Rohit Bhardwaj

Director of Architecture, Expert in cloud-native solutions

Rohit Bhardwaj

Rohit Bhardwaj is a Director of Architecture working at Salesforce. Rohit has extensive experience architecting multi-tenant cloud-native solutions in Resilient Microservices Service-Oriented architectures using AWS Stack. In addition, Rohit has a proven ability in designing solutions and executing and delivering transformational programs that reduce costs and increase efficiencies.

As a trusted advisor, leader, and collaborator, Rohit applies problem resolution, analytical, and operational skills to all initiatives and develops strategic requirements and solution analysis through all stages of the project life cycle and product readiness to execution.
Rohit excels in designing scalable cloud microservice architectures using Spring Boot and Netflix OSS technologies using AWS and Google clouds. As a Security Ninja, Rohit looks for ways to resolve application security vulnerabilities using ethical hacking and threat modeling. Rohit is excited about architecting cloud technologies using Dockers, REDIS, NGINX, RightScale, RabbitMQ, Apigee, Azul Zing, Actuate BIRT reporting, Chef, Splunk, Rest-Assured, SoapUI, Dynatrace, and EnterpriseDB. In addition, Rohit has developed lambda architecture solutions using Apache Spark, Cassandra, and Camel for real-time analytics and integration projects.

Rohit has done MBA from Babson College in Corporate Entrepreneurship, Masters in Computer Science from Boston University and Harvard University. Rohit is a regular speaker at No Fluff Just Stuff, UberConf, RichWeb, GIDS, and other international conferences.

Rohit loves to connect on http://www.productivecloudinnovation.com.
http://linkedin.com/in/rohit-bhardwaj-cloud or using Twitter at rbhardwaj1.

Presentations

AWS Certified Solution Architect workshop - Deep Dive

Monday, 11:00 AM EST

AWS Certified Architect is one of the hottest and most valuable certifications in 2021. Amazon Web Services is one of the most popular cloud platforms around.

Abilities Validated by the Certification are:

– Effectively demonstrate knowledge of how to architect and deploy secure and robust applications on AWS technologies.

– Define a solution using architectural design principles based on customer requirements

– Provide implementation guidance based on best practices to the organization throughout the life cycle of the project

In this workshop, we will explore the following topics with hands-on labs:

– Design using compute, networking, storage, and database AWS services, EC2, S3 storage, RDS, DynamoDB
– AWS deployment and management services, Cloud Formation, Identity Access Management
– API Gateway, Route 53
– Serverless architecture, AWS Lambda, Step Functions
– Simple Notification Service (SNS), Simple Queue Service(SQS)
– AWS Cloud Watch, AWS CloudTrail
– Identify and define technical requirements for an AWS-based application
– Recommended best practices for building secure and reliable applications on the AWS platform
– Architectural principles of building on the AWS Cloud
– AWS global infrastructure
– Network technologies as they relate to AWS, Virtual Private Cloud
– Security features and tools that AWS provides and how they relate to traditional services

This talk is ideal for the following roles:
Architects
Technical Leads
Programers
Integration Architects
Solution Architects

Please get free tier AWS account from following link:
https://aws.amazon.com/

Resilient Cloud Architecture Design Patterns

Tuesday, 11:00 AM EST

Resilient architecture is fundamental when working in distributed, cloud-based systems. Designing and architecting large-scale applications managing millions of requests brings unique challenges with availability, performance, and integration. You will need to make difficult choices and evaluate tradeoffs. Luckily, you can use different architecture patterns to make a distributed application more resilient. Based on evolutionary architecture, this approach enables you to create systems designed to evolve with the ever-changing software development ecosystem. Resilient architecture patterns will allow you to create systems that continue functioning even when components fail.

