Submissions
Rootconf 2019

Rootconf 2019

On infrastructure security, DevOps and distributed systems.

Make a submission

Submissions are closed for this project

NIMHANS Convention Centre, Bangalore

Submission guidelines

Topics to propose talks: We are seeking talks on the following topics: Case studies of shift from batch processing to stream processing Real-life examples of service discovery Case studies on move from monolith to service-oriented architectureexpand

Topics to propose talks:

We are seeking talks on the following topics:

  1. Case studies of shift from batch processing to stream processing
  2. Real-life examples of service discovery
  3. Case studies on move from monolith to service-oriented architecture
  4. Micro-services
  5. Network security
  6. Monitoring, logging and alerting – running small-scale and large-scale systems
  7. Cloud architecture – implementations and lessons learned
  8. Optimizing infrastructure
  9. Aligning people and teams with infrastructure at scale

We do not accept:

  1. How-to and introductory-level talks. We are interested in discussing the “whys” and “approaches” rather than “how-to”.
  2. Talks that have been covered in previous editions of Rootconf. Refer to https://hasgeek.tv/rootconf/ for all talks covered between Rootconf 2012 and 2017
  3. Proposals where code used for implementation is not demonstrated. Ideas are great, but it is the implementation that matters. Don’t talks to us about fantastic ideas. Tell us real stories of implementations – patterns and anti-patterns.

Dates and venue:

Date: 21 and 22 June, 2019
Venue: NIMHANS Convention Centre, Bangalore

Note the following guidelines for sponsored talks and open submissions:

The first filter for a proposal is whether the technology or solution you are referring to is open source or not. Talks which advertise proprietary/paid solutions will be considered under sponsored talks’ category.

  1. If the technology or solution is proprietary, and you want to speak about your proprietary solution to make a pitch to the audience, you must pick up a sponsored session. This involves paying for the speaking slot and following editorial guidelines of review and pre-event rehearsals. Write to rootconf.editorial@hasgeek.com for clearing doubts on whether your talk falls under the sponsored category.
  2. If the technology or solution is in the process of being open sourced, we will consider the talk only if the solution is open sourced at least three months before the conference.
  3. If your solution is closed source, you should consider proposing a talk explaining why you built it in the first place; what options did you consider (business-wise and technology-wise) before making the decision to develop the solution; or, what is your specific use case that left you without existing options and necessitated creating the in-house solution.

Selection criteria:

The criteria for confirming talks, in the order of importance, are:

  1. Key insight or takeaway: what can you share with participants that will help them in their work and in thinking about the problem be it network security, cloud architecture or microservices?
  2. Structure of the talk and flow of content: a detailed outline – either as mind-map or draft slides or textual description – will help us understand the focus of the talk, and the clarity of your thought process.
  3. Ability to communicate succinctly, and how you engage with the audience. You must submit link to a two-minute preview video explaining what your talk is about, and what is the key takeaway for the audience.

No one submits the perfect proposal in the first instance. We therefore encourage you to:

  1. Submit your proposal early so that we have more time to iterate if the proposal has potential.
  2. Write to rootconf.editorial@hasgeek.com if you have questions about how to submit a talk.

Our editorial team helps potential speakers in honing their speaking skills, fine tuning and rehearsing content at least twice - before the main conference - and sharpening the focus of talks.

We only accept one speaker per talk. This is non-negotiable. Workshops can have more than one instructor.

How to submit a proposal (and increase your chances of getting selected):

The following pointers will help you in submitting a proposal:

  1. Focus on why, not how. Explain to participants why you made a business or engineering decision, or why you chose a particular approach to solving your problem.
  2. The journey is more important than the solution you may want to explain. We are interested in the journey, not the outcome alone. Share as much detail as possible about how you solved the problem. Glossing over details does not help participants grasp real insights.
  3. We do not accept how-to talks unless they demonstrate latest technology. If you are demonstrating new tech, show enough to motivate participants to explore the technology later.
  4. Similarly, we don’t accept talks on topics that have already been covered in the previous editions. If you are unsure about whether your proposal falls in this category, drop an email to: rootconf.editorial@hasgeek.com
  5. Content that can be read off the internet does not interest us. Our participants are keen to listen to use cases and experience stories that will help them in their practice.

To summarize, we do not accept talks that gloss over details or try to deliver high-level knowledge without covering depth. Talks have to be backed with real insights and experiences for the content to be useful to participants.

Passes and honorarium for speakers:

We pay an honorarium of Rs. 3,000 to each speaker and workshop instructor at the end of their talk/workshop. Confirmed speakers and instructors also get a pass to the conference and a discount code which they can share with their colleagues, communities they are part of, and on social media channels. We do not provide free passes for speakers’ colleagues and spouses. Please do not ask us for this.

