- 5G Phase 2 Security:Industrial IOT and 5G – how’s going together?IOT and IIOT IIOT is an eco-system of devices, sensors, actuators, applications for monitoring, analysing data and taking prompt action in proactive manner – in other words it provides visibility …
- 5G Phase 2 Security- Associated Threat Model and risk mitigation solutionsIntroduction: SA3 group within 3GPP is currently responsible for security in the 5G System including the 3GPP enhancements for IoT and vertical industries. Furthermore, since the introduction of the 5G …
- Delta Lake – is it the right one for your data solution?Delta Lake has become a popular open-source product in data engineering landscape when it comes to modern table formats to power up your data. But is it the right one …
- Data Sync System DesignCustomer Data or configuration sync of omnichannel B2C offerings is one of very common use cases that we all have addressed as prime system integrator. We would like to navigate …
- How vulnerable is 5G – security viewpointExecutive Summary: The blog starts with a question, are we introducing new threat surface in 5G, we have already made radio flattened and split into RU-DU-CU and attach virtualized capabilities …
- 5G Functional Split: Is a choice of cost-effectiveness or network optimizationExecutive Summary Functional split is not a new concept in RAN domain, when we moved from 2G to 3G world, CSP had already implemented functional split abstracting in the following …
- Open RAN and OpennessExecutive summary: With the introduction of nG (n>=5), mobile networks and the equipment that runs them must become more software-driven, virtualized, flexible, intelligent and energy efficient. In the RAN domain, …
- 5G: A Transformation Journey towards smart cloud choice or necessityIntroduction: The Fifth Generation of Mobile Telephony, or 5G, or 5GS, is pushing out further, transforming connectivity which enables faster data transfer speeds. Worldwide, operators are adopting 5G to support …
- The Rain Must Fall!Is this the Yanni’s iconic composition – it is the time to realize the concept of mother nature while listening to Yanni’s music. Concept: The big question We are …
- Securing Applications Hosted on Tomcat or JBoss By Enabling SSL at Proxy/Reverse ProxyA major step towards enhancing application security is to safeguard web interfaces of an application by enforcing SSL with proper TLS version and restrict access over non-secure communication over http. …
- CloudZone: Retail platform for multi-cloud/hybrid cloud as a serviceAbstract Organization/user provisions for cloud space for services that include, virtual machine to software but user/organization has one to one relation with cloud provider, if they opt for multiple cloud …
- Event Driven Cloud Native ArchitectureThis blog provides utility function in the context of event driven cloud native architecture AWS space: EMR creation using lambda EMR shutdown using lambda Use of SSM to run remote …
- Product security viewpointContext: in the era of virtualization, securing application will play a crucial role while deploying product in shared, dedicated or organization tenancy considering data driven nature in the era of …
- Fabricate a private secure helm repo for your organization/unit: Part#1(VM/BareMetal)In this Blog, we will explain the steps to fabricate your own private helm repo using simple web server and php. Few basics about helm chart Lets have look at …
- Is application/service running in cost effective way: public cloud?Is application/service running in cost effective way: public cloud? Fig 1 : source system and cloud boundary Context: virtualization and use of cloud adaptation is increasing day-by-day but it also comes with overlapping …
- Design Cloud-Native Secure Environment to Host Your Enterprise ApplicationDesign Cloud-Native Secure Environment to Host Your Enterprise Application This article would help to draft an infrastructure layout with Network, IP, VM design for your HA application to be hosted …
- Configure Load balancer and ingress controller to route application traffic to kubernetes worker nodes.Configure Load balancer and ingress controller to route application traffic to kubernetes worker nodes. Configure HAProxy to handle application traffic on https and configure ingress controller to route the traffic to …
- Setting up private secure docker registry as service with authenticationSetting up private secure docker registry as service with authentication Its extremely necessary to have a docker registry within your docker/kubernetes eco systems. Commonly we setup insecure docker registry by …
- Event Based Runtime migration platform As a Service on Public CloudEvent Based Runtime Infrastructure As a Service on Public Cloud What and How Space Cloud infrastructure provides the easy way to manage vms including creation/termination and provides language specific api — but what …
- Setting Up Kubernetes Cluster — single cp or multiple cpSetting Up Kubernetes Cluster — single cp or multiple cp K8s(1.17.3) cluster on RHEL7.6/CENTOS7 This blog explains how to setup kubernetes cluster with single/multiple(HA) control plane. Prerequisites RHEL 7 or CentOS bare metal server …