top of page
34632129796_1de0bf7819_h.jpg
40186860614_908bd2234b_c.jpg
Rohit 3.jpg
Audience Clapping
Business Conference

Productive Cloud Innovation

Start Today

Your journey towards a better way of Cloud Computing begins today. Whether you’re looking for a speaking engagement, Cloud Architecture development or coaching, Productive Cloud Innovations will provide exceptional results.

Home: Welcome

Speaking

With a strong portfolio of varied speaking engagements, Productive Cloud Innovations could be the perfect fit for what you’re looking for. Read below to learn more about what they have to offer.

26381099513_456a14e7e3_n.jpg
26381098253_e1f82196e7_n.jpg
34542475651_ba76be063d_h.jpg

Keynote Speaking

Productive Cloud Innovations builds a program and experience that dives into the needs of your audience. Packed with practical tips and useful skills, people gain a positive mindset and a desire to put their knowledge to action.

Cloud Technologies

Let Rohit Bhardwaj help you deliver great content that will have attendees ready to take action in the Cloud with ease. He will generate impactful buzz with a talk that will be completely customized for you and your audience.

Architecture Development

Rohit Bhardwaj is a talented and skilled Software Architecture Speaker who knows how to get a crowd inspired. With a focus on facing challenges while identifying opportunities, your audience will be fully engaged throughout.

Home: Speaking
34632129796_1de0bf7819_h_edited_edited.jpg

Presentations

2020

Home: List

Amazon Kinesis an easy way to collect Big Data at scale

Do you want to not worry about setting up the Kafka connect and want to create an easy way to collect, process, and analyze real-time stream data? In this talk, we will explore how to get data from the website clickstreams, IOT data streams, database logs, data lakes, data warehouses, financial and heal care transitions, social media feeds, or location-based tracking.

In this talk, developers and architectures will get a hands-on understanding of the Producers, Streams, and Consumer designs.

This talk is excellent for:
– Developers/Architects working on Big Data
– Developers/Architects working on Business Intelligence
– DevSecOps users
– Development and analysis of data

Well Architected Framework workshop

Are your applications well architected?

In this talk, we will explore the best practices on operational excellence, Security, Reliability, Performance Efficiency, Cost Optimizations. Think of systems and services which provides business values, do you know if all of these services are well architected? You will learn how to create mechanisms, which is a repeatable process to allow you to improve over time.
We will explore the best practices using real-world examples to make it more concrete and actionable.

Developers and Architects will learn about the following:

Value proposition and components of Well-Architected

How to use Well-Architected Tool to measure workloads

Apply the Best practices and Design principles to your applications

Self-service framework

How to build and deploy faster

How to lower the risks

Make informed decisions

Resilient Cloud Architecture Design Patterns

Resilient architecture is crucial for all cloud implementations. In this talk, we explore different design patterns to make a distributed application more resilient.

As part of this journey, for any process, we need to ask what if something goes wrong? Then, plan a course of action to the process auto heal without any human intervention and how to lower risks by performing canary deployments. Design starts with at first understanding of requirements and performing empathy map and value chain analysis.

Thinking application as stateless for all the API calls makes the system available most of the time requires creating a cache for common distributed data. Next, we examine how to deal with cascading failures, and timeouts scenarios. Applications, as part of auto-healing, need to Detect, Prevent, Recover, Mitigate, Complement so that the service is resilient.

Key takeaways for the audience are as follows:

Resiliency is essential for any feature in cloud
Understanding the value chain is critical to identify failure points
Challenges come in determining if there is a failure and design the system for auto healing
The focus should be first to prevent a failure to occur.
Identifying key challenges in your company and tools and techniques to auto-heal and provide a sustainable solution

10x productivity for Developers and Architects

Productivity is key to success in software development. We will be exploring different principles, so you do not have to work for 60 to 80 hours a day? Are you multitasking and nothing is getting done? Do you feel that there are lots of moving parts and nothing is getting accomplished? What can you do to make a difference in your organization? What techniques can you adopt to eliminate distractions? How to solve a given problem more efficiently? These will be some of the questions and challenges we will address in this talk. Developers and Architects are designers, problem solvers, and innovative, creative artists. Software design is an art, which requires both left, and right brains to be active so you can understand what customer needs. Next, we will explore habits and tools to plan, learn, research, organize, teach, develop, mentor and architect.

