Rohit Bhardwaj is a Director of Architecture working at Salesforce. Rohit has extensive experience architecting multi-tenant cloud-native solutions in Resilient Microservices Service-Oriented architectures using AWS Stack. In addition, Rohit has a proven ability in designing solutions and executing and delivering transformational programs that reduce costs and increase efficiencies.
As a trusted advisor, leader, and collaborator, Rohit applies problem resolution, analytical, and operational skills to all initiatives and develops strategic requirements and solution analysis through all stages of the project life cycle and product readiness to execution.
Rohit excels in designing scalable cloud microservice architectures using Spring Boot and Netflix OSS technologies using AWS and Google clouds. As a Security Ninja, Rohit looks for ways to resolve application security vulnerabilities using ethical hacking and threat modeling. Rohit is excited about architecting cloud technologies using Dockers, REDIS, NGINX, RightScale, RabbitMQ, Apigee, Azul Zing, Actuate BIRT reporting, Chef, Splunk, Rest-Assured, SoapUI, Dynatrace, and EnterpriseDB. In addition, Rohit has developed lambda architecture solutions using Apache Spark, Cassandra, and Camel for real-time analytics and integration projects.
Rohit has done MBA from Babson College in Corporate Entrepreneurship, Masters in Computer Science from Boston University and Harvard University. Rohit is a regular speaker at No Fluff Just Stuff, UberConf, RichWeb, GIDS, and other international conferences.
Rohit loves to connect on http://www.productivecloudinnovation.com.
http://linkedin.com/in/rohit-bhardwaj-cloud or using Twitter at rbhardwaj1.
Apache Cassandra is one of the best solutions for storing and
retrieving data. We will explore data analytics cluster computing
framework with real-world examples. It is 100x faster than Hadoop!
We will start with an introduction to Apache Cassandra. We will explore challenges encountered when attempting to scale
with relational databases, and how NoSQL databases like Cassandra address those problems. It reviews the Cassandra architecture, benefits, and how to use the Cassandra read and write paths.
Later, you will learn how to effectively and efficiently solve analytical problems using Apache Spark, Apache Cassandra, and DataStax. You will learn about Spark API, Spark-Cassandra Connector, Spark SQL, Spark Streaming, and fundamental performance optimization techniques.
Big Data applications nowadays require a faster speed of data
processing and analysis.
Apache Cassandra is one of the best solutions for storing and
retrieving data. We will explore data analytics cluster computing
framework with real-world examples. It is 100x faster than Hadoop!
We will start with an introduction to Apache Cassandra. We will explore challenges encountered when attempting to scale
with relational databases, and how NoSQL databases like Cassandra address those problems. It reviews the Cassandra architecture, benefits, and how to use the Cassandra read and write paths.
Later, you will learn how to effectively and efficiently solve analytical problems using Apache Spark, Apache Cassandra, and DataStax. You will learn about Spark API, Spark-Cassandra Connector, Spark SQL, Spark Streaming, and fundamental performance optimization techniques.
Big Data applications nowadays require a faster speed of data
processing and analysis.
Securing of the web application is an enormous task. In this talk, we will explore how to protect enterprise applications. We will explore different kinds of vulnerabilities and hot to secure your applications properly. Security patterns need to be understood by first wearing the hat of a hacker and then putting the hat as a defender. In this workshop, we will explore different security patterns and determine how to prevent attacks.
We will be using Kali Linux to understand Ethical hacking techniques using Metasploitable applications. In the end, we will see how OpenVas can help in scanning the vulnerabilities in the application.
In this workshop we will explore following:
Securing of web applications is a gigantic task. In this talk, we will explore how to protect enterprise applications. We will explore different kinds of vulnerabilities and hot to secure your applications properly. Security patterns need to be understood by first wearing the hat of a hacker and then putting the hat of a defender. In this workshop, we will explore different security patterns and determine how to prevent attacks.
We will be using Kali Linux to understand Ethical hacking techniques using Metasploitable applications. In the end, we will see how OpenVas can help in scanning the vulnerabilities in the application.
Securing of web applications is a gigantic task. In this talk, we will explore how to protect enterprise applications. We will explore different kinds of vulnerabilities and hot to secure your applications properly. Security patterns need to be understood by first wearing the hat of a hacker and then putting the hat of a defender. In this workshop, we will explore different security patterns and determine how to prevent attacks.
We will be using Kali Linux to understand Ethical hacking techniques using Metasploitable applications. In the end, we will see how OpenVas can help in scanning the vulnerabilities in the application.
