Nov 2024
18 Mon
19 Tue
20 Wed
21 Thu
22 Fri 09:00 AM – 05:15 PM IST
23 Sat 09:00 AM – 06:15 PM IST
24 Sun
Accepting submissions till 30 Oct 2024, 11:59 PM
Not accepting submissions
We appreciate that many participants create submissions out of a genuine desire to share knowledge with our community, and to contribute in a meaningful way. However, many written submissions fail to capture the attention of the community, or meet acceptance through Rootconf’s peer review process. More often than not this is because the content of the submission does not explain what they intend with sufficient clarity or detail.
The template (and example) is an attempt to help you write a better submission, one that is noticed and understood by your intended audience and not lost in the crowd of interesting proposals we receive. Please use this template as a guideline, while ensuring that it is in your own unique and authentic voice.
BEFORE you begin writing your submission, please give some thought to the following:
The most successful talks and sessions are those where presenters are able to abstract an actionable insight from a common pain area, enlighten the audience about something new, provide a fresh perspective, and/or demonstrate innovation.
Here’s a guide for speakers to draft their presentations.
You can view talks held at previous editions of Rootconf 2024 for reference:
The call for submissions will be close on 30 October 2024. Talks will be selected on a rolling basis as submissions are made.
A. Systems engineering:
B. Security engineering:
You can submit a session for:
Accepting submissions till 30 Oct 2024, 11:59 PM
Moving your Databases to Kubernetes - Flipkart's DBaaS journey.Abstract When most companies talk about Kubernetes adoption, they talk about the stateless aspect. However most of them shy away from Kubernetes when it comes to the stateful part. In this talk we will explore why Flipkart chose to move to stateful K8s for databases, the challenges we faced in this journey and the road ahead. more
Submission type: 40 min talk
Track in which your submission fits: Systems engineering
|
Rebuilding Tecton's Realtime Compute stack (twice)Overview: This tech talk proposes to dive into the evolution of Tecton’s real-time compute stack, a journey that started with sidecar processes, moved through serverless architecture, and ultimately matured into a native service deployed on virtual machines (VMs). The session will (hopefully) outline the challenges, lessons learned, and engineering decisions made at each stage. more
Submission type: 40 min talk
Track in which your submission fits: Systems engineering
|
Changing DevOps landscape in FinOps world.Cloud computing benefits organizations in many ways. The benefits are so numerous that it makes it almost impossible not to consider moving business operations to a cloud-based platform. Easier said than done, multiple organizations get trapped in the pricing model – “Pay as you go”, and this not well understood, has resulted in wastages. As per Finops surveys, the key priorities for 2024 are as … more
Submission type: 40 min talk
Track in which your submission fits: Systems engineering
|
Cricket Match from a Devops LensTsunami Traffic, Traffic Avalanche, Hockey Stick Curve are some of the common terms laid out as the benchmark for developing systems at scale. As the first hire for the Jiocinema Devops team @ Viacom18 I got the opportunity to work on breaking these benchmarks while maintaining our Infrastructure on a cluster of Kubernetes clusters ;) more
Submission type: 40 min talk
Track in which your submission fits: Systems engineering
|
Lessons from Optimizing Cloud Costs and Improving System Performance to deliver 9M+ Radiology ReportsIntroduction 5C Network is a leading AI-powered platform in the healthcare space, specializing in radiology and medical imaging. We manage and process large volumes of medical data, including over 1 billion DICOM objects, providing critical diagnostic services across India. Our focus on leveraging cutting-edge cloud and AI technologies allows us to deliver high-quality, cost-effective healthcare … more
Submission type: 40 min talk
Track in which your submission fits: Systems engineering
|
Agentic AI Security - An idea whose time has come !!I intend to deep-dive the security landscape of AI agents. Not many have ventured in to this space. This talk will be niche, original & cutting-edge. more
Submission type: 40 min talk
Track in which your submission fits: Security
|
