Rohit Bhardwaj
ArchConf
Clearwater · December 12 - 15, 2016
Director of Architecture, Expert in cloud-native solutions
Rohit Bhardwaj is a Director of Architecture working at Salesforce. Rohit has extensive experience architecting multi-tenant cloud-native solutions in Resilient Microservices Service-Oriented architectures using AWS Stack. In addition, Rohit has a proven ability in designing solutions and executing and delivering transformational programs that reduce costs and increase efficiencies.
As a trusted advisor, leader, and collaborator, Rohit applies problem resolution, analytical, and operational skills to all initiatives and develops strategic requirements and solution analysis through all stages of the project life cycle and product readiness to execution.
Rohit excels in designing scalable cloud microservice architectures using Spring Boot and Netflix OSS technologies using AWS and Google clouds. As a Security Ninja, Rohit looks for ways to resolve application security vulnerabilities using ethical hacking and threat modeling. Rohit is excited about architecting cloud technologies using Dockers, REDIS, NGINX, RightScale, RabbitMQ, Apigee, Azul Zing, Actuate BIRT reporting, Chef, Splunk, Rest-Assured, SoapUI, Dynatrace, and EnterpriseDB. In addition, Rohit has developed lambda architecture solutions using Apache Spark, Cassandra, and Camel for real-time analytics and integration projects.
Rohit has done MBA from Babson College in Corporate Entrepreneurship, Masters in Computer Science from Boston University and Harvard University. Rohit is a regular speaker at No Fluff Just Stuff, UberConf, RichWeb, GIDS, and other international conferences.
Rohit loves to connect on http://www.productivecloudinnovation.com.
http://linkedin.com/in/rohit-bhardwaj-cloud or using Twitter at rbhardwaj1.
Presentations
Apache Cassandra, Spark and Spark Streaming for Real Time Big Data Analytics
Apache Cassandra is one of the best solutions for storing and
retrieving data. We will explore data analytics cluster computing
framework with real-world examples. It is 100x faster than Hadoop!
We will start with an introduction to Apache Cassandra. We will explore challenges encountered when attempting to scale
with relational databases, and how NoSQL databases like Cassandra address those problems. It reviews the Cassandra architecture, benefits, and how to use the Cassandra read and write paths.
Later, you will learn how to effectively and efficiently solve analytical problems using Apache Spark, Apache Cassandra, and DataStax. You will learn about Spark API, Spark-Cassandra Connector, Spark SQL, Spark Streaming, and fundamental performance optimization techniques.
Big Data applications nowadays require a faster speed of data
processing and analysis.
Architectural top 5 cloud challenges and solutions for cloud ready Enterprise applications
This is a workshop to explore top 5 cloud architectural challenges. Come prepared with open mind and zeal to solve customer requirements. Workshop is divided into first the real world problems. Later we will discuss possible solutions for each of these problems.
Cloud computing is adopted in all major Enterprises. In this talk we will explore top challenges in Cloud design and deployments. Firstly, we will explore cloud challenges with Service Quality and what design principles need to be adopted to be able to support SLAs in Cloud. Next, Cloud security is a must to be incorporated throughout application development. We will explore Threat Modeling, SOC2 compliance, disaster recovery, and different ways to identify and fix vulnerabilities. Next, we will explore design principles to build support for availability, failover strategies, and downtimes. We will explore ways to design applications, which support <500 ms response time. Next, we will discover how modern cloud enabled applications need to be built using 12 factor application model. Lastly, we will look at how Dockers, Kubernetes, and Mesos DC/OS are helping build scalable Cloud applications.
You can now directly apply your knowledge of architecture principles through this workshop. This will be helpful in enhancing your architect skills with constructive feedback from attendees. You can also come with your organization’s architectural challenges.
Architectural top 5 cloud challenges and solutions for cloud ready Enterprise applications
This is a workshop to explore top 5 cloud architectural challenges. Come prepared with open mind and zeal to solve customer requirements. Workshop is divided into first the real world problems. Later we will discuss possible solutions for each of these problems.
Cloud computing is adopted in all major Enterprises. In this talk we will explore top challenges in Cloud design and deployments. Firstly, we will explore cloud challenges with Service Quality and what design principles need to be adopted to be able to support SLAs in Cloud. Next, Cloud security is a must to be incorporated throughout application development. We will explore Threat Modeling, SOC2 compliance, disaster recovery, and different ways to identify and fix vulnerabilities. Next, we will explore design principles to build support for availability, failover strategies, and downtimes. We will explore ways to design applications, which support <500 ms response time. Next, we will discover how modern cloud enabled applications need to be built using 12 factor application model. Lastly, we will look at how Dockers, Kubernetes, and Mesos DC/OS are helping build scalable Cloud applications.
