Author of Cloud Networking and Resilience (Apress, 2026). Building the frameworks, patterns, and tools that keep distributed systems reliable at scale. 20+ years across IBM, Cisco, Microsoft, and AWS.
I've spent 20+ years building, breaking, and fixing networks — from Rome's telecom exchanges to London's enterprise data centers to Geneva's cloud architectures. The path went through IBM, Cisco, Riverbed, Microsoft, and now AWS, where I lead networking and resilience strategy across EMEA.
My book Cloud Networking and Resilience (Apress, May 2026) distills everything I've learned about keeping distributed systems reliable — from BGP routing to cell-based architectures to chaos engineering. The live monitor on this page is a working demonstration of those concepts.
Over 57 certifications across Cisco, AWS, Microsoft Azure, Riverbed, IBM, Wireshark, Aviatrix, and more — spanning networking, security, cloud architecture, and resilience. Recognised with awards from Microsoft (WW SME Networking, CSS Impact), AWS (AWSome All Star, Hidden Hero, Growth Mindset, AWSome Builder), Aviatrix (Cloud Networking Hero), and DeMolay International (Chevalier, Legion of Honour).
I don't just write about resilience. I measure it — in real time, from 20 collectors, across every continent.
Real-time BGP routing intelligence from RIPE RIS collectors worldwide. Every concept in the book — resilience scoring, route analytics, convergence timing, deep signal analysis — running live. Single-file. Zero dependencies. Built from scratch.
Still here? Good. Most people don't look past the surface. You clearly think differently.
See this dashboard the way a NOC engineer would. Full screen. No distractions. Just the internet, live.
Interactive cell-based architecture simulation. Click any cell or Direct Connect path to inject a failure — watch Route 53 health checks detect, ARC routing controls flip via the control plane, and traffic reroute.
Bulkhead isolation · Shuffle sharding · Route 53 ARC · Cell Router (ELB) · DX Maximum Resilience · Active/Active ECMP
Anycast DNS entry point. Health checks poll cells every 10s with 3-failure threshold (~30s detection). Returns healthy cell IPs to clients.
Control plane only — not in data path. Overrides Route 53 routing control states (ON/OFF per cell) to steer traffic away from impaired cells. Readiness checks audit cell resources every 60s (capacity, config, quotas). Multi-Region cluster ensures extreme availability.
Elastic Load Balancer per cell. Routes client requests to cell compute. Layer 7 routing with path-based rules, cross-AZ distribution.
Independent fault domain. Each cell has its own compute, data store, and ELB. Failures are contained within cell boundaries (blast radius reduction).
Aurora Global Database has one primary writer cluster (Cell A) with read replicas in other cells and Regions (<1s replication lag). If the writer fails, Aurora promotes a read replica to writer. Cell B holds a local read replica in the same Region for low-latency reads. You could substitute DynamoDB Global Tables or another multi-region data store depending on your workload.
DX Gateway is a global construct that associates with regional Transit Gateways and Direct Connect connections, enabling on-premises traffic to reach any associated Region without separate DX connections per Region. For Region-to-Region traffic (e.g. Cell A replicating to Cell C), inter-Region TGW peering provides a direct path between Regions without hairpinning through on-premises — completing the multi-Region mesh.
4 connections across 2 geographically separated metros (active/active ECMP). Both paths carry traffic simultaneously. VPN backup activates only when both DX paths fail. For simplicity, the simulation shows one link per metro location rather than the full two-connection-per-site topology.
IPSec tunnel in standby. Auto-activates when all DX connections fail. Higher latency but ensures on-premises connectivity is never fully lost.
Probabilistic tenant isolation. Instead of linear blast radius (fc/tc), overlap probability is P² — dramatically reducing the chance that any two tenants share the same failed cells.
For clarity, this simulation omits some networking components: regional Transit Gateways, TGW peering attachments, VPC route tables, security groups, NACLs, and NAT Gateways. In production, each cell would have its own TGW attachment and full VPC networking stack.
Enterprise-grade connectivity across AWS, Azure, and GCP. Direct Connect, ExpressRoute, Cloud WAN, Transit Gateway, VWAN, PrivateLink — at global scale.
Cell architectures, bulkhead patterns, shuffle sharding, blast radius reduction. Author of the Resilience Lifecycle Framework and the D-CAT compliance engine.
AIOps-driven observability, anomaly detection, and predictive remediation. GPU/TPU compute design, secure inference pipelines, and AI-ready network fabrics for distributed systems at enterprise scale.
EU regulatory compliance: DORA (Digital Operational Resilience Act) and NIS2 (Network and Information Security Directive). Built D-CAT — scanning 30+ AWS services across multiple regions. Enabling 22,000+ regulated entities across EMEA.
BGP, MPLS, segment routing, DNSSEC, Anycast DNS, multi-provider resilience. Deep protocol-level expertise from ISP and Telco roots. The monitor above runs on this.
Zero trust at cloud scale. Stateful/stateless firewalls, DDoS mitigation, DLP, micro-segmentation. Fortune 100 deployments across 15,000+ workloads.
Available for keynotes, breakout sessions, and technical deep-dives on cloud resilience, AIOps, DORA compliance, BGP routing, and distributed systems architecture.
Happy to join conversations about internet resilience, cloud networking at scale, the future of infrastructure, and what DORA and NIS2 mean for regulated industries.
Published author (Apress). Contributor to technical guides and best-practice documentation. Writing about what I build, break, and fix.
Topics I speak and write about:
Available for conference talks, podcasts, and technical deep-dives on cloud resilience and networking architecture. For press and book inquiries, reach out directly.