Apache Cassandra, Spark and Spark Streaming for Real Time Big Data Analytics

Apache Cassandra is one of the best solutions for storing and
retrieving data. We will explore data analytics cluster computing
framework with real-world examples. It is 100x faster than Hadoop!
We will start with an introduction to Apache Cassandra. We will explore challenges encountered when attempting to scale
with relational databases, and how NoSQL databases like Cassandra address those problems. It reviews the Cassandra architecture, benefits, and how to use the Cassandra read and write paths.

Later, you will learn how to effectively and efficiently solve analytical problems using Apache Spark, Apache Cassandra, and DataStax. You will learn about Spark API, Spark-Cassandra Connector, Spark SQL, Spark Streaming, and fundamental performance optimization techniques.
Big Data applications nowadays require a faster speed of data
processing and analysis.

AWS Certified Solution Architect an Overview

AWS Certified Architect is one of the hottest and most valuable certifications in 2020.
Amazon Web Services is one of the most popular cloud platforms around.
Abilities Validated by the Certification

Effectively demonstrate knowledge of how to architect and deploy secure and robust applications on AWS technologies

Define a solution using architectural design principles based on customer requirements

Provide implementation guidance based on best practices to the organization throughout the life cycle of the project

In this talk, we will explore:

Design using compute, networking, storage, and database AWS services

AWS deployment and management services

Identify and define technical requirements for an AWS-based application

Recommended best practices for building secure and reliable applications on the AWS platform

Architectural principles of building on the AWS Cloud

AWS global infrastructure

Network technologies as they relate to AWS

Security features and tools that AWS provides and how they relate to traditional services

DevSecOps pipeline to improve productivity

Security needs to be part of the software development workflow. This new shift is critical to find issues upfront rather than waiting for applications to perform Penn testing at the end of the development cycle. DevSecOps is in rising to enable organizations to implement security best practices.

In this talk, we will explore Static application Security testing (SAST), Dynamic Application Security Testing (DAST), and Interactive Application Security Testing (IAST). It is critical to check code dependencies to find out about any zero-day attacks. Threat modeling is essential to identify vulnerable connections. Secure coding practices need to be part of the CICD development pipeline.

Key takeaways for this talk for testers, developers and architects are as follows:
> Best practices for DevSecOps
> Developer productivity in real-time
> Identifying vulnerabilities before code is released to QA
> Protecting legacy applications
> Tools for automating security testing

ELK Stack - all you need for search in your applications

Elasticsearch is a distributed, open-source search and analytics engine for all types of data, including textual, numerical, geospatial, structured, and unstructured. Known for its simple REST APIs, distributed nature, speed, and scalability, Elasticsearch is the central component of the Elastic Stack, a set of open-source tools for data ingestion, enrichment, storage, analysis, and visualization. Commonly referred to as the ELK Stack (after Elasticsearch, Logstash, and Kibana), the Elastic Stack now includes a rich collection of lightweight shipping agents known as Beats for sending data to Elasticsearch.
So what are the primary use cases for Elasticsearch?
Application search
Website search
Enterprise search
Logging and log analytics
Infrastructure metrics and container monitoring
Application performance monitoring
Geospatial data analysis and visualization
Security analytics
Business analytics

Enterprise Ethical Hacking Cloud Applications

Securing of the web application is an enormous task. In this talk, we will explore how to protect enterprise applications. We will explore different kinds of vulnerabilities and hot to secure your applications properly. Security patterns need to be understood by first wearing the hat of a hacker and then putting the hat as a defender. In this workshop, we will explore different security patterns and determine how to prevent attacks.
We will be using Kali Linux to understand Ethical hacking techniques using Metasploitable applications. In the end, we will see how OpenVas can help in scanning the vulnerabilities in the application.
In this workshop we will explore following:
Threat Modeling techniques using Threat modeling tool
Reconnaissance to gather information, Google hacking database, Exploit Database
Scanning for vulnerabilities using Burp Proxy, FoxyProxy, SSL Scan, OWASP ZAP
Exploitation with DOS attacks
Risk Analysis

Enterprise Security for OWASP top 10 Workshop

Understanding OWASP top ten will give your application development team a clear vision on how to find the security flaws. We will focus on identifying the weaknesses and provide the ability to the architect or developer in coming up with a robust design.
We will explore the Top Ten vulnerabilities including:
• SQL injection
• Session management
• Cross-Site Scripting (XSS)
• Cross-Sift Request Forgery (CSRF)
• Security misconfigurations

We will be using Kali Linux to understand Top 10 vulnerabilities using Metasploitable applications. In the end, we will see how OpenVas can help in scanning the vulnerabilities in the application.