You can now directly apply your knowledge of architecture principles through this workshop. This will be helpful in enhancing your architect skills with constructive feedback from attendees. You can also come with your organization’s architectural challenges.
10x Peak Productivity & Innovation: Elevating Software Craftsmanship
This talk is designed to catapult your productivity, enhance your emotional intelligence, and refine your problem-solving skills. This talk is not just a series of presentations; it's a transformative experience tailored for the ambitious software developer and architect seeking to leave a mark in the fast-paced world of technology.
Dive into the essence of developer and architect productivity, where we unravel the secrets to optimizing your workflow and leveraging your skills for maximum impact. Discover the “24 Hours Instant Happiness” principle, a proven strategy to inject a dose of joy into your daily routine, fostering a positive work environment and personal life.
“Maximizing Your Impact” takes you deeper into the realm of influence, equipping you with the tools to excel in your projects and inspire those around you. Through “Effective Communication” and the intriguing “Mirror Technique,” learn how to build rapport, foster collaboration, and lead with empathy, amplifying your charisma in all professional interactions.
As we delve into the core of success, “Emotional Intelligence is 85% of Success” highlights the paramount importance of self-awareness, self-regulation, motivation, empathy, and social skills in achieving your goals. The “6 Phase Meditation Approach” and “Day Launcher” sessions are designed to refine your focus, creativity, and emotional stability, setting a solid foundation for a productive day ahead.
The inclusion of “Empathy Maps” and “IDEO Case Studies” offers a practical lens through which to view user-centric design and innovation. At the same time, the “SCAMPER Technique” provides a creative framework for problem-solving, ensuring you're equipped to tackle challenges with agility and inventiveness.
Elevate your productivity to new heights with “5 Choices for Super Productivity,” a comprehensive guide to prioritizing effectively, embracing extraordinary outcomes, and mastering your technology. Learn the art of “Managing Energy, Not Time,” a paradigm shift that promises to enhance your efficiency and job satisfaction.
As the talk culminates, “The Paradox of Choice” and the latest “Technology Trends to Focus On” prepare you to navigate the complexities of the modern tech landscape with confidence and curiosity.
This masterclass is more than just a talk; it's an invitation to transform how you work, lead, and innovate. Join us to unlock your full potential and reshape your future in software development and architecture. Whether you're looking to boost your productivity, enhance your emotional intelligence, or simply find more joy in your work, this talk is your gateway to a more fulfilling career and life.
Best Practices for designing Enterprise RESTful APIs in cloud workshop
API Gateway is a way to connect Enterprise application in cloud-ready applications. New applications need to design the data model and create public APIs to be consumed by mobile apps, third party apps, and different devices. We will explore best practices, which you must adopt to be cloud ready. Firstly, we will examine how contract first API development is helping enable more extensible and reliable APIs. Next, we will look at
We will ask tough questions during this design session. How to provide security? What are best practices to authenticate? When should we version APIs? Should we use HATEOS for developing APIs? How to support internationalization? How to publish and maintain APIs?
Best Practices for designing Enterprise RESTful APIs in cloud workshop
API Gateway is a way to connect Enterprise application in cloud-ready applications. New applications need to design the data model and create public APIs to be consumed by mobile apps, third party apps, and different devices. We will explore best practices, which you must adopt to be cloud ready. Firstly, we will examine how contract first API development is helping enable more extensible and reliable APIs. Next, we will look at
We will ask tough questions during this design session. How to provide security? What are best practices to authenticate? When should we version APIs? Should we use HATEOS for developing APIs? How to support internationalization? How to publish and maintain APIs?
Enterprise Ethical Hacking Cloud Applications
Securing of the web application is an enormous task. In this talk, we will explore how to protect enterprise applications. We will explore different kinds of vulnerabilities and hot to secure your applications properly. Security patterns need to be understood by first wearing the hat of a hacker and then putting the hat as a defender. In this workshop, we will explore different security patterns and determine how to prevent attacks.
We will be using Kali Linux to understand Ethical hacking techniques using Metasploitable applications. In the end, we will see how OpenVas can help in scanning the vulnerabilities in the application.
Enterprise Ethical Hacking Cloud Applications
Securing of web applications is a gigantic task. In this talk, we will explore how to protect enterprise applications. We will explore different kinds of vulnerabilities and hot to secure your applications properly. Security patterns need to be understood by first wearing the hat of a hacker and then putting the hat of a defender. In this workshop, we will explore different security patterns and determine how to prevent attacks.