Reimagining Vulnerability Management with AI: A Complete Lifecycle ApproachAbstract Whether it is network vulnerabilities, application security issues or OS level misconfigurations the sheer volume of findings is simply overwhelming to administrators. Prioritizing and remediating them is daunting task given the short number of security experts out there who can intrepret and mitigate them accurately. more
Submission type: 40 min talk
Track in which your submission fits: Security
|
AWS Cloud Cost Optimization at XflowIntroduction As cloud adoption surges, optimizing costs is vital, especially for startups. This article shares Xflow’s successful strategies that slashed our AWS bill from ~$25,000 to ~$11,500, saving ~$12,500 monthly after adjusting for additional non-AWS costs, resulting in a savings of ~$150,000 annually! more
Submission type: 40 min talk
Track in which your submission fits: Systems engineering
|
Cloud Combat: Elevate Security with Breach & Attack SimulationsIn this session, I will present a detailed roadmap for initiating Breach & Attack Simulations (BAS) in cloud environments, with a particular focus on AWS. I will define what BAS is, what problem statement it solves, various use cases for AWS environment, and where & how BAS fits in the entire lifecycle of Security Operations (SecOps). more
Submission type: 40 min talk
Track in which your submission fits: Security
|
Parser Combinators - Embedding Zig language in ElixirElixir is a high level language known for fault tolerance. What if you need to write some parts of your project in a low-level language like Rust or Zig? more
Submission type: 40 min talk
Track in which your submission fits: Systems engineering
|
With Infinite Scale Comes Infinite Bill (and Bankruptcy)What can a bored hacker do with $5? They can do one of the below - buy a coffee, subscribe to some video streaming service or make your company bleed 10s to 100s of dollars in cloud bills. more
Submission type: 40 min talk
Track in which your submission fits: Security
|
Millions Saved, Lessons Learned: The Cloud Cost Optimization BlueprintIn this session, we will go through the jourey of a startup that had every-thing going for it, billion $ plus investments, 50% week-over-week growth, a place where huge cloud bills were celebrated. But that was 2022. But a start-up needs to grow up, become a scale-up, show that India is a DAU factory with a sustainance story. more
Submission type: 40 min talk
Track in which your submission fits: Systems engineering
|
[Linux kernel devsprint/ sending patches to mainline kernel]I’ll describe the following in detail, and this session will provide a hands-on experience for the attendees. more
Submission type: Hands-on workshop
Track in which your submission fits: Systems engineering
|
[Add a catchy title here]How security teams can leverage GenAI to help them optimize security operations, we will demonstrate threat mitigation with GenAI, Attendees will walk away with the code to build their own GenAI enabled threat mitigation tool. more
Submission type: 15 mins demo or experience report
Track in which your submission fits: Security
|
From Open Access to Hardened Security: Flipkart's Path to Secure Production AccessFlipkart, having grown from a startup to India’s largest e-commerce platform, has continually evolved its security posture to meet the demands of a dynamic, large-scale infrastructure. From an initial state of open access to all developers, our cloud environments have steadily advanced, to a state of centrally orchestrated, timebound, audited and restricted production access. more
Submission type: 40 min talk
Track in which your submission fits: Security
|
Sobering Noisy Background Jobs at ScaleBackground jobs, more commonly referred to as asynchronous tasks or jobs, are a technique in software development for managing tasks that can be executed independently of the primary user interaction or request-response cycle. Background jobs are utilized to enhance system responsiveness, manage time-consuming tasks, and offload resource-intensive operations from the main application thread or pr… more
Submission type: 40 min talk
Track in which your submission fits: Systems engineering
|
Cost Optimisation - Big Impact from Small ChangesAbstract The usual approach to cost optimization is to focus on large scale infrastructure changes that lead to savings in the order of millions of dollars. However, there could be seemingly insignificant issues requiring small configuration fixes, which are often overlooked, but can cumulatively cause significant over expenditure. Overall cost optimization can only be achieved by addressing such… more
Submission type: 40 min talk
