- Mega Satellite network and next-gen satellites on Cloud -GSaaS slice
Executive Summary Welcome to Satcom series 1 – in this blog we will emphasize on basic understanding of satellite communication – spectrum allocation , types of satellite service is in … - 5G:ProSe Enablement:Can your mobile act as a base station?
Executive summary: In this blog, we will see if we can able to justice to our heading – let’s assume, your friend is in out of network zone and try … - False base station and 5G – how its going so-far ?
Executive summary Start with question – what false base station is? Is it always part of mobile eco system and how it is managed in 2G/3G/LTE or 5G, let’s deep … - 5G Phase 2 Security:Industrial IOT and 5G – how’s going together?
IOT and IIOT IIOT is an eco-system of devices, sensors, actuators, applications for monitoring, analysing data and taking prompt action in proactive manner – in other words it provides visibility … - 5G Phase 2 Security- Associated Threat Model and risk mitigation solutions
Introduction: SA3 group within 3GPP is currently responsible for security in the 5G System including the 3GPP enhancements for IoT and vertical industries. Furthermore, since the introduction of the 5G … - Delta Lake – is it the right one for your data solution?
Delta Lake has become a popular open-source product in data engineering landscape when it comes to modern table formats to power up your data. But is it the right one … - Data Sync System Design
Customer Data or configuration sync of omnichannel B2C offerings is one of very common use cases that we all have addressed as prime system integrator. We would like to navigate … - How vulnerable is 5G – security viewpoint
Executive Summary: The blog starts with a question, are we introducing new threat surface in 5G, we have already made radio flattened and split into RU-DU-CU and attach virtualized capabilities … - 5G Functional Split: Is a choice of cost-effectiveness or network optimization
Executive Summary Functional split is not a new concept in RAN domain, when we moved from 2G to 3G world, CSP had already implemented functional split abstracting in the following … - Open RAN and Openness
Executive summary: With the introduction of nG (n>=5), mobile networks and the equipment that runs them must become more software-driven, virtualized, flexible, intelligent and energy efficient. In the RAN domain, … - 5G: A Transformation Journey towards smart cloud choice or necessity
Introduction: The Fifth Generation of Mobile Telephony, or 5G, or 5GS, is pushing out further, transforming connectivity which enables faster data transfer speeds. Worldwide, operators are adopting 5G to support … - The Rain Must Fall!
Is this the Yanni’s iconic composition – it is the time to realize the concept of mother nature while listening to Yanni’s music. Concept: The big question We are … - Securing Applications Hosted on Tomcat or JBoss By Enabling SSL at Proxy/Reverse Proxy
A major step towards enhancing application security is to safeguard web interfaces of an application by enforcing SSL with proper TLS version and restrict access over non-secure communication over http. … - CloudZone: Retail platform for multi-cloud/hybrid cloud as a service
Abstract Organization/user provisions for cloud space for services that include, virtual machine to software but user/organization has one to one relation with cloud provider, if they opt for multiple cloud … - Event Driven Cloud Native Architecture
This blog provides utility function in the context of event driven cloud native architecture AWS space: EMR creation using lambda EMR shutdown using lambda Use of SSM to run remote … - Product security viewpoint
Context: in the era of virtualization, securing application will play a crucial role while deploying product in shared, dedicated or organization tenancy considering data driven nature in the era of … - Fabricate a private secure helm repo for your organization/unit: Part#1(VM/BareMetal)
In this Blog, we will explain the steps to fabricate your own private helm repo using simple web server and php. Few basics about helm chart Lets have look at … - Is application/service running in cost effective way: public cloud?
Is application/service running in cost effective way: public cloud? Fig 1 : source system and cloud boundary Context: virtualization and use of cloud adaptation is increasing day-by-day but it also comes with overlapping … - Design Cloud-Native Secure Environment to Host Your Enterprise Application
Design Cloud-Native Secure Environment to Host Your Enterprise Application This article would help to draft an infrastructure layout with Network, IP, VM design for your HA application to be hosted … - Configure Load balancer and ingress controller to route application traffic to kubernetes worker nodes.
Configure Load balancer and ingress controller to route application traffic to kubernetes worker nodes. Configure HAProxy to handle application traffic on https and configure ingress controller to route the traffic to …