Operating ML Beyond Accuracy

The Incident A fraud detection model with 98% test accuracy was silently blocking legitimate customers for six months.No alerts fired. No system crashed. The dashboards looked healthy.But the business was losing $765,000 every month. The model wasn’t broken in development — it was broken in production. This case study explains how the failure wasn’t caused by bad … Read more

Best MLOps Practices: A Real-World Case Study

How we at Infivit transformed chaotic ML experiments into a production-ready system using modern MLOps practices The Hidden Crisis in Machine Learning Teams Machine learning was supposed to make our lives easier. The promise was simply to build smart models, deploy them, and watch as they solve complex problems automatically. But if you’ve worked on … Read more

Reducing Client AWS Costs by 70% with LocalStack

As a cloud consulting company, we’ve seen our share of AWS bills. But when our client forwarded us their monthly statement with a concerned email, even we were surprised. $3,247 for the month. The breakdown was what really caught our attention: They were literally spending more on building the product than running it in production. … Read more

From FTP Chaos to Zero-Trust Data Pipelines

We helped an organization move from a messy and risky way of handling vendor files to a modern system that is secure, automated, and ready to scale.Using Azure Data Lake and Databricks, we designed the entire platform around the Medallion Architecture — a layered approach (Bronze, Silver, and Gold) that cleans and improves data step-by-step … Read more

Penetration Testing: First Line of Defence🛡️

In today’s digital world, protecting an organisation’s data and systems is no longer just a technical task—it is a core business priority. Cyber threats are constantly evolving, and relying only on basic security measures is not enough. Organisations need proactive and continuous security checks to stay ahead of attackers. Penetration testing is one of the … Read more

Multi-Region GitLab Runners on AWS

Modern software development demands fast, scalable, and fault-tolerant CI/CD pipelines. To meet these needs, we’ve architected a GitLab CI/CD solution that combines custom GitLab Runners across multiple AWS regions with robust monitoring and deployment workflows. This article walks through two core components: Multi-Region GitLab Runner Architecture (High Availability) To ensure high availability and regional redundancy, … Read more

Multi-Account AWS Networking with Transit Gateway

Learn how to automate secure, multi-account networking using AWS Transit Gateway — the backbone of enterprise cloud architectures. What You’ll Learn In this hands-on demo, we’ll explore: An AWS Transit Gateway (TGW) acts as a central hub to interconnect multiple Virtual Private Clouds (VPCs) and on-premises networks. As cloud environments expand across regions, inter-Region peering enables Transit Gateways to … Read more

🚀 Accelerate Deployments with Argo CD Image Updater

In the fast-moving world of software development, continuous integration and continuous delivery (CI/CD) have become essential for delivering quality features at speed. At Infivit, we recently streamlined CI/CD pipeline for one of our client by integrating GitHub Actions with Argo CD Image Updater, resulting in a significant boost in deployment automation, developer velocity, and operational … Read more

Code-to-Cloud : The Safe Way 🚀

🔍 Introduction As modern software development accelerates with DevOps and GitOps, security must be baked into every phase of the SDLC. Enter Cycode — a full-stack software supply chain security platform that unifies visibility and control across source code, pipelines, IaC, secrets, and more. Cycode doesn’t just scan code; it integrates security across your entire development ecosystem. Think … Read more

Guarding Apps with Guardsquare

🛡 What is Guardsquare?Guardsquare is a security-focused company best known for tools like ProGuard, DexGuard, and AppSweep. These tools help Android/iOS developers obfuscate, optimize, and secure their apps against various forms of reverse engineering and runtime threats. ✳ Core Products: ⚙️ Why Use Guardsquare? 🔗 Integrating Guardsquare Tools into Android/iOS Projects 1. List Applications On … Read more