Jan 2020
13 Mon
14 Tue
15 Wed
16 Thu
17 Fri
18 Sat 09:00 AM – 05:40 PM IST
19 Sun
Accepting submissions till 30 Nov 2019, 11:59 PM
Not accepting submissions
##We are accepting talks on the following topics:
##Types and duration of talks:
You can also suggest a topic for someone else to speak/teach a workshop. If we find a speaker/trainer for the topic you proposed, we will send you a Rootconf t-shirt.
##Participant profiles at Rootconf Delhi include:
This profile will help you to understand who will be the audience for your talk, and therefore, how you should structure you talk and takeaways.
##We don’t accept:
##Guidelines for submitting proposals for Rootconf Delhi:
Note that reviews will carried out on the proposal pages only, as comments. Proposers must check their proposals for new comments, and to respond to earlier comments.
We pay an honorarium of Rs. 3,000 to speakers. Confirmed speakers also get a pass to the conference and a discount code which they can share with their colleagues, communities they are part of, and on social media channels. We do not provide free passes for speakers’ colleagues and spouses. Please don’t ask us for this.
Travel grants are available for international and domestic speakers based on the event’s budget. If you require a grant, mention it in the field where you add your location.
##Last date for submission is 30 November, 11:59 PM
If you have queries, write to rootconf.editorial@hasgeek.com
Accepting submissions till 30 Nov 2019, 11:59 PM
Please don't do this - a conversation on bad programming practicesAs security analysts, we are often on the offensive side of things; trying to find out the universal contraints under which a system will say nothing by “Sorry” (not sponsored by Justin Beiber). However, as a software engineer, we are on the other side of Select City Walk, oftentimes confused as to how we landed there: the defence. It’s a constant battle of the fittest and the losing side loses (… more
Section: Workshop (3-6 hours duration)
Category: Others
|
Monitoring and Securing your Kubernetes Apps with IstioIstio is an open source independent service mesh which hepls us securing and monitoring our applications on a Kubernetes cluster. I will discuss the benefits of using Istio with a kubernetes deployment. more
Section: Workshop (3-6 hours duration)
Category: Monitoring and logging
|
Istio and Auth0 securing our applications on Kubernetes clusterThis session will have key takeaways and tangible lessons that participants can apply as growth levers within their own companies. We will secure the Kubernetes cluster and the applications deployed on it with Istio and Auth0. In microservices-based architecture, authentication becomes one of the crucial things to keep in mind. We learn to integrate Istio with Auth0 to secure our applications run… more
Section: Full talk (40 mins)
Category: Security
|
Load balancing: in-depth study to scale @80K TPSIntroduction to different methodologies and topologies of load balancing. more
Section: Full talk (40 mins)
Category: Others
|
Immutable infrastructure on AWS using HashiCorpHow Kayako deployed immutable infrastructure on AWS using Hashicorp’s stack more
Section: Full talk (40 mins)
Category: Others
|
Zawinski's Law for WebservicesService provision can simplified and secured through the use of email more
Section: Full talk (40 mins)
Category: Distributed systems
|
Solving Real World Problems of Running CMS on Kubernetes using OperatorsHow at SRIJAN we solved the real world problems of running CMS (Drupal) on kubernetes by writing an Operator. How can operators help in running stateful applications on kubernetes. What are the various approaches on writing operators, SRIJAN’s journey in writing an operators covering our pitfalls and learnings. A live demo of our operator which will be opensourced soon. more
Section: Full talk (40 mins)
Category: Containers
|
Architecting Scalable and resilent services in AzureThis talk foucuses on designing resilent solutions in Azure with region level reduntancy so that even if an entire region goes down our services would still remain operational. In this talk I will take the audience through the journey of building a photo sharing app which would be very resilent with region specific features etc. more
Section: Full talk (40 mins)
Category: Cloud
|
Securing your Kubernetes clusterAbstract Kubernetes is currently the most popular container orchestration engine of choice, but its security is debatable. There are some vulnerabilities that have already been discovered in Kubernetes and Docker. The question that arises is what are the potential risks of these vulnerabilities to the application/business, and how we can go about fixing these. more
Section: Full talk (40 mins)
Category: DevSecOps
|
Not everything can fit in rows and columnsWanted to use Graph Database in your next project? Dgraph made it simple and easy to get started similar to MongoDB, MySQL and etc. more
Section: Full talk (40 mins)
Category: Others
|
Meeseeks(Service-Graph)In Flipkart’s cloud environment thousands of developers keep adding new applications/features to the existing tech ecosystem which makes it ever evolving. In system like this how do you find answers for challenges like: more
Section: Crisp talk
Technical level: Intermediate
Session type: Lecture
Section: Crisp talk (20 mins)
Category: Distributed systems
Section: Full talk (40 mins)
Category: Distributed systems
|
The good, the bad and the ugly of Kubernetes - A Practitioners View!Kubernetes continues to take the world by the storm every passing day. But at the same time, it continues to be fairly complex beast to tame, manage and be beneficial to the businesses. more
Section: Full talk (40 mins)
Category: Systems engineering
|
Strongly consistent centralized Document Service with eventual consistent Search StoreOrganizations with multiple teams generally end up with different applications that manage it’s own database interactions. This approach would be fine at a smaller scale but as we move forward towards a large scale, the situation will become more error-prone. Because now each application needs to either deploy experts in each team or build expertise to make the data available, consistent and usab… more
Section: Crisp talk (20 mins)
Category: Distributed systems
|