Travel grants for outstation speakers:

Travel grants are available for international and domestic speakers. We evaluate each case on its merits, giving preference to women, people of non-binary gender, and Africans.
If you require a grant, request it when you submit your proposal in the field where you add your location. Rootconf is funded through ticket purchases and sponsorships; travel grant budgets vary.

Last date for submitting proposals is 5 March 2019:

You must submit the following details along with your proposal, or within 10 days of submission:

  1. Draft slides, mind map or a textual description detailing the structure and content of your talk.
  2. Link to a self-recorded, two-minute preview video, where you explain what your talk is about, and the key takeaways for participants. This preview video helps conference editors understand the lucidity of your thoughts and how invested you are in presenting insights beyond the solution you have built, or your use case. Please note that the preview video should be submitted irrespective of whether you have spoken at past editions of Rootconf.
  3. If you submit a workshop proposal, you must specify the target audience for your workshop; duration; number of participants you can accommodate; pre-requisites for the workshop; link to GitHub repositories and a document showing the full workshop plan.
Make a submission

Submissions are closed for this project

Submissions

Piyush Verma

Software/Site Reliability of Distributed Systems

Every product either dies a hero or lives long enough to hit Reliability issues. Whether it’s your code or a service that you connect to, there will be a disk that will fail, a network that will expe…more
  • 0 comments
  • Confirmed & scheduled
  • Sun, 05 May
Section: Full talk Technical level: Intermediate Session type: Lecture
JV

Jiten Vaidya

OLTP or OLAP? Why not both?

vitess.io is an open source sharding middleware system that runs massive OLTP workloads at companies susch as Youtube, Slack and Square. Vitess recently added support for cross-shard materialized vie…more
  • 1 comments
  • Confirmed & scheduled
  • Mon, 06 May
Section: Full talk Technical level: Intermediate Session type: Demo
SM

Sudheer Kumar Meesala

Decomposing a Monolith: Engineering and Operational strategies we have gleaned from our experience at Endurance

Microservices are all the rage nowadays. But what are the practical problems of building a large application using such an architecture? Even more important, how do you change a business critical leg…more
  • 8 comments
  • Confirmed & scheduled
  • Mon, 06 May
Section: Full talk Technical level: Intermediate Session type: Lecture Section: Sponsored talk Technical level: Intermediate
Anand Venkatanarayanan (@anandvenkatanarayanan) (proposing)

How do you keep your secrets and how much does it cost?

Overview We all keep secrets and also know that there are inherent costs in doing so. In the social realm, the cost is betrayal and we try to offset it by entrusting our secrets to only those whom we…more
  • 0 comments
  • Confirmed & scheduled
  • Thu, 06 Jun
Section: Birds Of Feather (BOF) session Technical level: Advanced Session type: Discussion Section: Birds Of Feather (BOF) Session Technical level: Advanced
AM

Andrew Murphy

Human Centered Leadership - Emotional Intelligence for the Technical Mind

There’s a huge problem in our industry, I call it “inertia-driven leadership”.more
  • 0 comments
  • Rejected
  • Sun, 06 Jan
Section: Full talk of 40 mins duration Technical level: Intermediate
JN

Jaskaran Singh Narula

Securing Infrastructure with OpenScap: The Automation Way !!

Security Content Automation Protocol (SCAP) which is a collection of standards managed by National Institute of Standards and Technology (NIST). It was created to provide a standardized approach to m…more
  • 3 comments
  • Confirmed & scheduled
  • Fri, 21 Dec
Section: Full talk of 40 mins duration Technical level: Beginner
SD

Samit Das

Disruptions in Architecture construct

Application evolution & Architectural construct changes How Digital brings in disruption levers in Architecture Cloud Native Architecture paradigms How to win the gamemore
  • 1 comments
  • Rejected
  • Fri, 02 Nov
Section: Full talk of 40 mins duration Technical level: Advanced
AM

Andrew Murphy

Communicating anything to anyone. How to communicate effectively and efficiently

Everyone thinks they are a good at communication, but… how many times have you been at an event talking to someone you really didn’t want to talk to? Been sold to by someone who didn’t get that you w…more
  • 0 comments
  • Rejected
  • Sun, 06 Jan
Section: Workshop Technical level: Intermediate
AM

Andrew Murphy

The power of saying "I don't know"

