Submissions

Rootconf Mini 2024

Geeking out on systems and security since 2012

Tickets

Loading…

Accepting submissions till 30 Oct 2024, 11:59 PM

Not accepting submissions

General guidelines for submitting talk and demo proposals We appreciate that many participants create submissions out of a genuine desire to share knowledge with our community, and to contribute in a meaningful way. However, many written submissions fail to capture the attention of the community, o… expand

General guidelines for submitting talk and demo proposals

We appreciate that many participants create submissions out of a genuine desire to share knowledge with our community, and to contribute in a meaningful way. However, many written submissions fail to capture the attention of the community, or meet acceptance through Rootconf’s peer review process. More often than not this is because the content of the submission does not explain what they intend with sufficient clarity or detail.

The template (and example) is an attempt to help you write a better submission, one that is noticed and understood by your intended audience and not lost in the crowd of interesting proposals we receive. Please use this template as a guideline, while ensuring that it is in your own unique and authentic voice.

BEFORE you begin writing your submission, please give some thought to the following:

  1. Who is the audience for your session? Think about their interests, work roles, challenges, age or experience as you decide this.
  2. What problem/pain are you trying to solve (for the audience)? This should be something that is communicated clearly so that they have a sense of your session’s importance.
  3. What will be the scope of your session? This will help identify the central topic or theme and should describe broad areas you plan to cover during the session?
  4. How will participants benefit from your session? Think of practical and specific ways in which they will be able to apply the knowledge they gain, and beyond just general awareness.
  5. What is the appropriate format for your session, given the audience and objectives that you have in mind?

The most successful talks and sessions are those where presenters are able to abstract an actionable insight from a common pain area, enlighten the audience about something new, provide a fresh perspective, and/or demonstrate innovation.

Here’s a guide for speakers to draft their presentations.

You can view talks held at previous editions of Rootconf 2024 for reference:

  1. Cloud Costs Optimization 2023 - http://has.gy/xeb4
  2. Rootconf SRE 2023 - http://has.gy/Lnis
  3. Rootconf Hyderabad 2019 - http://has.gy/7VSz

The call for submissions will be close on 30 October 2024. Talks will be selected on a rolling basis as submissions are made.

Topics for submitting talks

A. Systems engineering:

  • Resilience engineering in complex systems
  • Advanced observability practices
  • Serverless architectures: costs, benefits and challenges
  • Multi-cloud and hybrid cloud strategies
  • Kubernetes in production: lessons learned
  • Continuous Integration and Continuous Delivery (CI/CD) pipeline automation

B. Security engineering:

  • Security engineering case studies - systems/processes/practices that organizations have developed.
  • Security tooling experiences - open source and proprietary
  • Cloud security - case studies.
  • Security for AI; AI and security products

Types of submissions

You can submit a session for:

  1. 40 mins talk
  2. 15 mins demos and experience reports with dev tools and security tools
  3. Birds of Feather (BOF) sessions
  4. Hands-on workshops for three hours duration
  5. Pitch sessions - where you demonstrate MVPs you have built.
Make a submission

Accepting submissions till 30 Oct 2024, 11:59 PM

Vaidyanathan S

Vaidyanathan S

Moving your Databases to Kubernetes - Flipkart's DBaaS journey.

Abstract When most companies talk about Kubernetes adoption, they talk about the stateless aspect. However most of them shy away from Kubernetes when it comes to the stateful part. In this talk we will explore why Flipkart chose to move to stateful K8s for databases, the challenges we faced in this journey and the road ahead. more
  • 10 comments
  • Confirmed
  • 24 Sep 2024
Submission type: 40 min talk Track in which your submission fits: Systems engineering
Achal Shah

Achal Shah

Rebuilding Tecton's Realtime Compute stack (twice)

Overview: This tech talk proposes to dive into the evolution of Tecton’s real-time compute stack, a journey that started with sidecar processes, moved through serverless architecture, and ultimately matured into a native service deployed on virtual machines (VMs). The session will (hopefully) outline the challenges, lessons learned, and engineering decisions made at each stage. more
  • 0 comments
  • Confirmed
  • 05 Oct 2024
Submission type: 40 min talk Track in which your submission fits: Systems engineering
Swapnil Dubey

Swapnil Dubey

Changing DevOps landscape in FinOps world.

