Posts

Showing posts from 2016

Cassandra and Consistency - A Simplified Explaination

Cassandra is architected for read-write (RW) anywhere, enabling any client to connect to any node in any datacenter (DC). The concept of a primary or single master node does not exist in Cassandra. This allows for drastically increased RW times as master node is not taking all the traffic. The flip side is that there is not a single source of truth (SSOT) as you would see in a RDBMS such as MySQL where you assume the master or primary is always correct. Cassandra has abilities to manage this though. REPLICATION FACTOR (RF): This determines how many copies of data exists. CONSISTENCY LEVEL (CL): This determines how many nodes must acknowledge a read or write before an acknowledgement of a write commit or the data is returned. Examples would be ALL, ONE, QUORUM, etc. Effectively a level of assurance that a write occurred or your read is against the freshest data. Let’s look at two nodes for example. WRITES : If the data is simply being split between the two nodes evenly an

US Federal PKI: Part I - Getting Started and the Value of Validation

Image
Understanding the Basics: Bare Necessities In order to understand Federal PKI systems, it is first imperative to understand the concepts, components, and challenges around it. The following are high level overviews of these topics. What is PKE? Public Key Encryption is a type of asymmetric encryption, used to ensure confidentiality, integrity, and nonrepudiation of a message. In Public Key Cryptography, the user has a private key , which only they will ever have, and a public certificate that is published for external use. The private key and public key work in opposites to encrypt and decrypt data. Anything encrypted by the public key can only be decrypted by the private key, and visa versa. The benefit here is that anything a user signs with their private key proves that they did in fact sign it, as only they have that key. Anything encrypted with the user’s public key, can then only be decrypted by them. What is PKI? Public Key Infrastructure is the underlying