Cloud Computing
-
๐๐ฟ๐ฐ๐ต๐ถ๐๐ฒ๐ฐ๐๐ถ๐ป๐ด ๐ฎ ๐ ๐๐น๐๐ถ-๐๐ป๐ฒ๐ฟ๐ด๐ ๐๐ผ๐ฟ๐ฒ๐ฐ๐ฎ๐๐๐ถ๐ป๐ด ๐ฃ๐น๐ฎ๐๐ณ๐ผ๐ฟ๐บ: ๐ ๐๐ผ๐บ๐ฎ๐ถ๐ป-๐๐ฟ๐ถ๐๐ฒ๐ป ๐๐ฒ๐๐ถ๐ด๐ป ๐ฃ๐ฟ๐ถ๐บ๐ฒ๐ฟ
In this series, Iโll present a step-by-step guide to designing a scalable cloud architecture for a multi-energy, multi-step forecasting platform. This first post focuses on applying Domain-Driven Design (DDD) to structure the problem space and lay the foundation for implementation. Drawing from the 2025 paper โA Multi-Energy Meta-Model Strategy for Multi-Step Ahead Energy Load Forecastingโ Continue reading
-
Considerations for AI in Business Ecosystems
I had the opportunity to deliver a high-level presentation on how solutions architecture plays a pivotal role in the implementation of AI and ML from a tactical perspective. The session was engaging, with a majority of the audience being product owners eager to understand the intersection of cloud solutions and AI/ML innovation. Based on my Continue reading
-
Generic cloud services across architectural layers: a foundational package for cloud architectures

In designing, implementing, and governing cloud solutions, it is critical to define a baseline set of core services that must be considered in every architecture, regardless of the specific cloud platform. These foundational services ensure that essential capabilities โ such as security, observability, governance, lifecycle management, and cost control โ are embedded from the start. Continue reading
-
Risks and Mitigation Strategies in Multi-Cloud Environments
According to a talk by Teena Idnani, Senior Solution Architect from Microsoft, presented at the QCon event by InfoQ, I created a short risk assessment for the case she presented about Multi-Cloud Environments in Event-Driven Architectures for the fictional company FinBank. By examining the key points discussed, I identified the following risks: By addressing these Continue reading
-
Security

Protect confidentiality, integrity, and availability. Think of it as constructing a secure vault (CIA triad), where thick, reinforced walls and a complex lock system prevent unauthorized individuals from accessing sensitive information (protect confidentiality). To ensure integrity, authorized access is necessary, with a vigilant guard ensuring that only authorized personnel can enter and modify the contents Continue reading
- May 2025 (6)
- April 2025 (11)
- March 2025 (1)
- December 2024 (1)
- November 2024 (1)
- October 2024 (1)
- September 2024 (1)
- August 2024 (1)
- July 2024 (1)
- December 2023 (1)
- November 2023 (2)
- October 2023 (1)
- April 2023 (1)
- March 2023 (7)