Join expert Rohit Bhardwaj to learn how to implement an evolutionary architecture approach and understand resilient architecture patterns. This training will explore architecture decisions you may need to make when evaluating your architecture to improve performance and resiliency. For example, you will no longer struggle to handle millions of requests per second or face issues when routing traffic.
What you'll learn — and how you can apply it

By the end of this live, hands-on, online course, you'll understand the following:
How to create responsive, maintainable, extensible architecture from resilient, elastic design utilizing message-driven services

How to design cost-effective Recovery Point Objectives (RPOs) and Recovery Time Objectives (RTOs)

How to identify blocking issues with microservices in the cloud

How to evaluate caching strategies that can help lower costs and protect from DOS attacks

And you'll be able to:

Design high availability, high scalability, low latency, and resilient architectures.

Analyze and review implementations.

Identify key scalability challenges in your company.

Prevent cascading failures and preserve functionality.

This training is for you because…

You have an existing need to evaluate your current architecture.

You want to understand best practices.

You need to design new systems and want to evaluate which pattern to use.

Prerequisites

Basic knowledge of software architecture

Familiarity with design principles

Thinking application as stateless for all the API calls makes the system available most of the time and requires creating a cache for common distributed data. Next, we examine how to deal with cascading failures and timeout scenarios. As part of auto-healing, applications need to Detect, Prevent, Recover, Mitigate, and Complement so that the service is resilient.

The key takeaways for the audience are as follows:

*Resiliency is essential for any feature in the cloud.

*Understanding the value chain is critical to identifying failure points.

*Challenges come in determining if there is a failure and designing the system for auto-
healing

*The focus should be first to prevent a failure from occurring.

*Identifying critical challenges in your company and tools and techniques to auto-heal and provide a sustainable solution

Course Schedule

Evolutionary Architecture:

– Scaling to 100 million customers

– Understanding Requirements - Empathy Map

– Fail Points

– Defining KPIs

Resilient Patterns:

– BulkHead pattern

– Routing Strategies

– Design Issues with Microservices

– API Gateway Pattern

– Database per Service Pattern

– Database Sharding Patterns

– Fan out Pattern

– Publish-Subscribe Pattern

– Command Query Responsibility Segregation (CQRS)

– Message filter pattern

– Topic-queue-chaining Pattern

– Message Partitioning Patterns

– Priority Queue Pattern

Caching:

– Caching and Failure Injection

– Distributed system challenges

– Caching Patterns

– Order in Chaos

– Resilient Steps

– Resources

Introduction to Heroku PaaS - 12 Factor Apps

Tuesday, 1:00 PM EST

Ever thought that you write code and promote, the application runs and automatically deploys?
Do you want to deploy free hosting to your apps?
Heroku lets you deploy, run, and manage applications written in open languages and frameworks such as Ruby, Node.js, Java, Python, Clojure, Scala, Go, and PHP. You can quickly deploy your code with a single command using developer tools like git, GitHub, and Docker. We'll build and run your application with our container-based platform, handling compilation, dependencies, assets, and executables so you can focus on creating engaging experiences for your users.

In this talk, we will explore various features of the Heroku Platform, which is a service-based container that manages all the applications.

Ever thought that you write code and promote, the application runs and automatically deploys?
Do you want to deploy free hosting to your apps?
Heroku lets you deploy, run, and manage applications written in open languages and frameworks such as Ruby, Node.js, Java, Python, Clojure, Scala, Go, and PHP. You can quickly deploy your code with a single command using developer tools like git, GitHub, and Docker. We'll build and run your application with our container-based platform, handling compilation, dependencies, assets, and executables so you can focus on creating engaging experiences for your users.

In this talk, we will explore various features of the Heroku Platform, which is a service-based container that manages all the applications.

Designing Well Architected Framework Workshop - Deep Dive

Tuesday, 3:00 PM EST

Secure, Efficient, Resilient, High-performing, Sustainable, and Cost-effective

Are your applications well-architected? This talk will explore the best practices for operational excellence, Security, Reliability, Performance Efficiency, and cost optimization. Think of systems and services which provide business values. Do you know if all of these services are well-architected? You will learn how to create mechanisms, a repeatable process that allows you to improve over time. We will explore the best practices using real-world examples to make them more concrete and actionable.

Well-Architected helps cloud architects build secure, high-performing, resilient, and efficient infrastructure for various applications and workloads. They are built around six pillars—operational excellence, security, reliability, performance efficiency, cost optimization, and sustainability.