Cloud computing benefits organizations in many ways. The benefits are so numerous that it makes it almost impossible not to consider moving business operations to a cloud-based platform. Easier said than done, multiple organizations get trapped in the pricing model – “Pay as you go”, and this not well understood, has resulted in wastages. As per Finops surveys, the key priorities for 2024 are as … more
  • 5 comments
  • Submitted
  • 26 Sep 2024
Submission type: 40 min talk Track in which your submission fits: Systems engineering
Jatin Katyal

Jatin Katyal

Cricket Match from a Devops Lens

Tsunami Traffic, Traffic Avalanche, Hockey Stick Curve are some of the common terms laid out as the benchmark for developing systems at scale. As the first hire for the Jiocinema Devops team @ Viacom18 I got the opportunity to work on breaking these benchmarks while maintaining our Infrastructure on a cluster of Kubernetes clusters ;) more
  • 7 comments
  • Under evaluation
  • 27 Sep 2024
Submission type: 40 min talk Track in which your submission fits: Systems engineering
Shubham Kumar

Shubham Kumar Author

Lessons from Optimizing Cloud Costs and Improving System Performance to deliver 9M+ Radiology Reports

Introduction 5C Network is a leading AI-powered platform in the healthcare space, specializing in radiology and medical imaging. We manage and process large volumes of medical data, including over 1 billion DICOM objects, providing critical diagnostic services across India. Our focus on leveraging cutting-edge cloud and AI technologies allows us to deliver high-quality, cost-effective healthcare … more
  • 6 comments
  • Submitted
  • 27 Sep 2024
Submission type: 40 min talk Track in which your submission fits: Systems engineering
Rammohan Thirupasur

Rammohan Thirupasur

Agentic AI Security - An idea whose time has come !!

I intend to deep-dive the security landscape of AI agents. Not many have ventured in to this space. This talk will be niche, original & cutting-edge. more
  • 10 comments
  • Submitted
  • 22 Sep 2024
Submission type: 40 min talk Track in which your submission fits: Security

Dr Sashank Dara

Reimagining Vulnerability Management with AI: A Complete Lifecycle Approach

Abstract Whether it is network vulnerabilities, application security issues or OS level misconfigurations the sheer volume of findings is simply overwhelming to administrators. Prioritizing and remediating them is daunting task given the short number of security experts out there who can intrepret and mitigate them accurately. more
  • 9 comments
  • Submitted
  • 19 Sep 2024
Submission type: 40 min talk Track in which your submission fits: Security
Arun

Arun

AWS Cloud Cost Optimization at Xflow

Introduction As cloud adoption surges, optimizing costs is vital, especially for startups. This article shares Xflow’s successful strategies that slashed our AWS bill from ~$25,000 to ~$11,500, saving ~$12,500 monthly after adjusting for additional non-AWS costs, resulting in a savings of ~$150,000 annually! more
  • 2 comments
  • Submitted
  • 01 Oct 2024
Submission type: 40 min talk Track in which your submission fits: Systems engineering

Monty Shyama

Cloud Combat: Elevate Security with Breach & Attack Simulations

In this session, I will present a detailed roadmap for initiating Breach & Attack Simulations (BAS) in cloud environments, with a particular focus on AWS. I will define what BAS is, what problem statement it solves, various use cases for AWS environment, and where & how BAS fits in the entire lifecycle of Security Operations (SecOps). more
  • 2 comments
  • Submitted
  • 01 Oct 2024
Submission type: 40 min talk Track in which your submission fits: Security

Abhishek Tripathi

Parser Combinators - Embedding Zig language in Elixir

Elixir is a high level language known for fault tolerance. What if you need to write some parts of your project in a low-level language like Rust or Zig? more
  • 2 comments
  • Submitted
  • 21 Sep 2024
Submission type: 40 min talk Track in which your submission fits: Systems engineering

Chandrapal Badshah

With Infinite Scale Comes Infinite Bill (and Bankruptcy)

