TOGAF Certified Enterprise Software Architect with ~15 years(out of which 3.2 years Bellevue, USA) of hands-on experience in working for international customers as Technology Architect. My major focus is in the area of Solution Architecture-Applications, Solution Development , Technical Pre Sales, Technical Product Strategy Planning & Execution, Requirement Gathering & Analysis, Cloud, Security and DevOps. I have Bachelor of Engineering in Computer Science & Engineering from the Visvesvaraya Technological University(VTU) India.
Delta Lake has become a popular open-source product in data engineering landscape when it comes to modern table formats to power up your data. But is it the right one …
Customer Data or configuration sync of omnichannel B2C offerings is one of very common use cases that we all have addressed as prime system integrator. We would like to navigate …
Executive Summary: The blog starts with a question, are we introducing new threat surface in 5G, we have already made radio flattened and split into RU-DU-CU and attach virtualized capabilities …
Executive Summary Functional split is not a new concept in RAN domain, when we moved from 2G to 3G world, CSP had already implemented functional split abstracting in the following …
Executive summary: With the introduction of nG (n>=5), mobile networks and the equipment that runs them must become more software-driven, virtualized, flexible, intelligent and energy efficient. In the RAN domain, …
Introduction: The Fifth Generation of Mobile Telephony, or 5G, or 5GS, is pushing out further, transforming connectivity which enables faster data transfer speeds. Worldwide, operators are adopting 5G to support …
Is this the Yanni’s iconic composition – it is the time to realize the concept of mother nature while listening to Yanni’s music. Concept: The big question We are …
A major step towards enhancing application security is to safeguard web interfaces of an application by enforcing SSL with proper TLS version and restrict access over non-secure communication over http. …
Abstract Organization/user provisions for cloud space for services that include, virtual machine to software but user/organization has one to one relation with cloud provider, if they opt for multiple cloud …
Context: in the era of virtualization, securing application will play a crucial role while deploying product in shared, dedicated or organization tenancy considering data driven nature in the era of …