Join expert Rohit Bhardwaj to gain the knowledge and skills you need to solve current cloud implementation problems.

What you'll learn — and how you can apply it
By the end of this live, hands-on, online course, you'll understand the following:

– How to create responsive, maintainable, extensible architecture

– How to manage identities for people and machines and understand the significance of role-based, service-based, and attribute-based access

– How to design network topology and protect your network resources

– How to design interactions in a distributed system to prevent failures and improve performance and resiliency

– How to select the best-performing architecture and choose performant storage and databases

– How to manage demand and supply resources

– How to take advantage of user behavior patterns to support your sustainability goals

Topics covered:

Design Principles

– Scaling patterns

– Architecture Design Principles

– Capacity calculations

– Impact of data on design decisions

– Shared Responsibility Model

Reliability

– Resilient Architecture principles

– Herds of complex real-time distributed systems

– Hands-on Exercises / Case Studies

– Blast radius- fault isolation to protect your workload

– Availability patterns

– Recovery Point Objective and Recovery Time Objectives

– Data backup data patterns

– Routing Strategies

– Service quotas and constraints

– Design your workload service architecture

– Failure management in a distributed system

– Monitoring workload resources

– Calculating the response times

– Fallacies of Distributed Systems

– Testing reliability

– Cost Optimization

– Design cost-optimized storage

– Cost-optimized compute

– Data transfer costs

– Manage demand and supply resources

– Hands-on Exercises / Case Studies

Sustainability
– User behavior patterns

– Data access and usage patterns

– Development and deployment processes

– Hands-on Exercises / Case Studies

Performance Efficiency
– Select the best-performing architecture

– Choosing performant storage and databases?

– No-SQL for performance

– Caching strategies

– DOS attacks

– Tradeoffs to improve performance

– Evolving your workload

– Handle skewed data

– CDN networks like Cloudfront to solve the caching requirements for static and Dynamic
contents

– Monitor and set alarms for performance and network issues

– Hands-on Exercises / Case Studies

Operational Excellence
– Principles for Perform Operation Infrastructure as code

– Annotate Documentation - PlayBooks - Part of code

– Create Runbooks - Server down

– Capture failures and analyze them using Events and Real-Time Actions

– KPIs for cloud dashboard

– Incidence response - Root Cause Analysis

– Hands-on Exercises / Case Studies

Security, Privacy, and Compliance
– Manage identities for people and machines

– Identify Access Management

 Role-Based, Service-Based, and Attribute-Based Access

– Securely operate your workload.

– Detect and investigate security events

– Web Application Firewall

– Virtual Private Cloud - design network topology

– Protecting your network resources

– Bastion Hosts

– Data classification

– Protecting data in Transit

– Protecting data at Rest

Hands-on Exercises / Case Studies

Designing Well Architected Framework Workshop - Deep Dive

Tuesday, 5:00 PM EST

Secure, Efficient, Resilient, High-performing, Sustainable, and Cost-effective

Are your applications well-architected? This talk will explore the best practices for operational excellence, Security, Reliability, Performance Efficiency, and cost optimization. Think of systems and services which provide business values. Do you know if all of these services are well-architected? You will learn how to create mechanisms, a repeatable process that allows you to improve over time. We will explore the best practices using real-world examples to make them more concrete and actionable.

Well-Architected helps cloud architects build secure, high-performing, resilient, and efficient infrastructure for various applications and workloads. They are built around six pillars—operational excellence, security, reliability, performance efficiency, cost optimization, and sustainability.

Join expert Rohit Bhardwaj to gain the knowledge and skills you need to solve current cloud implementation problems.