It’s something we all struggle with, admitting we don’t know something. But I’m here to show you the power of saying “I don’t know” to people.more
  • 0 comments
  • Rejected
  • Sun, 06 Jan
Section: Crisp talk of 20 mins duration Technical level: Intermediate
AP

Aravind Putrevu

Building Distributed Systems in Distributed Teams

Building distributed systems is notoriously hard… building a distributed team, even more so. At Elastic, the company behind the open source tools Elasticsearch, Kibana, Beats, and Logstash, everythin…more
  • 4 comments
  • Waitlisted
  • Tue, 16 Oct
Technical level: Beginner
RS

Ravi Suhag

Olympus: Terraforming repeatable and extensible infrastructure at GO-JEK

From where we started, GO-JEK has grown to be a community of more than one million drivers with 3 Million+ orders every day in almost no time. To keep supporting this growth, hundreds of microservice…more
  • 1 comments
  • Waitlisted
  • Sat, 02 Feb
Section: Full talk of 40 mins duration Technical level: Intermediate
GG

Guruprasad GV

Patterns for designing stateful microservices at scale

Age old wisdom says - “make your services stateless”. There is a lot of merit in that. While we strive to make our services stateless, have you considered the cost you are paying for this. In this se…more
  • 4 comments
  • Rejected
  • Sun, 13 Jan
Section: Crisp talk of 20 mins duration Technical level: Intermediate
KA

Kishore Avineni

Building a cricket score fanout system that scales

Want to build an alternative to the popular cricket score websites out there? While building a feature on Teenpatti Gold which involved Cricket scores [in a more time critical scenario], we had the s…more
  • 1 comments
  • Rejected
  • Wed, 16 Jan
Section: Full talk of 40 mins duration Technical level: Intermediate
GT

Gaurav Tayal

MongoDB WiredTiger or Not

Introduction: MongoDB has made wiredtiger its default storage engine from mongo version3.0 and from version 4.0 it has depricated MMAPv1 storage engine. This talk is to walk through our journey of up…more
  • 1 comments
  • Rejected
  • Wed, 16 Jan
Section: Crisp talk of 20 mins duration Technical level: Intermediate
SM

Sumit Murari

Iptables magic in sidecar istio

Istio does iptables magic in sidecars, so that all traffic comes and goes through sidecar i.e. envoy. We will see how does it do that, how it uses our omnipresent iptables rules to achieve it.more
  • 0 comments
  • Rejected
  • Tue, 12 Feb
Section: Crisp talk of 20 mins duration Technical level: Intermediate

Hashfyre

Cloud Native Persistent Observability with Thanos

Observability for cloud-native workloads with Prometheus is the de-facto standard now. The next challenge in the space are high-availability, data de-duplication, data persistence and centrally monit…more
  • 2 comments
  • Rejected
  • Wed, 13 Feb
Section: Full talk of 40 mins duration Technical level: Intermediate
rb

rahul bajaj

Metal as a Service: Foreman Discovery

When we talk about the cloud, we usually hear of Paas, Saas, and Iaas. This talk introduces Maas i.e Metal as a Service to the audience. Foreman is an open source project that helps system administra…more
  • 2 comments
  • Rejected
  • Mon, 11 Feb
Section: Full talk of 40 mins duration Technical level: Beginner
SM

Sumit Murari

Istio internals: Envoy

Istio does many things magically for us like traffic routing,loadbalancing but behind the scene. The sidecar i.e. envoy does whole lot of magic, we will see how envoy moves traffic around the mesh. F…more
  • 1 comments
  • Rejected
  • Tue, 12 Feb
Section: Full talk of 40 mins duration Technical level: Intermediate
MV

Meghashyam Varanasi

DevOps and Continuous Security on AWS

DevOps and Continuous Security on AWS Organizations across the globe are embracing DevOps to deliver quality products at speed and reduced cost. To accelerate the adoption, Organizations are relying …more
  • 2 comments
  • Rejected
  • Wed, 23 Jan
Section: Full talk of 40 mins duration Technical level: Intermediate
rb

rahul bajaj

Automating compliance with Foreman: The Lifecycle management tool

Systems left with unpatched vulnerabilities can have a number of consequences. Security compliance is a state where computer systems are scrutinized against certain defined security policy. OpenSCAP …more
  • 2 comments
  • Rejected
  • Mon, 11 Feb
Section: Full talk of 40 mins duration Technical level: Intermediate
VJ

Venkatraman J

Case Study: Transitioning from Batch processing to Event streaming architecture to enable Real time Streaming analytics

Batch processing and Stream processing are two different patterns of solving problems in analytics space. Analytics has transitioned from traditional batch oriented to real time stream oriented with …more
  • 2 comments
  • Rejected
  • Wed, 16 Jan
Section: Full talk of 40 mins duration Technical level: Intermediate
US

Utpal Sen

Scaling DevOps - A Practical Guide

In today’s world of digital disruption DevOps adoption is a necessity. This session tries to give an outline of methodology, processes and tools that can help fast track adoption based on a real proj…more
  • 3 comments
  • Rejected
  • Mon, 25 Mar
Technical level: Advanced
NP

Neeraj Prem

How we brought down costs by 60% without any code change.

