Skip to main content

AWS

Deploying Agentic AI with MCP and A2A Capability on Amazon EKS

Deploying Agentic AI with MCP and A2A Capability on Amazon EKS

In-Short

CaveatWisdom

Caveat: You’ve built intelligent agents with MCP tools (Post 1) that communicate autonomously via A2A (Post 2). But deploying them without proper orchestration creates disasters: exposed credentials in containers, inability to handle load spikes when 500 RFQs hit simultaneously, no isolation between agents and MCP tools leading to security breaches, and operational nightmares with manual scaling. Ad-hoc deployments work in development but create security vulnerabilities and scalability bottlenecks in production.

Read More →
Beyond APIs – How Agent-to-Agent Communication Protocols Enable Autonomous Business Networks

Beyond APIs – How Agent-to-Agent Communication Protocols Enable Autonomous Business Networks

In-Short

CaveatWisdom

Caveat: In my previous post, we solved internal communication—your Purchase Agent talks to enterprise systems through MCP. But here’s the next challenge: your agent needs to negotiate with Supplier Agents from completely different companies. Traditional API integrations create tight coupling—every new supplier requires custom integration work, manual orchestration for multi-party negotiations, and brittle connections that break with every change. You can’t build autonomous business networks with custom APIs for each supplier.

Read More →
Enterprise Procurement Reimagined – How Agentic AI with MCP Tools Transforms B2B Negotiations

Enterprise Procurement Reimagined – How Agentic AI with MCP Tools Transforms B2B Negotiations

In-Short

CaveatWisdom

Caveat: Your AI procurement agent needs real-time data from Logistics, Production, Stores, Finance, and Operations to make informed decisions. But here’s the trap: each enterprise system speaks a different language with proprietary APIs. Without standardized tool protocols, you end up with brittle agents that have hard-coded integrations. Every API change breaks your agent. Every new system means weeks of custom development. Your agent makes suboptimal decisions because it can’t access complete enterprise data.

Read More →
Domain Driven Design in Vector Databases

Domain Driven Design in Vector Databases

In-Short

CaveatWisdom

Caveat: We’ve all been swept up by the magic of Generative AI. Add a Retrieval-Augmented Generation (RAG) pipeline with Vector Databases on top, and your AI system suddenly sounds smarter—context-aware, grounded, and business-specific. But here’s the trap: Just bolting on a vector database doesn’t mean your AI is contextually intelligent. In fact, if your RAG database is a chaotic soup of embeddings from every business unit imaginable, you may have just created a slightly faster way to serve wrong answers—with more confidence.

Read More →
Industrial Evolution – Helping Engineers to Slash Break-Down Maintenance Time with Gen AI

Industrial Evolution – Helping Engineers to Slash Break-Down Maintenance Time with Gen AI

In-Short

CaveatWisdom

Caveat: If root cause during a machine break-down maintenance is not identified with-in time and proper procedures to fix the problem safely is not followed in a challenging industrial environment then they can lead to lot of production loss and create safety concerns for maintenance personal.

Wisdom: Expert level understanding and huge experience in interpreting the problem in machines is required to troubleshoot and fix machines. By leveraging cutting edge Generative AI and IoT technologies which help in understanding root cause and fix problems, break-down maintenance time can be slashed from days to few hours.

Read More →
Understanding Industrial Protocols in the Perspective of IoT and Cloud

Understanding Industrial Protocols in the Perspective of IoT and Cloud

In-Short

CaveatWisdom

Caveat: To take advantage of latest technologies like Generative AI on Cloud, data is being ingested from different sources into the Cloud, coming to real-time industrial data, it’s important to understand the nature of data and it’s flow from its source on shop floor of the industry to its destination in the cloud.

Wisdom: To understand the nature of data and its flow, we need to understand the protocols involved at different levels of data flow, like Modbus, Profibus, EtherCAT, DNP3, OPC, MQTT, etc.

Read More →
The Response from Generative AI depends on Our Intelligence more than the Intelligence within It

The Response from Generative AI depends on Our Intelligence more than the Intelligence within It

In-Short

CaveatWisdom

Caveat:

It is easy to type a question and get a response from the Generative AI, however it is important to get the right answer as per the context, because Large Language Models (LLMs) of Generative AI are designed to predict only the next word and they can hallucinate if they don’t get the context right or if they don’t have the required information with-in them.

Below is the screenshot of above example and response from Gen AI model in Amazon Bedrock

Read More →
Applying Mechanical Sympathy with Built-In Algorithms of Amazon SageMaker

Applying Mechanical Sympathy with Built-In Algorithms of Amazon SageMaker

Mechanical Sympathy

The term Mechanical Sympathy was coined by racing driver Jackie Stewart, he said that “You don’t have to be an engineer to be a racing driver, but you do have to have Mechanical Sympathy.” He meant that understanding how a car works makes you a better driver. In case of Machine Learning by understanding when to use a specific algorithm we can get maximum efficiency from the resources we provision in the cloud.

Read More →
Best Practices in Implementing Security Groups  for Web Application on AWS

Best Practices in Implementing Security Groups for Web Application on AWS

In-Short

CaveatWisdom

Caveat: Its easy to assign source as large VPC wide CIDR range (ex: 10.0.0.0/16) in Security Groups for private instances and avoid painful debugging of data flow however we are opening our systems to a plethora of security vulnerabilities. For example, a compromised system in the network can affect all other systems in the network.

Wisdom:

  1. Create and maintain separate private subnets for each tier of the application.
  2. Only allow the required traffic for instances, you can do this easily by assigning “Previous Tier Security Group” as the source (from where the traffic is allowed) in the in-bound rule of the “Present tier’s Security Group”.
  3. Keep Web Servers as private and always front them with a managed External Elastic Load Balancer.
  4. Access the servers through Session Manager in the System Manager Server.

In-Detail

Read More →
Running Containers on AWS as per Business Requirements and Capabilities

Running Containers on AWS as per Business Requirements and Capabilities

We can run containers with EKS, ECS, Fargate, Lambda, App Runner, Lightsail, OpenShift or on just EC2 instances on AWS Cloud. In this post I will discuss on how to choose the AWS service based on our organization requirements and capabilities.

In-Short

CaveatWisdom

Caveat: Meeting the business objectives and goals can become difficult if we don’t choose the right service based on our requirements and capabilities.

Wisdom:

  1. Understand the complexity of your application based on how many microservices and how they interact with each other.
  2. Estimate how your application scales based on business.
  3. Analyse the skillset and capabilities of your team and how much time you can spend for administration and learning.
  4. Understand the policies and priorities of your organization in the long-term.

In-Detail

Read More →