What you'll learn — and how you can apply it
By the end of this live, hands-on, online course, you'll understand the following:

– How to create responsive, maintainable, extensible architecture

– How to manage identities for people and machines and understand the significance of role-based, service-based, and attribute-based access

– How to design network topology and protect your network resources

– How to design interactions in a distributed system to prevent failures and improve performance and resiliency

– How to select the best-performing architecture and choose performant storage and databases

– How to manage demand and supply resources

– How to take advantage of user behavior patterns to support your sustainability goals

Topics covered:

Design Principles

– Scaling patterns

– Architecture Design Principles

– Capacity calculations

– Impact of data on design decisions

– Shared Responsibility Model

Reliability

– Resilient Architecture principles

– Herds of complex real-time distributed systems

– Hands-on Exercises / Case Studies

– Blast radius- fault isolation to protect your workload

– Availability patterns

– Recovery Point Objective and Recovery Time Objectives

– Data backup data patterns

– Routing Strategies

– Service quotas and constraints

– Design your workload service architecture

– Failure management in a distributed system

– Monitoring workload resources

– Calculating the response times

– Fallacies of Distributed Systems

– Testing reliability

– Cost Optimization

– Design cost-optimized storage

– Cost-optimized compute

– Data transfer costs

– Manage demand and supply resources

– Hands-on Exercises / Case Studies

Sustainability
– User behavior patterns

– Data access and usage patterns

– Development and deployment processes

– Hands-on Exercises / Case Studies

Performance Efficiency
– Select the best-performing architecture

– Choosing performant storage and databases?

– No-SQL for performance

– Caching strategies

– DOS attacks

– Tradeoffs to improve performance

– Evolving your workload

– Handle skewed data

– CDN networks like Cloudfront to solve the caching requirements for static and Dynamic
contents

– Monitor and set alarms for performance and network issues

– Hands-on Exercises / Case Studies

Operational Excellence
– Principles for Perform Operation Infrastructure as code

– Annotate Documentation - PlayBooks - Part of code

– Create Runbooks - Server down

– Capture failures and analyze them using Events and Real-Time Actions

– KPIs for cloud dashboard

– Incidence response - Root Cause Analysis

– Hands-on Exercises / Case Studies

Security, Privacy, and Compliance
– Manage identities for people and machines

– Identify Access Management

 Role-Based, Service-Based, and Attribute-Based Access

– Securely operate your workload.

– Detect and investigate security events

– Web Application Firewall

– Virtual Private Cloud - design network topology

– Protecting your network resources

– Bastion Hosts

– Data classification

– Protecting data in Transit

– Protecting data at Rest

Hands-on Exercises / Case Studies

DevSecOps Productivity: Driving Security with Ethical Hacking & OWASP Top 10 for Apps, APIs, LLMs, and Mobile

Tuesday, 7:00 PM EST

As a software architect, you're at the forefront of building scalable, secure, and resilient systems that drive innovation while safeguarding critical digital assets. This workshop is designed to equip you with actionable strategies, cutting-edge tools, and deep technical insights into embedding security into every phase of the software development lifecycle.
In this immersive, hands-on session, we will explore how to elevate your DevSecOps practices to meet the challenges of today’s evolving threat landscape while ensuring productivity and operational excellence.

What You'll Learn:

  • Integrating Security into CI/CD Pipelines:
Discover how to build efficient, secure workflows that empower teams to deliver faster without compromising security. Learn to implement security gates and automate vulnerability detection with tools like SAST, DAST, and dependency scanning.
  • Tracking Metrics for Success:
Understand key DevSecOps metrics such as lead time, deployment frequency, mean-time-to-recover (MTTR), and change fail rate. Learn how observability tools provide actionable insights to optimize performance and reliability.
  • Proactive Security with Ethical Hacking:
Dive into penetration testing and simulate real-world attacks to uncover vulnerabilities in your systems before attackers do. Get hands-on with industry-standard tools such as OWASP ZAP.
  • OWASP Top 10 for Applications, APIs, LLMs, and Mobile:
    • Applications: Learn to identify and mitigate risks such as injection flaws, broken authentication, and misconfigurations.
    • APIs: Secure APIs with best practices for authorization, schema validation, and rate limiting to combat vulnerabilities like excessive data exposure.
    • LLMs: Explore unique challenges in securing Large Language Models (AI-driven applications), including prompt injection and data leakage.
    • Mobile: Address mobile app vulnerabilities such as insecure storage and transport layer protection, ensuring your applications are robust across platforms.
  • Aligning Security with Business Outcomes:
Bridge the gap between technical practices and business goals by aligning DevSecOps with operational KPIs. Demonstrate how secure development drives measurable business value, customer satisfaction, and operational excellence.