Think about systems performing better, but in cheaper cost than usual.more
  • 5 comments
  • Waitlisted
  • Tue, 15 Jan
Section: Crisp talk of 20 mins duration Technical level: Intermediate
PV

Pulkit Vaishnav

SSH Certificates: A way to scale SSH access

We all face problems in providing SSH access to the developers, it could be managing public keys of developers, updating authorized_keys file at servers and providing read-only (or full access) to li…more
  • 0 comments
  • Confirmed & scheduled
  • Sun, 17 Feb
Section: Crisp talk of 20 mins duration Technical level: Intermediate
AA

Abhishek A Amralkar

Monitoring Distributed Systems with Riemann

Monitoring modern real time distributed infrastructure is complex and expensive. In this talk we explore Riemann, specifically, how Riemann low latency helped us to get real time metrics from our Dis…more
  • 4 comments
  • Rejected
  • Wed, 26 Dec
Section: Full talk of 40 mins duration Technical level: Intermediate
LK

Lavakumar Kuppan

Deploying and Managing CSP - the Browser-side Firewall

Data exfiltration attacks like Magecart have targeted a low-hanging fruit in the industry and have allowed attackers to steal millions of user’s credit card data. Existing security systems fail to pr…more
  • 0 comments
  • Confirmed & scheduled
  • Wed, 13 Mar
Technical level: Intermediate
RD

Ratnadeep Debnath

Scale MySQL beyond limits with ProxySQL

At Zapier, we connect over 1000 SaaS applications and enable people to automate their workflows spanning across multiple web applications. This involves intensive database operations. We use RDS MySQ…more
  • 0 comments
  • Confirmed & scheduled
  • Fri, 08 Mar
Technical level: Intermediate
A(

Abhay Rana (Nemo)

Learnings from running my Home Server (and why you should run one too)

I did my own PC build in September 2017, and have been running it as a personal home server ever since. If you work in infrastructure, running a homeserver is a great way to help yourselves learn new…more
  • 2 comments
  • Confirmed & scheduled
  • Tue, 15 Jan
Section: Full talk of 40 mins duration Technical level: Intermediate

Bernd Erk

How convenience Is Killing open standards

All the technical freedom and diversity we enjoy in our industry is the result of internal, grass root evangelism. Over the last couple of decades, thought leaders have strongly opposed manufacturer-…more
  • 2 comments
  • Confirmed & scheduled
  • Tue, 15 Jan
Section: Full talk of 40 mins duration Technical level: Intermediate
OK

Omprakash Kasaraboina

Code Coverage Based Verification (CCBV)

Quality Assurance is Verification & Validation. Verification – Are we building the product right? Validation – Are we building the right product? With Agile principle in place, when we release a Mini…more
  • 4 comments
  • Confirmed & scheduled
  • Thu, 07 Feb
Section: Birds Of Feather (BOF) Session Technical level: Intermediate
DD

Denis Dsouza

Log Analytics with ELK stack (Architecture for aggressive cost optimization and infinite data scale)

Should you build your own log analytics platform or buy one of the many many services out there? Well, we evaluated, compared and decided to build a self managed ELK stack because none of them fit ou…more
  • 7 comments
  • Confirmed & scheduled
  • Sun, 13 Jan
Technical level: Beginner Section: Full talk of 40 mins duration
SJ

Shivji Kumar Jha

Central Metadata Catalogue - understanding data in your pipelines and data stores the self serve way

The data ecosystem has come along way in last decade. The ride from structured to unstructured data, in a bid to support the 3Vs (volume, variety and velocity) of big data, has been quick. While its …more
  • 1 comments
  • Rejected
  • Wed, 27 Mar
Section: Full talk of 40 mins duration Technical level: Intermediate
AS

Aditya Sood

Continuous Delivery of Microservices

This talk is about the best practices to be followed for continuous delivery of a microservices based application.more
  • 3 comments
  • Rejected
  • Thu, 28 Feb
Section: Full talk of 40 mins duration Technical level: Intermediate
AM

Akshay Mathur

Considerations for East-West Traffic Security and Analytics for Kubernetes Environment