What can a bored hacker do with $5? They can do one of the below - buy a coffee, subscribe to some video streaming service or make your company bleed 10s to 100s of dollars in cloud bills. more
  • 2 comments
  • Submitted
  • 03 Oct 2024
Submission type: 40 min talk Track in which your submission fits: Security

arya ketan

Millions Saved, Lessons Learned: The Cloud Cost Optimization Blueprint

In this session, we will go through the jourey of a startup that had every-thing going for it, billion $ plus investments, 50% week-over-week growth, a place where huge cloud bills were celebrated. But that was 2022. But a start-up needs to grow up, become a scale-up, show that India is a DAU factory with a sustainance story. more
  • 1 comment
  • Submitted
  • 05 Oct 2024
Submission type: 40 min talk Track in which your submission fits: Systems engineering
cvam

cvam

[Linux kernel devsprint/ sending patches to mainline kernel]

I’ll describe the following in detail, and this session will provide a hands-on experience for the attendees. more
  • 2 comments
  • Submitted
  • 07 Oct 2024
Submission type: Hands-on workshop Track in which your submission fits: Systems engineering

Lalit Kumar

[Add a catchy title here]

How security teams can leverage GenAI to help them optimize security operations, we will demonstrate threat mitigation with GenAI, Attendees will walk away with the code to build their own GenAI enabled threat mitigation tool. more
  • 1 comment
  • Submitted
  • 07 Oct 2024
Submission type: 15 mins demo or experience report Track in which your submission fits: Security

Sai Sandeep Rangisetti

From Open Access to Hardened Security: Flipkart's Path to Secure Production Access

Flipkart, having grown from a startup to India’s largest e-commerce platform, has continually evolved its security posture to meet the demands of a dynamic, large-scale infrastructure. From an initial state of open access to all developers, our cloud environments have steadily advanced, to a state of centrally orchestrated, timebound, audited and restricted production access. more
  • 0 comments
  • Submitted
  • 08 Oct 2024
Submission type: 40 min talk Track in which your submission fits: Security
Ajay Ravichandran

Ajay Ravichandran

Sobering Noisy Background Jobs at Scale

Background jobs, more commonly referred to as asynchronous tasks or jobs, are a technique in software development for managing tasks that can be executed independently of the primary user interaction or request-response cycle. Background jobs are utilized to enhance system responsiveness, manage time-consuming tasks, and offload resource-intensive operations from the main application thread or pr… more
  • 2 comments
  • Submitted
  • 10 Oct 2024
Submission type: 40 min talk Track in which your submission fits: Systems engineering
Madhavi Madangopal

Madhavi Madangopal

Cost Optimisation - Big Impact from Small Changes

Abstract The usual approach to cost optimization is to focus on large scale infrastructure changes that lead to savings in the order of millions of dollars. However, there could be seemingly insignificant issues requiring small configuration fixes, which are often overlooked, but can cumulatively cause significant over expenditure. Overall cost optimization can only be achieved by addressing such… more
  • 2 comments
  • Submitted
  • 10 Oct 2024
Submission type: 40 min talk Track in which your submission fits: Systems engineering
Abhimanyu Dhamija

Abhimanyu Dhamija

Github Action CI Security with BOLT

Abstract: CI systems are the security orchestration centre of the SDLC but CI itself has become an attack surface as Solarwinds and Codecov attacks have shown. more
  • 0 comments
  • Submitted
  • 11 Oct 2024
Submission type: 15 mins demo or experience report Track in which your submission fits: Security
Jaideep Khandelwal

Jaideep Khandelwal

ABC of LLMOps - What does it take to run self-hosted LLMs?