Why You Should Attend:

  • Hands-On Experience: Participate in live demonstrations of vulnerabilities, attacks, and their mitigation across applications, APIs, LLMs, and mobile systems.
  • Cutting-Edge Tools and Techniques: Gain exposure to the latest tools and practices in CI/CD, ethical hacking, and observability.
  • Business-Driven Approach: Learn how to connect DevSecOps efforts to organizational success, making security an enabler of productivity.
  • Collaborate with Experts: Engage with peers and experts to discuss real-world challenges and share actionable solutions.

Who Should Attend:
This workshop is ideal for:

  • Software Architects seeking to embed security into every layer of system design.
  • Senior Developers striving to deliver secure, high-performing applications.
  • Technical Leads responsible for ensuring compliance and operational excellence in development pipelines.

Join us for this transformative session to gain the skills and knowledge necessary to design secure, scalable, and resilient systems that protect your organization and enable innovation.

Salient Points Architects Will Learn in This Talk

  • Shift-Left Security: Embed security early in the CI/CD process to catch and resolve vulnerabilities proactively.
  • Key DevSecOps Metrics: Track and optimize lead time, deployment frequency, MTTR, and change fail rate for operational excellence.
  • Ethical Hacking: Learn how to simulate real-world attacks to identify and fix vulnerabilities before they become threats.
  • OWASP Top 10 Insights: Gain actionable strategies to mitigate risks across applications, APIs, LLMs, and mobile platforms.
  • API Security Best Practices: Implement schema validation, token-based authentication, and rate limiting to safeguard APIs.
  • AI Security for LLMs: Address unique vulnerabilities in Large Language Models, including prompt injection and data leakage.
  • Mobile App Security: Protect mobile systems from insecure data storage and transport vulnerabilities using OWASP Mobile Top 10.
  • Business Alignment: Connect DevSecOps practices to measurable business KPIs, demonstrating security’s value in driving success.

This session is a must-attend for architects aiming to design secure, scalable systems while staying ahead in the rapidly evolving security landscape.

Amazon Kinesis an easy way to collect Big Data at scale

Wednesday, 11:00 AM EST

Do you want to not worry about setting up the Kafka connect and want to create an easy way to collect, process, and analyze real-time stream data? In this talk, we will explore how to get data from the website clickstreams, IOT data streams, database logs, data lakes, data warehouses, financial and heal care transitions, social media feeds, or location-based tracking.

In this talk, developers and architectures will get a hands-on understanding of the Producers, Streams, and Consumer designs.

Do you want to not worry about setting up the Kafka connect and want to create an easy way to collect, process, and analyze real-time stream data? In this talk, we will explore how to get data from the website clickstreams, IOT data streams, database logs, data lakes, data warehouses, financial and heal care transitions, social media feeds, or location-based tracking.

In this talk, developers and architectures will get a hands-on understanding of the Producers, Streams, and Consumer designs.

This talk is excellent for:
– Developers/Architects working on Big Data
– Developers/Architects working on Business Intelligence
– DevSecOps users
– Development and analysis of data

DevSecOps pipeline to improve productivity

Wednesday, 1:00 PM EST

Security needs to be part of the software development workflow. This new shift is critical to find issues upfront rather than waiting for applications to perform Penn testing at the end of the development cycle. DevSecOps is in rising to enable organizations to implement security best practices.

In this talk, we will explore Static application Security testing (SAST), Dynamic Application Security Testing (DAST), and Interactive Application Security Testing (IAST). It is critical to check code dependencies to find out about any zero-day attacks. Threat modeling is essential to identify vulnerable connections. Secure coding practices need to be part of the CICD development pipeline.

Security needs to be part of the software development workflow. This new shift is critical to find issues upfront rather than waiting for applications to perform Penn testing at the end of the development cycle. DevSecOps is in rising to enable organizations to implement security best practices.