Organizations are moving towards microservice-based architectures across public and private cloud, as well as data centres. As traditional tools are not suitable in containerized environment, there i…more
  • 1 comments
  • Waitlisted
  • Wed, 27 Feb
Section: Full talk of 40 mins duration Technical level: Intermediate

chaitra acharya

Lessons from the Migration of Windows and Microsoft based Applications (“Lift and Shift” approach from on premise to AWS)

I will be talking mainly on why the decision of moving to AWS was made, what were the key learnings from the migration, scope and effect of the project, key challenges we faced throughout and few app…more
  • 2 comments
  • Waitlisted
  • Sun, 17 Feb
Section: Full talk of 40 mins duration Technical level: Beginner
LS

Lakshminarasimhan Sudarshan

Patterns for solving distributed systems problems in our applications

Modern applications increasingly tend to be full on distributed systems and consequently suffer from all the challenges of working with distributed systems. This talk is based on practical project ex…more
  • 1 comments
  • Rejected
  • Sun, 17 Feb
Section: Full talk of 40 mins duration Technical level: Intermediate
FS

Fatima Shaikh

Eclipse Che and installing it on OpenShift!

This session will mainly focus on what is Eclipse Che, how it works and it’s demo installation on openshift.more
  • 2 comments
  • Rejected
  • Sat, 23 Feb
Section: Full talk of 40 mins duration Technical level: Beginner
SK

Shakthi Kannan

Shooting the trouble down to the Wireshark Lua plugin

Wireshark is a Free (Libre) and Open Source protocol analyzer used for troubleshooting networks, and analysis of communication protocols. The Lua programming language support has been included in Wir…more
  • 2 comments
  • Confirmed & scheduled
  • Wed, 27 Feb
Technical level: Intermediate Section: Workshop
FS

Fatima Shaikh

Building and Deploying applications on OpenShift

This session will highlight the building of applications and deploying them on OpenShift Container Platform.more
  • 5 comments
  • Rejected
  • Thu, 28 Feb
Section: Full talk of 40 mins duration Technical level: Beginner
DG

DEEPAK GOYAL

Kafka Streams at Scale

http://Walmart.com generates millions of events per second. At WalmartLabs, I’m working in a team called the Customer Backbone (CBB), where we wanted to build a platform capable of processing this ev…more
  • 1 comments
  • Confirmed & scheduled
  • Tue, 05 Mar
Section: Full talk of 40 mins duration Technical level: Advanced
AN

Amit Nijhawan

Automated debugging with git

I would like to present a topic on Automated debugging with it. I will explain about high-level command git bisect allows you to automatically run a specified test procedure, while it’s crawling thro…more
  • 4 comments
  • Rejected
  • Thu, 21 Feb
Section: Crisp talk of 20 mins duration Technical level: Intermediate
AN

Amit Nijhawan

Introducing Hive-Kafka Integration for Real-Time Kafka SQL Queries

I will explain the SQL access pattern for Kafka and how to get it tp work with the new Kafka Hive Integration. Stream processing engines/libraries like Kafka Streams provide a programmatic stream pro…more
  • 7 comments
  • Rejected
  • Mon, 25 Feb
Section: Crisp talk of 20 mins duration Technical level: Intermediate
KD

Kushal Das

Building reproducible Python applications for secured environments

We all have to package Python based applications for various environments, starting from command line tools, to web applications. And depending on the users, it can be installed on thousands on compu…more
  • 0 comments
  • Confirmed & scheduled
  • Thu, 14 Mar
Technical level: Intermediate
TG

Trishna Guha

Network Automation with Ansible

Ansible is an open source automation tool that gives your team the ability to automate deploying apps, managing systems, crushing complexities. It automates the technologies that you already use and …more
  • 2 comments
  • Confirmed & scheduled
  • Tue, 05 Mar
Technical level: Intermediate Section: Full talk Session type: Demo Section: Full talk of 40 mins duration Technical level: Intermediate
SD

Suraj Deshmukh

Using Pod Security Policies to harden your Kubernetes cluster

In a multi-tenant Kubernetes cluster there is a high probability that a malicious user can break out of the pods and snoop over the traffic on the network or read secrets of other users mounted on th…more
  • 2 comments
  • Confirmed & scheduled
  • Sun, 17 Mar
Technical level: Intermediate Section: Full talk of 40 mins duration
KC

Kishore N C

Running A Highly Available RabbitMQ Cluster

At Zapier, we connect over 1000 SaaS applications and enable people to automate their workflows spanning across multiple web applications. To achieve that, we use RabbitMQ to run millions of tasks ev…more
  • 3 comments
  • Rejected
  • Sat, 09 Mar
Technical level: Intermediate
AK

