About us

Building secure enterprise cloud networks, one joint effort at a time.

Learn about cloud networking

Search My Blog Posts

I write my min time to time. Only when it can provide a value and simplify a complex concept.

When you read the title, a few things come to mind.Q: “What does it actually mean?”Q: “It is a very bold statement and a bit controversial too.” So here is my take on this topic and statement. The idea that the network is the cloud is […]
Q: How do neural networks learn from data? Please describe the main process or methodology used? A: Neural networks learn from data through a process called “training” which involves using algorithms such as backpropagation. During training, the network adjusts its weights in response to the errors […]
NETFLOW V9 gives you both options to use. Either IPT (IP Network Traffic) or L7 (Layer7 Traffic) NetFlow version 9 has more flexibility in flow export configuration and customization on key fields (how packets are aggregated to flows) and what information is being exported. Flexible NetFlow […]

A few things we’re great at

Helping YOU!

Learn

Complex topics in easy manner

educate

Keep up with the innovation in cloud networking

upskill

Gain more knowledge and prepare for new realities

sharing

We share what we know you should do the same

Design Principles

Designing Cloud Network requires following the Well-Architected framework design pillars. Remember CRAMPS.

cost

Cost optimization is key for cloud networks. Pay special attention to Egress Charges

recoverability

Recover from failure by building multi region applications. For DR scenarios, consider multiple clouds.

availability

Build Active Active links with automatic failure options in the network. Don’t forget the hybrid connections.

MANAGEABILITY

Manage network with IaC (Infrastructure as Code) options such as Terraform. Single pane for visibility is the key.

PERFORMANCE

Performance of the network must be planned. Do not rely only on the auto scale features to optimize for performance.

Security

Security must be part of the network. Follow Zero-Trust Network Architecture approach.

contact information

Social Media Contacts