This is a workshop to explore top 5 cloud architectural challenges. Come prepared with open mind and zeal to solve customer requirements. Workshop is divided into first the real world problems. Later we will discuss possible solutions for each of these problems.
Cloud computing is adopted in all major Enterprises. In this talk we will explore top challenges in Cloud design and deployments. Firstly, we will explore cloud challenges with Service Quality and what design principles need to be adopted to be able to support SLAs in Cloud. Next, Cloud security is a must to be incorporated throughout application development. We will explore Threat Modeling, SOC2 compliance, disaster recovery, and different ways to identify and fix vulnerabilities. Next, we will explore design principles to build support for availability, failover strategies, and downtimes. We will explore ways to design applications, which support <500 ms response time. Next, we will discover how modern cloud enabled applications need to be built using 12 factor application model. Lastly, we will look at how Dockers, Kubernetes, and Mesos DC/OS are helping build scalable Cloud applications.
You can now directly apply your knowledge of architecture principles through this workshop. This will be helpful in enhancing your architect skills with constructive feedback from attendees. You can also come with your organization’s architectural challenges.
This is a workshop to explore top 5 cloud architectural problems. Come prepared with open mind and zeal to solve customer requirements. Workshop is divided into first the real world problems. Later we will discuss possible solutions for each of these problems.
Cloud computing is adopted in all major Enterprises. In this talk we will explore top challenges in Cloud design and deployments. Firstly, we will explore cloud challenges with Service Quality and what design principles need to be adopted to be able to support SLAs in Cloud. Next, Cloud security is a must to be incorporated throughout application development. We will explore Threat Modeling, SOC2 compliance, disaster recovery, and different ways to identify and fix vulnerabilities. Next, we will explore design principles to build support for availability, failover strategies, and downtimes. We will explore ways to design applications, which support <500 ms response time. Next, we will discover how modern cloud enabled applications need to be built using 12 factor application model. Lastly, we will look at how Dockers, Kubernetes, and Mesos DC/OS are helping build scalable Cloud applications.
You can now directly apply your knowledge of architecture principles through this workshop. This will be helpful in enhancing your architect skills with constructive feedback from attendees. You can also come with your organization’s architectural challenges.
This is a workshop to explore top 5 cloud architectural challenges. Come prepared with open mind and zeal to solve customer requirements. Workshop is divided into first the real world problems. Later we will discuss possible solutions for each of these problems.
Cloud computing is adopted in all major Enterprises. In this talk we will explore top challenges in Cloud design and deployments. Firstly, we will explore cloud challenges with Service Quality and what design principles need to be adopted to be able to support SLAs in Cloud. Next, Cloud security is a must to be incorporated throughout application development. We will explore Threat Modeling, SOC2 compliance, disaster recovery, and different ways to identify and fix vulnerabilities. Next, we will explore design principles to build support for availability, failover strategies, and downtimes. We will explore ways to design applications, which support <500 ms response time. Next, we will discover how modern cloud enabled applications need to be built using 12 factor application model. Lastly, we will look at how Dockers, Kubernetes, and Mesos DC/OS are helping build scalable Cloud applications.
You can now directly apply your knowledge of architecture principles through this workshop. This will be helpful in enhancing your architect skills with constructive feedback from attendees. You can also come with your organization’s architectural challenges.
This is a workshop to explore top 5 cloud architectural problems. Come prepared with open mind and zeal to solve customer requirements. Workshop is divided into first the real world problems. Later we will discuss possible solutions for each of these problems.
Cloud computing is adopted in all major Enterprises. In this talk we will explore top challenges in Cloud design and deployments. Firstly, we will explore cloud challenges with Service Quality and what design principles need to be adopted to be able to support SLAs in Cloud. Next, Cloud security is a must to be incorporated throughout application development. We will explore Threat Modeling, SOC2 compliance, disaster recovery, and different ways to identify and fix vulnerabilities. Next, we will explore design principles to build support for availability, failover strategies, and downtimes. We will explore ways to design applications, which support <500 ms response time. Next, we will discover how modern cloud enabled applications need to be built using 12 factor application model. Lastly, we will look at how Dockers, Kubernetes, and Mesos DC/OS are helping build scalable Cloud applications.
You can now directly apply your knowledge of architecture principles through this workshop. This will be helpful in enhancing your architect skills with constructive feedback from attendees. You can also come with your organization’s architectural challenges.
Understanding OWASP top ten will give your application development team a clear vision on how to find the security flaws. We will focus on identifying the weaknesses and provide the ability to the architect or developer in coming up with a robust design.