Amit Karsale

Ansible meets Foreman

Foreman is a free open source project that gives you the power to easily automate repetitive tasks, quickly deploy applications, and proactively manage your servers lifecyle, on-premises or in the cl…more
  • 3 comments
  • Rejected
  • Fri, 01 Mar
Section: Crisp talk of 20 mins duration Technical level: Beginner
JM

Jatan Malde

Elasticsearch, Fluentd and kibana - Openshift stack for hybrid cloud

The presentation includes the working of elasticsearch,fluentd and kibana as container on the openshift platform. With the incoming of Openshift 4 it is much simpler to view the logs of the container…more
  • 4 comments
  • Rejected
  • Sun, 24 Feb
Section: Full talk of 40 mins duration Technical level: Intermediate
DH

Dushyanth Harinath

Infra-Ops Agility

Lot has changed in the last 20 yrs. We have evolved from handcrafted server deployments to managing tens of thousands of devices programmatically, from monolithic architectures to distributed async-m…more
  • 2 comments
  • Rejected
  • Tue, 26 Mar
Section: Full talk of 40 mins duration Technical level: Intermediate
SJ

Shivji Kumar Jha

Schema Registry and how the encoding/decoding actually works under the hood!

The data ecosystem has come along way in last decade. The ride from structured to unstructured data has been quick. And kafka (more genrally the streaming ecosystem) has been at the forefront of that…more
  • 2 comments
  • Rejected
  • Wed, 27 Mar
Technical level: Intermediate
SC

Sayan Chowdhury

Why not containerize your desktop

Fedora Silverblue is an immutable desktop operating system. Aiming at good support for container-focused workflows, this variant of Fedora Workstation targets developer communities.Fedora Silverblue …more
  • 1 comments
  • Rejected
  • Wed, 27 Mar
Technical level: Intermediate
AV

Aravind G V

Audit Mitigate Compromised containers in Docker and Kubernetes

In this workshop,I will take a look at the best tools out there to help you secure your Docker environments and make sure no bad actors get into your container.Container security is still tricky, so …more
  • 1 comments
  • Under evaluation
  • Wed, 27 Mar
Technical level: Intermediate
BM

Brian McKenna

Functional programming and Nix for reproducible, immutable infrastructure

The Atlassian Marketplace team in Bengaluru uses functional programming at the application level and infrastructure level. Each service which makes up Atlassian Marketplace uses Nix, a purely functio…more
  • 0 comments
  • Confirmed & scheduled
  • Sun, 31 Mar
Section: Sponsored talk Technical level: Intermediate
SA

Srujan A

Art and science of choices in engineering

What’re the factors to consider when we make an engineering choice in tools/infra and how to evaluate the cost vs benefit of it.more
  • 1 comments
  • Confirmed
  • Mon, 01 Apr
Section: Birds Of Feather (BOF) Session Technical level: Intermediate
AB

Anurag Bhatia

Let’s talk about routing security

This talk covers how (in)secure in the routing at the global scale, covers about IRR in detail. Includes examples, tools and challenges with IRR based BGP filtering. It also gives a brief introductio…more
  • 0 comments
  • Confirmed & scheduled
  • Tue, 09 Apr
Technical level: Intermediate Section: Full talk of 40 mins duration
NC

Nilesh Chandekar

Emulated_Stack -

The focus of this session is to provide a way in which one can utilize the power of virtualization to emulate the required pieces of hardware to build a cloud that is close to what one will be deploy…more
  • 2 comments
  • Rejected
  • Thu, 21 Feb
Section: Full talk of 40 mins duration Technical level: Beginner
SC

Sayan Chowdhury

Security Paranoid OS

In the wake of one data breach after another, and in this age of surveillance, security has become serious business. The trust on the big giants like Facebook, Google, etc has diminished over the yea…more
  • 0 comments
  • Confirmed & scheduled
  • Thu, 11 Apr
Technical level: Beginner
NT

Neelu Tripathy

DevSecOps

DevSecOps is becoming increasingly relevant with changing requirements and rapid product development becoming the norm. Through this Birds of Feather session we plan to discover various approaches of…more
  • 1 comments
  • Confirmed & scheduled
  • Mon, 18 Mar
Technical level: Intermediate Section: Birds Of Feather (BOF) Session
DK

