talk of 40 mins duration
Technical level: Beginner
Section: Full talk (40 mins)
Category: Encryption
|
Building a continuous secure delivery pipelineShirish (@truthyvalue)
Technical level: Beginner
Section: Full talk (40 mins)
Category: DevSecOps
|
Abstractions of a Managed Stream Processing platform and how we provide them at scale in Flipkart.Arya Ketan (@aryaketan)
Session type: Full talk of 40 mins
Section: Full talk of 40 mins duration
Technical level: Advanced
Section: Full talk (40 mins)
Category: Distributed systems
|
Application Security Workflow Automation using Docker and KubernetesAbhisek Datta (@abhisek)
Section: Full talk
Technical level: Intermediate
Section: Full talk (40 mins)
Category: Automation
|
MUDPIPE - Malicious URL Detection for Phishing Identification and PreventionArjun BM (@arjunbm)
Section: Crisp talk
Technical level: Intermediate
Session type: Demo
|
The Art of Exfiltration : Digital SkimmingArjun BM (@arjunbm)
Section: Crisp talk (20 mins)
Category: Security
|
Running Spark on KubernetesAbhishek A Amralkar (@aamralkar)
Section: Full talk (40 mins)
Category: Distributed systems
|
Emulates Stack - Spine and Leaf for OpenStack Deployment.Nilesh Chandekar (@nileshchandekar)
Section: Full talk (40 mins)
Category: DevOps
|
eBPF: BPF kernel Infrastructuretk sourabh (@sourabhtk37)
Section: Full talk (40 mins)
Category: Network engineering
|
Lets talk about fuzzingHuzaifa Sidhpurwala (@huzaifas)
Section: Birds of Feather (BOF) session
Category: Security
|
10x faster query performance with Jaeger, Prometheus and Correlation!Goutham Veeramachaneni (@gouthamve)
Section: Full talk (40 mins)
Category: Distributed systems
|
Container network securiy and replacement of docker with podman & buildahashutoshh singh (@redashu)
Section: Full talk (40 mins)
Category: DevSecOps
|
Software/Site Reliability of Distributed SystemsPiyush Verma (@meson10)
Section: Full talk (40 mins)
Category: Distributed systems
|
Understanding and Exploiting 433Mhz Frequencies in Connected Worldveerababu (Mr-IoT) (@mriot)
Section: Full talk (40 mins)
Category: Security
|
BotKube - Real-time Kubernetes monitoring and debuggingPrasad Ghangal (@prasadg193)
Section: Crisp talk (20 mins)
Category: Monitoring and logging
|
Making people happy - a story of complianceShreyansh Pandey (@weirdpanda)
Section: Full talk (40 mins)
Category: Security
|
KubeVirt: Virtualization in Cloud-Native WorldVatsal Parekh (@vatsalparekh)
Section: Full talk (40 mins)
Category: DevOps
|
Building Custom Tools with Docker API & SDKGaurav Gahlot (@gauravgahlot)
Section: Full talk (40 mins)
Category: Automation
|
Web-based booking applicationAmit Nijhawan (@anijhawa)
Section: Workshop
Category: DevOps
|
Demystifying AIOpsJayesh Bapu Ahire (@jbahire)
Category: DevOps
Section: Flash talk (5 mins)
|
Grafana Loki: like Prometheus, but for logsSandeep Sukhani (@sandeepsukhani)
Section: Full talk (40 mins)
Category: Monitoring and logging
|
OpenQA - Life too short for Manual TestingPooja Yadav (@pooja-yadav)
Category: Automation
Section: Flash talk (5 mins)
|
“Infrastructure as Code” (IaC) via Azure DevOps (CI Server) pipeline using Terraform (Provisioning) & Salt Stack (Configuration) toolSachin Shinde (@sachinshinde)
Section: Full talk (40 mins)
Category: Automation
|
Technology Selection in Cloud Native EraVishal Biyani (@vishal-biyani)
Section: Birds of Feather (BOF) session
Category: DevOps
|
Framework For Lossless Data Compression Using PythonManas Malik (@manasmalik17)
Section: Flash talk (5 mins)
Category: Others
|
Implementing distributed tracing in FaaSBhavin Gandhi (@bhavin192)
Section: Full talk (40 mins)
Category: Monitoring and logging
|
Journey of Hotstar Infra from EC2 to containersPrakhar Joshi (@prakharj)
Section: Full talk (40 mins)
Category: DevOps
|
Using DNS as a layer of defenseSwapneel Patnekar (@pswapneel)
Section: Full talk (40 mins)
Category: Security
|
Scaling hotstar.com for 25 million concurrent viewersGaurav Kamboj (@gauravkamboj) via Zainab Bawa (@zainabbawa)
Section: Full talk (40 mins)
Category: Others
|