We will explore the Top Ten vulnerabilities including:
• SQL injection
• Session management
• Cross-Site Scripting (XSS)
• Cross-Sift Request Forgery (CSRF)
• Security misconfigurations
We will be using Kali Linux to understand Top 10 vulnerabilities using Metasploitable applications. In the end, we will see how OpenVas can help in scanning the vulnerabilities in the application.
Understanding OWASP top ten will give your application development team a clear vision on how to find the security flaws. We will focus on identifying the weaknesses and provide the ability to the architect or developer in coming up with a robust design.
We will explore the Top Ten vulnerabilities including:
• SQL injection
• Session management
• Cross-Site Scripting (XSS)
• Cross-Sift Request Forgery (CSRF)
• Security misconfigurations
We will be using Kali Linux to understand Top 10 vulnerabilities using Metasploitable applications. In the end, we will see how OpenVas can help in scanning the vulnerabilities in the application.
Understanding OWASP top ten will give your application development team a clear vision on how to find the security flaws. We will focus on identifying the weaknesses and provide the ability to the architect or developer in coming up with a robust design.
We will explore the Top Ten vulnerabilities including:
• SQL injection
• Session management
• Cross-Site Scripting (XSS)
• Cross-Sift Request Forgery (CSRF)
• Security misconfigurations
We will be using Kali Linux to understand Top 10 vulnerabilities using Metasploitable applications. In the end, we will see how OpenVas can help in scanning the vulnerabilities in the application.
Understanding OWASP top ten will give your application development team a clear vision on how to find the security flaws. We will focus on identifying the weaknesses and provide the ability to the architect or developer in coming up with a robust design.
We will explore the Top Ten vulnerabilities including:
• SQL injection
• Session management
• Cross-Site Scripting (XSS)
• Cross-Sift Request Forgery (CSRF)
• Security misconfigurations
We will be using Kali Linux to understand Top 10 vulnerabilities using Metasploitable applications. In the end, we will see how OpenVas can help in scanning the vulnerabilities in the application.
API Gateway is a way to connect Enterprise application in cloud-ready applications. New applications need to design the data model and create public APIs to be consumed by mobile apps, third party apps, and different devices. We will explore best practices, which you must adopt to be cloud ready. Firstly, we will examine how contract first API development is helping enable more extensible and reliable APIs. Next, we will look at
We will ask tough questions during this design session. How to provide security? What are best practices to authenticate? When should we version APIs? Should we use HATEOS for developing APIs? How to support internationalization? How to publish and maintain APIs?
We will take deep dive into following areas:
• RESTful APIs design patterns:
Principles for designing APIs, Hypermedia, Entity tags caching, filtering, Partial items, HAL
• API versioning techniques:
URI path, URI parameter, Content Negotiation, Request header
• API Security:
Threats, Protecting APIs, Authentication, API Keys: How they work? SAML, OAuth and JSON Web Tokens
• API Gateway:
Customer Driven contract development
• API testing:
SoapUI, REST-assured
This talk is ideal for the following roles:
Architects
Technical Leads
Programers
Integration Architects
Solution Architects
API Gateway is a way to connect Enterprise application in cloud-ready applications. New applications need to design the data model and create public APIs to be consumed by mobile apps, third party apps, and different devices. We will explore best practices, which you must adopt to be cloud ready. Firstly, we will examine how contract first API development is helping enable more extensible and reliable APIs. Next, we will look at
We will ask tough questions during this design session. How to provide security? What are best practices to authenticate? When should we version APIs? Should we use HATEOS for developing APIs? How to support internationalization? How to publish and maintain APIs?
We will take deep dive into following areas:
• RESTful APIs design patterns:
Principles for designing APIs, Hypermedia, Entity tags caching, filtering, Partial items, HAL
• API versioning techniques:
URI path, URI parameter, Content Negotiation, Request header
• API Security:
Threats, Protecting APIs, Authentication, API Keys: How they work? SAML, OAuth and JSON Web Tokens
• API Gateway:
Customer Driven contract development
• API testing:
SoapUI, REST-assured
This talk is ideal for the following roles:
Architects
Technical Leads
Programers
Integration Architects
Solution Architects
We are all familiar with the 3rd Normal form. Does that scale? What are the best practices for designing resilient, multi-tenant, performant databases? In this talk, we will explore the database evaluation process, where we will make choices on technology stacks based on requirements and analyzing the CAP theorem. We will discover different Consistency, Availability, and Partition Tolerance techniques, investigate No-SQL databases, and help new cloud deployments using the 3rd Platform.
Big data has characteristics in the new Cloud domain, which requires storing various data for different use-cases. We will explore the Document data store, Key-value, Columnar NoSQL, and Graph NoSQL databases.