Dinesh Kumar

A Beast to Process Kafka Events

Building an event processing library comes with own baggage. No Data loss takes highest priority, then comes Performance and Scalability. Scaling the tool for millions of messages/minute with archite…more
  • 4 comments
  • Waitlisted
  • Thu, 21 Mar

vivek sridhar

Virtual Nodes to auto-scale applications on Kubernetes

Lets discuss about how to use custom metrics in combination with the Kubernetes Horizontal Pod Autoscaler(HPA) to autoscale an application. Virtual nodes (virtual-kubelet) let you scale quickly and e…more
  • 1 comments
  • Confirmed & scheduled
  • Mon, 08 Apr
Technical level: Advanced
AB

Arnav Bhati

Microservices using Spring Boot - the new architecture for developers

Microservices is Service Oriented Architectural (SOA) style of constructing aggregation of many small loosely coupled services independent of each other.more
  • 3 comments
  • Under evaluation
  • Wed, 20 Feb
Section: Workshop Technical level: Beginner
RD

Ratnadeep Debnath

Building a 100% remote team

Working remotely and running a remote & distributed team seem like black magic to many, however, many companies across the globe, e.g., Zapier, Gitlab, Elastic, etc. have already started working remo…more
  • 2 comments
  • Confirmed & scheduled
  • Sat, 09 Mar
Technical level: Intermediate Section: Birds Of Feather (BOF) Session Session type: Discussion
C

Chandrapal

OSINT mindset to protect your organization

Information on the public internet is increasing exponentially. The public information about your organization includes employees, email addresses, public facing digital assets (domains, subdomains &…more
  • 0 comments
  • Waitlisted
  • Sun, 21 Apr
Technical level: Intermediate
RB

Regunath Balasubramanian

Data handling patterns for diverse needs of Consistency, Scale, Low Latency and Analytics Injestion

Large internet companies have rich data, gathered from user interactions and transactions. The user transactions are often served by custom built data stores and solutions targeting needs of Consiste…more
  • 3 comments
  • Rejected
  • Fri, 05 Apr
ts

tk sourabh

eBPF: BPF kernel Infrastructure

eBPF is an upcoming in-kernel mechanism that provides ability inject arbitrary user space code into the kernel in a safe manner.more
  • 5 comments
  • Confirmed & scheduled
  • Mon, 01 Apr
Section: Full talk of 40 mins duration Technical level: Intermediate
uk

udit kumar

Scalable dist-sys from grounds up in Elixir

Elixir comes bundled with battle tested primitives to build highly concurrent, event-driven, distributed systems. These primitives can be composed like Lego blocks to build all manner of system archi…more
  • 10 comments
  • Confirmed & scheduled
  • Sat, 20 Apr
Section: Full talk Technical level: Intermediate Session type: Lecture
GS

Gaurav Sharma

Meeseeks(Service-Graph)

In Flipkart’s cloud environment thousands of developers keep adding new applications/features to the existing tech ecosystem which makes it ever evolving. In system like this how do you find answers …more
  • 5 comments
  • Submitted
  • Tue, 09 Apr
Section: Full talk of 40 mins duration Technical level: Intermediate
AT

Aaditya Talwai

Virtuous Cycles: Enabling SRE via automated feedback loops

Automating common operational procedures - like increasing capacity, expiring data, or evening out load on a system - is the bread-and-butter of many SRE teams. Operator nirvana is having apps that c…more
  • 4 comments
  • Confirmed & scheduled
  • Thu, 30 May
Section: Full talk Technical level: Intermediate Session type: Lecture Section: Full talk of 40 mins duration Technical level: Intermediate

Anant Shrivastava

Bug Bounties for organizations

This BOF session will be in continuation of the talk by Shadab. The main agenda behind the session is to bring out a discussion and help organizations get started with the bug bounties. Bug bounties …more
  • 0 comments
  • Confirmed & scheduled
  • Tue, 11 Jun
Section: Birds Of Feather (BOF) session Technical level: Intermediate Session type: Discussion
SS

Shadab Siddiqui

Devil lies in the details: running a successful bug bounty programme in your organization

The aim is to help everyone understand the two side of bug bounty or vulnerability research program. Everyone would get a walkthrough on though how glamourous one side for a bug bounty hunter is with…more
  • 2 comments
  • Confirmed & scheduled
  • Thu, 06 Jun
Section: Full talk Technical level: Beginner Session type: Lecture Section: Full talk of 40 mins duration Technical level: Beginner
TS

Talina Shrotriya

SRE: Culture & Strategy

The work of a Site Reliability Engineer is either misconstrued or portrayed less frequently in the tech community. Most of the SRE stories get lost in daily on-call schedules. This talk opens up a go…more
  • 3 comments
  • Confirmed & scheduled
  • Fri, 31 May
Section: Crisp talk Technical level: Intermediate Session type: Lecture Technical level: Intermediate Section: Crisp talk of 20 mins duration
Akshat Goyal (@aksg) (proposing)