Enterprise Security, Privacy and Data compliance

Data integrity, security, recovery, privacy and regulatory compliance are essential attributes for enterprise implementation. Enterprise customers ask for transparency in how the vendors will provide security programs. Many questions need to be asked for any cloud implementation to policy makers, architects, coders, and testers.
In this presentation, we will explore data security and storage, privacy, and data compliance issues. We will explore the security management in the cloud. The presentation is useful for anyone starting from Executives to developers who are going to implement the Enterprise Applications in both private and public cloud.

Introduction to Heroku PaaS Apps

Ever thought that you write code and promote, the application runs and automatically deploys?
Do you want to deploy free hosting to your apps?
Heroku lets you deploy, run, and manage applications written in open languages and frameworks such as Ruby, Node.js, Java, Python, Clojure, Scala, Go, and PHP. You can quickly deploy your code with a single command using developer tools like git, GitHub, and Docker. We'll build and run your application with our container-based platform, handling compilation, dependencies, assets, and executables so you can focus on creating engaging experiences for your users.

In this talk, we will explore various features of the Heroku Platform, which is a service-based container that manages all the applications.

Multi-Tennant NoSQL cloud data design patterns

In this talk, we will explore database evaluation process where we will make choices on technology stacks based on requirements and analyzing CAP theorem. We will discover different techniques for Consistency, Availability, and Partition Tolerance and investigate how No-SQL databases and helping new cloud deployments using the 3rd Platform.
Big data has characteristics in the new Cloud domain, which requires storing a variety of data for different use-cases. We will explore Document data store, Key value, Columnar NoSQL and Graph NoSQL databases. Few of the technologies we will explore are Amazon DynamoDB, MongoDB, Hadoop, REDIS, MemcacheDB, and RDF / SPARQL, Neo4J, HBase, Cassandra, and SPARK.
Next, we will look at how to do data modeling for NoSQL columnar databases to support highly available partition tolerant use-cases. We will discover different strategies to support multitenant requirements. In the end, we will look at how to choose the right database? Also, we will see what future of Databases comparing based on Consistency Models, Schema Models, Database Languages and Database storage.

Solving Analytical Problems using Apache Spark

In this talk, we will explore why Spark is the most prominent solution as compared to just Hadoop. We will look at MapReduce and how Spark makes the creation of Big Data algorithms simple and faster. Next, we will explore Spark Context and how Resilient Distributed Dataset (RDD) to help with the establishment of Directed Acyclic Graph (DAG); Transformations using map and filter; Actions using collect, count and reduce. Later we will explore the Spark Cassandra connector. We will look at Spark API and Spark SQL. We will also discuss how DataStax helps give a high level of stability to open source Apache Spark and Apache Cassandra projects.
Key takeaways from this talk will be for a developer and architect to understand how Apache Spark and Apache Cassandra helps in implementing enterprise level analytical solutions. It is 100x faster than Hadoop!

Top 10 Algorithms for Coding Interviews

So we all the best coders, but have you see the run time of the code you are writing? What is its time complexity? O(n) or O(log n) What can you do to improve the space complexity?
In most of the top companies, algorithm and coding problems are critical before you get the face to face interview.
The interviewer is looking for how you approach a problem? How you solve the problem? How you optimize the problem?

This talk will not only prepare you for the interviews but will also give confidence on how to crack the coding interview challenges.

In this talk, we will be exploring analytical skills, and coding skills of the top 10 algorithms and common problems asked in interviews. Problem-solving skills are valuable and help develop optimal algorithms. We will look at problem-solving flow charts to make the right decisions for a given problem.

Top 10 Metrics for DevSecOps successful projects

Metrics are essential to measuring success for DevOps. In this talk, we will explore different dimensions and how to measure the Metrics and apply quality gates for DevSecOps projects.
As part of our exploration, we will look at how businesses can connect DevOps with Business Metrics. Ultimately Business value is critical for survival for any business. Management needs to realize keeping DevSecOps will help in the speed of development and also track how well the company is doing.
We will explore four main metrics in detail:
Lead Time: The time from code written to entering production
Deployment Frequency: How often deploys happen
Mean-Time-To-Recover (MTTR): How quickly can teams restore service after production outages
Change Fail Rate: What percentage of deploys result in service impairment or an outage