Skip to content

The Tech Inducers

Menu
  • Home
  • About
  • Blog
  • Open Source Projects
    • KuhakT Open Source IoT Platform
    • KubeStolz
  • Contact
5G / Cloud

5G: A Transformation Journey towards smart cloud choice or necessity

Introduction: The Fifth Generation of Mobile Telephony, or 5G, or 5GS, is pushing out further, transforming connectivity which enables faster data transfer speeds.  Worldwide, operators are adopting 5G to support …

Cloud / consulting / DevOps / Enterprise Software Architecture / innovation / Security / Technology

The Rain Must Fall!

Is this the Yanni’s iconic composition   – it is the time to realize the concept of mother nature while listening to Yanni’s music. Concept: The big question We are …

Security / Technology

Securing Applications Hosted on Tomcat or JBoss By Enabling SSL at Proxy/Reverse Proxy

A major step towards enhancing application security is to safeguard web interfaces of an application by enforcing SSL with proper TLS version and restrict access over non-secure communication over http. …

Cloud Zone
Cloud / DevOps

CloudZone: Retail platform for multi-cloud/hybrid cloud as a service

Abstract Organization/user provisions for cloud space for services that include, virtual machine to software but user/organization has one to one relation with cloud provider, if they opt for multiple cloud …

Event Driven Architecture
Cloud / DevOps / Enterprise Software Architecture / Technology

Event Driven Cloud Native Architecture

This blog provides utility function in the context of event driven cloud native architecture AWS space: EMR creation using lambda EMR shutdown using lambda Use of SSM to run remote …

Product Security Viewpoint
DevOps / Enterprise Software Architecture / Security

Product security viewpoint

Context: in the era of virtualization, securing application will play a crucial role while deploying product in shared, dedicated or organization tenancy considering data driven nature in the era of …

Cloud / Technology

Fabricate a private secure helm repo for your organization/unit: Part#1(VM/BareMetal)

In this Blog, we will explain the steps to fabricate your own private helm repo using simple web server and php. Few basics about helm chart Lets have look at …

Cloud / DevOps / Technology

Is application/service running in cost effective way: public cloud?

Is application/service running in cost effective way: public cloud? Fig 1 : source system and cloud boundary Context: virtualization and use of cloud adaptation is increasing day-by-day but it also comes with overlapping …

Cloud / Technology

Design Cloud-Native Secure Environment to Host Your Enterprise Application

Design Cloud-Native Secure Environment to Host Your Enterprise Application This article would help to draft an infrastructure layout with Network, IP, VM design for your HA application to be hosted …

Cloud / Technology

Configure Load balancer and ingress controller to route application traffic to kubernetes worker nodes.

Configure Load balancer and ingress controller to route application traffic to kubernetes worker nodes. Configure HAProxy to handle application traffic on https and configure ingress controller to route the traffic to …

Posts navigation

Older posts

Search

Blogs

  • consulting (1)
  • innovation (1)
  • Technology (13)
    • 5G (1)
    • Cloud (11)
    • DevOps (6)
    • Enterprise Software Architecture (3)
    • Security (4)
Copyright © 2023 The Tech Inducers – OnePress theme by FameThemes