Next, we will look at how to do data modeling for NoSQL columnar databases to support highly available partition tolerant use-cases. We will discover different strategies to help multi-tenant requirements. In the end, we will look at how to choose the right database? We will also see the future of Databases compared to Consistency Models, Schema Models, Database Languages, and Database storage.
A few of the technologies we will explore are
This talk is ideal for the following roles:
This talk is designed to catapult your productivity, enhance your emotional intelligence, and refine your problem-solving skills. This talk is not just a series of presentations; it's a transformative experience tailored for the ambitious software developer and architect seeking to leave a mark in the fast-paced world of technology.
Dive into the essence of developer and architect productivity, where we unravel the secrets to optimizing your workflow and leveraging your skills for maximum impact. Discover the “24 Hours Instant Happiness” principle, a proven strategy to inject a dose of joy into your daily routine, fostering a positive work environment and personal life.
“Maximizing Your Impact” takes you deeper into the realm of influence, equipping you with the tools to excel in your projects and inspire those around you. Through “Effective Communication” and the intriguing “Mirror Technique,” learn how to build rapport, foster collaboration, and lead with empathy, amplifying your charisma in all professional interactions.
As we delve into the core of success, “Emotional Intelligence is 85% of Success” highlights the paramount importance of self-awareness, self-regulation, motivation, empathy, and social skills in achieving your goals. The “6 Phase Meditation Approach” and “Day Launcher” sessions are designed to refine your focus, creativity, and emotional stability, setting a solid foundation for a productive day ahead.
The inclusion of “Empathy Maps” and “IDEO Case Studies” offers a practical lens through which to view user-centric design and innovation. At the same time, the “SCAMPER Technique” provides a creative framework for problem-solving, ensuring you're equipped to tackle challenges with agility and inventiveness.
Elevate your productivity to new heights with “5 Choices for Super Productivity,” a comprehensive guide to prioritizing effectively, embracing extraordinary outcomes, and mastering your technology. Learn the art of “Managing Energy, Not Time,” a paradigm shift that promises to enhance your efficiency and job satisfaction.
As the talk culminates, “The Paradox of Choice” and the latest “Technology Trends to Focus On” prepare you to navigate the complexities of the modern tech landscape with confidence and curiosity.
This masterclass is more than just a talk; it's an invitation to transform how you work, lead, and innovate. Join us to unlock your full potential and reshape your future in software development and architecture. Whether you're looking to boost your productivity, enhance your emotional intelligence, or simply find more joy in your work, this talk is your gateway to a more fulfilling career and life.
Developers and Architects are designers, problem solvers, and innovative, creative artists. Software design is an art that requires both left and right brains to be active so you can understand what customers need. Next, we will explore habits and tools to plan, learn, research, organize, teach, develop, mentor, and architect.
Agenda
Enhancing Productivity and Personal Growth
– Developer and Architect Productivity
Strategies for improving daily workflow and efficiency in software development and architecture.
– 24 Hours Instant Happiness
Quick wins for boosting morale and happiness within the team and personal life.
– Maximizing Your Impact
Techniques to increase your influence and contributions in projects and teams.
– Effective Communication
Importance of clear communication and the Mirror Technique to improve understanding and rapport.
– Increasing Charisma
Tips for becoming more charismatic and influential in professional settings.
Building Emotional Intelligence and Mindfulness
– Emotional Intelligence is 85% of Success
Discussing the critical role of emotional intelligence in achieving professional success.
– 6-Phase Meditation Approach
Introducing a meditation technique to enhance focus, creativity, and emotional stability.
– Day Launcher
A strategy to start your day with intention and focus, setting the tone for productivity and success.
– Empathy Map
Utilizing empathy maps to better understand user needs and enhance team collaboration.
– IDEO Case Studies
Examining case studies from IDEO to illustrate successful applications of empathy in design.
– Understanding a Problem with SCAMPER Technique
Exploring the SCAMPER technique to creatively solve problems and innovate solutions.
Strategies for Super Productivity
– 5 Choices for Super Productivity
Detailed strategies for enhancing productivity by prioritizing important tasks, aiming for extraordinary outcomes, scheduling priorities (“big rocks”), mastering technology use, and maintaining energy levels.
– Managing Energy, Not Time
Shifting focus from time management to energy management to maximize productivity and well-being.
– Increasing Frequency to Do What You Want
Techniques to align daily actions with personal and professional goals more effectively.
– The Paradox of Choice
Understanding how reducing options can lead to increased satisfaction and productivity.
– Technology Trends to Focus On
Highlighting current technology trends that developers and architects should be aware of to stay ahead in their field.