Track in which your submission fits: Systems engineering
|
Github Action CI Security with BOLTAbstract: CI systems are the security orchestration centre of the SDLC but CI itself has become an attack surface as Solarwinds and Codecov attacks have shown. more
Submission type: 15 mins demo or experience report
Track in which your submission fits: Security
|
ABC of LLMOps - What does it take to run self-hosted LLMs?LLMs and generative AI have made their way into our day-to-day operations. While the wrappers over GPT are a good starting point, I was intrigued by what it takes for an SRE to understand the domain, identify its operational aspects, and build runbooks around running self-hosted LLM models. more
Submission type: 40 min talk
Track in which your submission fits: Systems engineering
|
Navigating the Scale: How Design Patterns Power Our InfrastructureAbstract Automation and modernization are foundational to support large infrastructure like that of LinkedIn. Managing a fleet of half a million servers(~500K) across our private data centers at LinkedIn is no small feat. This immense scale demands infrastructure solutions that not only expand capacity but also ensure performance, reliability, and efficiency as we grow. Building for scale involve… more
Submission type: 40 min talk
Track in which your submission fits: Systems engineering
|
Chatting with Logs: An exploratory study on Finetuning LLMs for LogQLAbstract Monitoring and observability tools are a cornerstone in debugging processing for any large organization. more
Submission type: 40 min talk
Track in which your submission fits: Systems engineering
|
Unleashing the Power of Serverless with AWS: A Practical Guide to Building and Scaling ApplicationsIn today’s fast-paced cloud environments, serverless architectures have become a powerful tool for reducing operational complexity while maximizing scalability and efficiency. This session focuses specifically on the Serverless Framework with AWS, providing a hands-on walkthrough of deploying and managing a fully serverless application. more
Submission type: 40 min talk
Track in which your submission fits: Systems engineering
|
Building OpenTelemetry PipelinesIntroduction The observability stack in modern organizations often consists of multiple vendors handling logs, metrics, and traces. This results in inconsistent data formats and conventions, increasing the operational overhead of maintaining these pipelines. more
Submission type: 40 min talk
Track in which your submission fits: Systems engineering
|
Malicious Hallucinations: Hidden Threats with Indirect Prompt InjectionLarge language models (LLMs) are known to generate unintended inaccurate responses, often called hallucinations. Most of these are harmless mistakes, like Google AI Overview suggesting to eat a rock a day. There’s a more concerning possibility: what if an attacker could deliberately cause specific hallucinations? This could allow the stealthy spread of targeted disinformation. more
Submission type: 40 min talk
Track in which your submission fits: Security
|
Paving the Path for Secure Software Engineering for StartupsStartups must move fast. Does this mean compromising on security? Everyone will choose security but no startup will have the resources to establish a matured security program from inception. How do you move fast while staying secure even when you have code contributions from interns, software engineers of different experience levels and multi tasking founders? more
Submission type: 40 min talk
Track in which your submission fits: Security
|
Security illusions and events mayhemDescription: In this 40 minutes, we will start off with a brief introduction of DevSecOps and spend almost 30 minutes on the critical role of Security Information and Event Management (SIEM) components within the DevSecOps framework. more
Submission type: 40 min talk
Track in which your submission fits: Security
|
How we made DiceDB a truly real-time reactive databaseThe talk will deep dive into how we built DiceDB and made it a truly real-time reactive database by eliminating polling inefficiencies. The talk will touch on the internal arch of Redis, persistent connections, and leveraging Pub/Sub patterns to enable instantaneous data flow at low latency and high throughput. more
Submission type: 40 min talk
Track in which your submission fits: Systems engineering
|
From Zero to Hero: Building Cloud Security Maturity in Fast-Growing StartupsFrom Zero to Hero: Building Cloud Security Maturity in Fast-Growing Startups 🚀🔒 more
Submission type: 40 min talk
Track in which your submission fits: Security
|
Hosted by