How to optimize your Azure Investments ?Organizations always want to do “more” with “less”. Optimizing the cloud investments is always an ongoing activity for every business…Oct 17, 2023Oct 17, 2023
How to protect businesses from Cyber Security Attacks?Cyber Security Attacks are becoming increasingly common across industries.Dec 6, 2022Dec 6, 2022
Introduction to VerrazzanoContainer adoption has been on the rise in last several years. Containers provide rapid development, deployment and scalability and it can…Aug 19, 2021Aug 19, 2021
What is a Modern Application ?To define a modern application , let us analyze the requirements of a modern software application in todays digital world which is…Jul 30, 2021Jul 30, 2021
latency , bandwidth and throughoutLatency is the time taken for a network packet to go from source to destination and come back.Feb 14, 2021Feb 14, 2021
TCP Load Balancer vs HTTP Load BalancerIn TCP Load Balancers, the incoming TCP connections are “tunneled” through the Load Balancer and the application payload is opaque to the…Feb 14, 2021Feb 14, 2021
How to convert CIDR Notation to IP Address Range ManuallyThough there are lot of online tools to convert CIDR notation into IP address range but its always good to learn how the Host IP address…Feb 5, 2021Feb 5, 2021