The era of Smart ContractsBlockchain is one of the emerging technologies which is making it’s way into different sectors such as banking and health care industries. The application and adoption of Smart Contract is spreading because it aids to solving real life problems. The session will talk about the era of Smart Contracts from the time it first came into existence to the time it is being used for solving various proble… more
Section: Full talk (40 mins)
Category: Others
|
Around the cluster in 80ms : The journey of a packetHow does your packet flow in all the scary lanes of kubernetes’ abstracted layers and how to save it from getting delayed. more
Section: Crisp talk (20 mins)
Category: Network engineering
|
Merging two live data-centers into oneFreshworks products were hosted in two data centers in Europe, viz. Ireland and Frankfurt. We launched Ireland data center in 2015 and Frankfurt in 2017 due to business requirements. As soon as we launched Frankfurt, existing customers from Ireland region wanted to move to the Frankfurt. Frankfurt also has better security and data isolation policies comparatively. We could save up on infrastructu… more
Section: Full talk (40 mins)
Category: SRE
|
The Urban Myth Of Full UptimeStrategies to achieve high uptime at scale. The points this talk is going to cover are: more
Section: Full talk (40 mins)
Category: SRE
|
Evolution of Linux Containers to Container Native Storage...The focus of this session will be on the journey of the containerization technology since 1974 (The First Container) to the container native storage. How containers evolved year by year and became an invariable solution for isolating applications at the operating system level, although you can also isolate an entire operating system inside a container, if you’d like Journey of a Linux container f… more
Section: Full talk (40 mins)
Category: DevOps
|
Kubernetes 101Kubernetes is dominating the containerization space. A lot of people find it quite daunting to jump to kubernetes Bandwagon. There is a real need of instructor led workshop for people to get introduced to the world of kubernetes and containerization in general. more
Section: Workshop (3-6 hours duration)
Category: Containers
|
If you do CD on cloud, from day 1 your project is a maintenance projectGone are the days when people used to think a project has distinct phases of development and maintenance. Even agile teams have a development window during which the processes are different from the ones followed after a first release. I have observed the most successful ones were the ones which treat every project as a maintenance project from day one. This means building security, monitoring, l… more
Section: Crisp talk (20 mins)
Category: DevSecOps
|
PubSub Realtime messaging service @ HotstarThis talk covers our journey of building an MQTT based Pubsub system for 50M concurrent socket connections, the challenges faced and the architecture that powered Hotstar’s realtime social features for IPL 2019. more
Section: Full talk (40 mins)
Category: Distributed systems
|
Deployment Automation Framework @MakeMyTripAutomated deployments has always been a complex topic considering diverse nature of tech stacks and infrastructure platforms. more
Section: Full talk (40 mins)
Category: Automation
|
Real time Machine Learning Inference Platform @ ZomatoThe main problem we were facing at Zomato that it takes 1-2 month to take a ML model live. Data scientists and ML engineers work on a variety of problems at Zomato such as predicting kitchen preparation time (time taken by the restaurant to prepare the food given the live order state of the kitchen), predicting rider assignment time (time to assign a free rider to pick up the order given the real… more
Section: Full talk (40 mins)
Category: Systems engineering
|
Attack & Defense in AWS EnvironmentsAbstract: AWS is the most widely used cloud environments today and almost every security professional has to encounter this environment whether you are attacking an organization or defending it. In this fast-paced workshop, we will teach participants with some neat tools, techniques, and procedures to attack the most widely used AWS services as well as to defend them. Below is the broad agenda fo… more
Section: Workshop (3-6 hours duration)
Category: Cloud
|
Principles & Practices for Running Large Scale Kubernetes ClustersWith the world moving towards containerisation, Kubernetes has become one of the de facto. Kubernetes lets you deploy applications in ways that are highly available and resilient, and can utilize the underlying resources more efficiently. Though there are many hosted Kubernetes solutions out there in the market, nitty-gritty of running the clusters lies in the hands of infrastructure team. Some o… more
Section: Full talk (40 mins)
Category: Systems engineering
|
Your journey from VM based deployments to KubernetesWith growing traffic and user base, the request for new features also grows exponentially. It’s very crucial that the development, deployment process grows along the way to sustain. When it comes to Kubernetes and containers it may feel like overwhelming at the beginning. But the efforts worth it to invest time. more
Section: Crisp talk
Technical level: Beginner
Session type: Lecture
Section: Crisp talk (20 mins)
Category: Containers
|
Data StoresBirds of a feather session on data stores. Outline more
Section: Birds Of Feather (BOF) session
Technical level: Intermediate
Session type: Discussion
|
Vitess: Stateless Storage in the CloudWhen Vitess was migrated to run from bare-metal into Google’s cloud, it was deployed as a regular stateless application. This meant that a process reschedule resulted in all the local data being wiped. more
Section: Full talk
Technical level: Beginner
Session type: Lecture
|
GitLab CI/CD using ContainersTraditionally to implement CI/CD we pick up several tools like bitbucket or Github for source code management, Jenkins or Travis for CI , Jira for issue tracking, Nexus or Jfrog artifactory and as matured the application become the options become even more wider. As an organisation to have license or maintain these many tools is an overhead in terms of cost as well as time. more
Section: Crisp talk
Technical level: Intermediate
Session type: Demo
|
Load Balancing : in-depth study to scale @ 80K TPSIntroduction to different methodologies and topologies of load balancing. more
Section: Full talk of 40 mins duration
Technical level: Intermediate
Session type: Lecture
|
Hosted by