LLMs and generative AI have made their way into our day-to-day operations. While the wrappers over GPT are a good starting point, I was intrigued by what it takes for an SRE to understand the domain, identify its operational aspects, and build runbooks around running self-hosted LLM models. more
  • 2 comments
  • Submitted
  • 11 Oct 2024
Submission type: 40 min talk Track in which your submission fits: Systems engineering
Kumar Tej Gedala

Kumar Tej Gedala

Navigating the Scale: How Design Patterns Power Our Infrastructure

Abstract Automation and modernization are foundational to support large infrastructure like that of LinkedIn. Managing a fleet of half a million servers(~500K) across our private data centers at LinkedIn is no small feat. This immense scale demands infrastructure solutions that not only expand capacity but also ensure performance, reliability, and efficiency as we grow. Building for scale involve… more
  • 0 comments
  • Submitted
  • 11 Oct 2024
Submission type: 40 min talk Track in which your submission fits: Systems engineering
Siddharth Balyan

Siddharth Balyan

Chatting with Logs: An exploratory study on Finetuning LLMs for LogQL

Abstract Monitoring and observability tools are a cornerstone in debugging processing for any large organization. more
  • 0 comments
  • Submitted
  • 12 Oct 2024
Submission type: 40 min talk Track in which your submission fits: Systems engineering
Sudheer Srinivasa

Sudheer Srinivasa

Unleashing the Power of Serverless with AWS: A Practical Guide to Building and Scaling Applications

In today’s fast-paced cloud environments, serverless architectures have become a powerful tool for reducing operational complexity while maximizing scalability and efficiency. This session focuses specifically on the Serverless Framework with AWS, providing a hands-on walkthrough of deploying and managing a fully serverless application. more
  • 2 comments
  • Submitted
  • 12 Oct 2024
Submission type: 40 min talk Track in which your submission fits: Systems engineering

Preeti

Building OpenTelemetry Pipelines

Introduction The observability stack in modern organizations often consists of multiple vendors handling logs, metrics, and traces. This results in inconsistent data formats and conventions, increasing the operational overhead of maintaining these pipelines. more
  • 1 comment
  • Submitted
  • 14 Oct 2024
Submission type: 40 min talk Track in which your submission fits: Systems engineering

Sachin

Malicious Hallucinations: Hidden Threats with Indirect Prompt Injection

Large language models (LLMs) are known to generate unintended inaccurate responses, often called hallucinations. Most of these are harmless mistakes, like Google AI Overview suggesting to eat a rock a day. There’s a more concerning possibility: what if an attacker could deliberately cause specific hallucinations? This could allow the stealthy spread of targeted disinformation. more
  • 0 comments
  • Submitted
  • 15 Oct 2024
Submission type: 40 min talk Track in which your submission fits: Security
Abhisek Datta

Abhisek Datta

Paving the Path for Secure Software Engineering for Startups

Startups must move fast. Does this mean compromising on security? Everyone will choose security but no startup will have the resources to establish a matured security program from inception. How do you move fast while staying secure even when you have code contributions from interns, software engineers of different experience levels and multi tasking founders? more
  • 0 comments
  • Submitted
  • 15 Oct 2024
Submission type: 40 min talk Track in which your submission fits: Security

Srujan A

Security illusions and events mayhem

Description: In this 40 minutes, we will start off with a brief introduction of DevSecOps and spend almost 30 minutes on the critical role of Security Information and Event Management (SIEM) components within the DevSecOps framework. more
  • 1 comment
  • Submitted
  • 15 Oct 2024
Submission type: 40 min talk Track in which your submission fits: Security
Arpit Bhayani

Arpit Bhayani

How we made DiceDB a truly real-time reactive database

The talk will deep dive into how we built DiceDB and made it a truly real-time reactive database by eliminating polling inefficiencies. The talk will touch on the internal arch of Redis, persistent connections, and leveraging Pub/Sub patterns to enable instantaneous data flow at low latency and high throughput. more
  • 2 comments
  • Submitted
  • 15 Oct 2024
Submission type: 40 min talk Track in which your submission fits: Systems engineering

Sathvik Kallepalli

From Zero to Hero: Building Cloud Security Maturity in Fast-Growing Startups

From Zero to Hero: Building Cloud Security Maturity in Fast-Growing Startups 🚀🔒 more
  • 1 comment
  • Submitted
  • 15 Oct 2024
Submission type: 40 min talk Track in which your submission fits: Security
Hybrid Access Ticket

Hosted by

We care about site reliability, cloud costs, security and data privacy