5G Functional Split: Is a choice of cost-effectiveness or network optimization

Executive Summary Functional split is not a new concept in RAN domain, when we moved from 2G to 3G world, CSP had already implemented functional split abstracting in the following …

Open RAN and Openness

Executive summary: With the introduction of nG (n>=5), mobile networks and the equipment that runs them must become more software-driven, virtualized, flexible, intelligent and energy efficient.  In the RAN domain, …

5G: A Transformation Journey towards smart cloud choice or necessity

Introduction: The Fifth Generation of Mobile Telephony, or 5G, or 5GS, is pushing out further, transforming connectivity which enables faster data transfer speeds.  Worldwide, operators are adopting 5G to support …

The Rain Must Fall!

Is this the Yanni’s iconic composition   – it is the time to realize the concept of mother nature while listening to Yanni’s music. Concept: The big question We are …

Securing Applications Hosted on Tomcat or JBoss By Enabling SSL at Proxy/Reverse Proxy

Experienced Solution Architect at Ericsson
TOGAF Certified Enterprise Software Architect with ~15 years(out of which 3.2 years Bellevue, USA) of hands-on experience in working for international customers as Technology Architect. My major focus is in the area of Solution Architecture-Applications,Solution Development , Technical Pre Sales, Technical Product Strategy Planning & Execution, Requirement Gathering & Analysis, Cloud, Security and DevOps. I have Bachelor of Engineering in Computer Science & Engineering from the Visvesvaraya Technological University(VTU) India.
Md Shamimuddin(Shamim)

A major step towards enhancing application security is to safeguard web interfaces of an application by enforcing SSL with proper TLS version and restrict access over non-secure communication over http. …

Cloud Zone

CloudZone: Retail platform for multi-cloud/hybrid cloud as a service

Abstract Organization/user provisions for cloud space for services that include, virtual machine to software but user/organization has one to one relation with cloud provider, if they opt for multiple cloud …

Event Driven Architecture

Event Driven Cloud Native Architecture

This blog provides utility function in the context of event driven cloud native architecture AWS space: EMR creation using lambda EMR shutdown using lambda Use of SSM to run remote …

Product Security Viewpoint

Product security viewpoint

Context: in the era of virtualization, securing application will play a crucial role while deploying product in shared, dedicated or organization tenancy considering data driven nature in the era of …

Fabricate a private secure helm repo for your organization/unit: Part#1(VM/BareMetal)

Experienced Solution Architect at Ericsson
TOGAF Certified Enterprise Software Architect with ~15 years(out of which 3.2 years Bellevue, USA) of hands-on experience in working for international customers as Technology Architect. My major focus is in the area of Solution Architecture-Applications,Solution Development , Technical Pre Sales, Technical Product Strategy Planning & Execution, Requirement Gathering & Analysis, Cloud, Security and DevOps. I have Bachelor of Engineering in Computer Science & Engineering from the Visvesvaraya Technological University(VTU) India.
Md Shamimuddin(Shamim)

In this Blog, we will explain the steps to fabricate your own private helm repo using simple web server and php. Few basics about helm chart Lets have look at …

Is application/service running in cost effective way: public cloud?

Is application/service running in cost effective way: public cloud? Fig 1 : source system and cloud boundary Context: virtualization and use of cloud adaptation is increasing day-by-day but it also comes with overlapping …