In this talk, we will explore Static application Security testing (SAST), Dynamic Application Security Testing (DAST), and Interactive Application Security Testing (IAST). It is critical to check code dependencies to find out about any zero-day attacks. Threat modeling is essential to identify vulnerable connections. Secure coding practices need to be part of the CICD development pipeline.

Key takeaways for this talk for testers, developers and architects are as follows:
> Best practices for DevSecOps
> Developer productivity in real-time
> Identifying vulnerabilities before code is released to QA
> Protecting legacy applications
> Tools for automating security testing

Cloud Integrations, Data Architecture and MDM solutions for Enterprise Applications WorkShop

Wednesday, 3:00 PM EST

In Cloud Integrations and Data Architecture talk, we will examine secure, scalable integrations on Enterprise applications. Through various scenarios, we will explore designing and implementing intricate integration patterns on multiple platforms. We will review how to communicate the solution and design trade-offs to business and technical people.

We will explore the following topics:
– Design high-performing, secure, and reliable integrations with applications.
– Analyze existing as-is and future to-be integration models.
– Integration Architecture blueprint. Streaming patterns.
– MDM Tools (Master Data Management).
– Integration with cloud applications. Error handling.
– Effectively communicate architecture design to various stakeholders at many levels.
– Follow best Domain practices in integration.
– Data modeling/Database Design. Data Stewardship. Data Quality Skills (concerned with clean data). Data Governance. Large Data Volume Considerations. Data Migration best practices.
– Architect robust, scalable security mechanisms for interfaces.

This talk is ideal for the following roles:
Architects
Technical Leads
Programers
Integration Architects
Solution Architects

AWS Lambda and Serverless Framework workshop

Wednesday, 5:00 PM EST

Modern applications are all built using Serverless Computing. Serverless is one of the top-paying cloud skills. In this talk, we will explore the AWS Serverless framework. Serverless architecture is a way to build and run applications and services without having to manage infrastructure.
You’ll learn Serverless Computing from beginning to end. We will take a deep dive into best practices, core features, and advanced features including step functions.

We will go over the following topics:
– AWS Lambda
– AWS API Gateway
– Amazon DynamoDB
– AWS Step Functions
– AWS SAM (Serverless Application Model)
– Serverless Framework design patterns
– AWS Continuous Integration Tools like Git, CodeCommit, CodeBuild, CodePipeline
Serverless Integrations Best Practices

Who will benefit from this course?
– Developers and Architects to discover AWS Serverless Lambda and the Serverless Architecture
– DevOps Professionals who want to understand CICD pipelines
– Developers or Architects who want to design serverless applications using the best practices in serverless computing

Prerequisites?
Have access to an AWS Account, some familiarity to AWS
JavaScript knowledge

This talk is ideal for the following roles:
Architects
Technical Leads
Programers
Integration Architects
Solution Architects

AWS Lambda and Serverless Framework workshop

Wednesday, 7:00 PM EST

Modern applications are all built using Serverless Computing. Serverless is one of the top-paying cloud skills. In this talk, we will explore the AWS Serverless framework. Serverless architecture is a way to build and run applications and services without having to manage infrastructure.
You’ll learn Serverless Computing from beginning to end. We will take a deep dive into best practices, core features, and advanced features including step functions.

We will go over the following topics:
– AWS Lambda
– AWS API Gateway
– Amazon DynamoDB
– AWS Step Functions
– AWS SAM (Serverless Application Model)
– Serverless Framework design patterns
– AWS Continuous Integration Tools like Git, CodeCommit, CodeBuild, CodePipeline
Serverless Integrations Best Practices

Who will benefit from this course?
– Developers and Architects to discover AWS Serverless Lambda and the Serverless Architecture
– DevOps Professionals who want to understand CICD pipelines
– Developers or Architects who want to design serverless applications using the best practices in serverless computing

Prerequisites?
Have access to an AWS Account, some familiarity to AWS
JavaScript knowledge

This talk is ideal for the following roles:
Architects
Technical Leads
Programers
Integration Architects
Solution Architects