SRE Approach to Supporting Products as a PaaS Internally

Open discussion on solving the challenge of building common SRE principles and tools to support multi dozen uniquely configured product environments. We’ll discussion about implementing correlation a…more
  • 0 comments
  • Confirmed & scheduled
  • Wed, 12 Jun
Section: Birds Of Feather (BOF) session Technical level: Intermediate Session type: Discussion Section: Birds Of Feather (BOF) Session Technical level: Intermediate

Karan Saini

Defensive and Offensive Applications of Open Source Intelligence

In real life, a footprint can be used to distinguish and confirm the identity of an individual. The same is true on the Internet, where activities and transactions that have been carried out leave be…more
  • 0 comments
  • Confirmed & scheduled
  • Fri, 07 Jun
Section: Birds Of Feather (BOF) session Technical level: Intermediate Session type: Discussion Section: Birds Of Feather (BOF) Session Technical level: Intermediate
AB

Anurag Bhatia

Automate your IX’s RS Config

This talk covers automating route server config at an Internet Exchange. It shares experiences of adding two feature - the IRR based filtering as well as BGP communities support at Bharat IX in Mumba…more
  • 0 comments
  • Confirmed & scheduled
  • Thu, 13 Jun
Section: Full talk Technical level: Beginner Session type: Lecture
HD

Himanshu Kumar Das

Implementing security from day 1 at a fintech startup

In this presentation we want to showcase how we simplified, prioritized and implemented security from day 1 to a product idea going to production at CRED.more
  • 2 comments
  • Confirmed & scheduled
  • Thu, 06 Jun
Section: Full talk Technical level: Intermediate Session type: Lecture
KD

Kushal Das

Onion Services for devops

The Tor network is a group of volunteer-operated servers that allows people to improve their privacy and security on the Internet. Tor’s users employ this network by connecting through a series of vi…more
  • 0 comments
  • Confirmed & scheduled
  • Sat, 08 Jun
Section: Workshop Technical level: Intermediate Session type: Workshop
SM

Shubham Mittal

OSINT for Proactive Defense

In today’s age, when every organization has an online presence in multiple shape (eg. social media, code repositories, cloud infrastructure, etc.), it’s difficult to keep a track of the assets as wel…more
  • 0 comments
  • Confirmed & scheduled
  • Sun, 09 Jun
Section: Full talk Technical level: Intermediate Session type: Lecture
TR

Tasdik Rahman

Kingsly - The Cert Manager

Problem Statement Manage SSL/TLS certificate lifecycle for various backends which would include but not limited to - IPSec VPNs - HAProxy/envoy proxymore
  • 1 comments
  • Submitted
  • Sat, 08 Jun
Section: Crisp talk Technical level: Beginner Session type: Lecture
ØG

Øystein Grøvlen

POLARDB - A database architecture for the cloud

In this session, we will give a introduction of PolarDB, which is a a cloud native database available on Alicloud. PolarDB separates the computing layer from a shared storage layer. This design allow…more
  • 0 comments
  • Confirmed & scheduled
  • Mon, 10 Jun
Section: Full talk Technical level: Intermediate Session type: Lecture Section: Full talk of 40 mins duration Technical level: Intermediate
NK

Neependra Khare

Birds of Feather (BOF) session: On taking your home brew projects to graduate into CNCF projects

Cloud Native Computing Foundation (CNCF) serves as the vendor-neutral home for many of the fastest-growing projects on GitHub, including Kubernetes, Prometheus and Envoy, fostering collaboration betw…more
  • 0 comments
  • Confirmed & scheduled
  • Thu, 20 Jun
Section: Birds Of Feather (BOF) session Technical level: Beginner Session type: Discussion
OV

OMPRAGASH VISWANATHAN

What are the benefits of using Ansible Automation?

To stay competitive in the challenging IT market, everone need a tool for enterprise-wide IT and network automation. Ansible’s simple automation framework gives teams the power to deploy multi-tier a…more
  • 1 comments
  • Confirmed & scheduled
  • Wed, 19 Jun
Section: Birds Of Feather (BOF) session Technical level: Intermediate Session type: Discussion
Make a submission

Submissions are closed for this project

NIMHANS Convention Centre, Bangalore

Hosted by

Rootconf is a forum for discussions about DevOps, infrastructure management, IT operations, systems engineering, SRE and security (from infrastructure defence perspective).more