We will be using Kali Linux to understand Ethical hacking techniques using Metasploitable applications. In the end, we will see how OpenVas can help in scanning the vulnerabilities in the application.
Multi-Tenant NoSQL NewSQL Cloud-Data Design Patterns Workshop
We are all familiar with the 3rd Normal form. Does that scale? What are the best practices for designing resilient, multi-tenant, performant databases? In this talk, we will explore the database evaluation process, where we will make choices on technology stacks based on requirements and analyzing the CAP theorem. We will discover different Consistency, Availability, and Partition Tolerance techniques, investigate No-SQL databases, and help new cloud deployments using the 3rd Platform.
Big data has characteristics in the new Cloud domain, which requires storing various data for different use-cases. We will explore the Document data store, Key-value, Columnar NoSQL, and Graph NoSQL databases.
Next, we will look at how to do data modeling for NoSQL columnar databases to support highly available partition tolerant use-cases. We will discover different strategies to help multi-tenant requirements. In the end, we will look at how to choose the right database? We will also see the future of Databases compared to Consistency Models, Schema Models, Database Languages, and Database storage.
Containers 101 using Dockers and Kubernetes Workshop
Kubernetes and Docker Swarm are universally used tools to deploy containers inside a cluster. Both are created as helper tools that can be used to manage a cluster of containers and treat all servers as a single unit.
Docker is an open platform for developing, shipping, and running applications. In this talk, we will discover how Docker help separates your applications from your infrastructure and treat your infrastructure like a managed application. Docker helps you ship code faster, test faster, deploy faster and shorten the cycle between writing code and running code. We will explore Docker architecture. We will investigate how you can create your image and compose and deploy in Docker hub so others can start using the same environment. Docker Swarm is native clustering for Docker. It turns a pool of Docker hosts into a single, virtual Docker host. Because Docker Swarm serves the standard Docker API, any tool that already communicates with a Docker daemon can use Swarm to scale to multiple hosts transparently.
Kubernetes is Google’s answer to an open-source system for automating deployment, scaling, and management of containerized applications. In this talk we will discover how to use Kubernetes which is portable: public, private, hybrid, multi-cloud; extensible: modular, pluggable, hookable, composable; self-healing: auto-placement, auto-restart, auto-replication, auto-scaling.
Containers 101 using Dockers and Kubernetes Workshop
Kubernetes and Docker Swarm are universally used tools to deploy containers inside a cluster. Both are created as helper tools that can be used to manage a cluster of containers and treat all servers as a single unit.
Docker is an open platform for developing, shipping, and running applications. In this talk, we will discover how Docker help separates your applications from your infrastructure and treat your infrastructure like a managed application. Docker helps you ship code faster, test faster, deploy faster and shorten the cycle between writing code and running code. We will explore Docker architecture. We will investigate how you can create your image and compose and deploy in Docker hub so others can start using the same environment. Docker Swarm is native clustering for Docker. It turns a pool of Docker hosts into a single, virtual Docker host. Because Docker Swarm serves the standard Docker API, any tool that already communicates with a Docker daemon can use Swarm to scale to multiple hosts transparently.
Kubernetes is Google’s answer to an open-source system for automating deployment, scaling, and management of containerized applications. In this talk we will discover how to use Kubernetes which is portable: public, private, hybrid, multi-cloud; extensible: modular, pluggable, hookable, composable; self-healing: auto-placement, auto-restart, auto-replication, auto-scaling.
Enterprise Security for OWASP top 10 Workshop
Understanding OWASP top ten will give your application development team a clear vision on how to find the security flaws. We will focus on identifying the weaknesses and provide the ability to the architect or developer in coming up with a robust design.
We will explore the Top Ten vulnerabilities including:
• SQL injection
• Session management
• Cross-Site Scripting (XSS)
• Cross-Sift Request Forgery (CSRF)
• Security misconfigurations
We will be using Kali Linux to understand Top 10 vulnerabilities using Metasploitable applications. In the end, we will see how OpenVas can help in scanning the vulnerabilities in the application.
Enterprise Security for OWASP top 10 Workshop
Understanding OWASP top ten will give your application development team a clear vision on how to find the security flaws. We will focus on identifying the weaknesses and provide the ability to the architect or developer in coming up with a robust design.
We will explore the Top Ten vulnerabilities including:
• SQL injection
• Session management
• Cross-Site Scripting (XSS)
• Cross-Sift Request Forgery (CSRF)
• Security misconfigurations
We will be using Kali Linux to understand Top 10 vulnerabilities using Metasploitable applications. In the end, we will see how OpenVas can help in scanning the vulnerabilities in the application.