The Joy of Secs: Part 3

Posted by Mark Hornsby on 2019-08-08

One of the most widely deployed asymmetric cryptographic algorithms used today (driven by the popularity of blockchain technology) is based on elliptic curves over finite fields. Like all good engineers I struggled to just accept how they work. I needed to dig deeper to better understand the mathematics and in doing so decided to share my experience …

The Joy of Secs: Part 2

Posted by Mark Hornsby on 2019-08-08

One of the most widely deployed asymmetric cryptographic algorithms used today (driven by the popularity of blockchain technology) is based on elliptic curves over finite fields. Like all good engineers I struggled to just accept how they work. I needed to dig deeper to better understand the mathematics and in doing so decided to share my experience …

The Joy of Secs: Part 1

Posted by Mark Hornsby on 2019-08-08

One of the most widely deployed asymmetric cryptographic algorithms used today (driven by the popularity of blockchain technology) is based on elliptic curves over finite fields. Like all good engineers I struggled to just accept how they work. I needed to dig deeper to better understand the mathematics and in doing so decided to share my experience …

Docker overlay networking without swarm

Posted by Mark Hornsby on 2016-10-10

Docker multi-host networking, provided by the overlay driver, was introduced in Docker 1.9. This new feature allows you to virtually network multiple Docker host machines together and thus allows the containers therein communicate with each other directly overlay secure network tunnels.

Zookeeper Dynamic Config

Posted by Mark Hornsby on 2016-07-29

In this post I’ll describe how to use Zookeeper Dynamic Config, a feature introduced in version 3.5 of Zookeeper that allows you to dynamically add and remove nodes from an ensemble. Prior to the 3.5.0 release, the membership and all other configuration parameters of Zookeeper were static - loaded during boot and immutable at runtime. This resulted in operators having to execute rolling restarts to reconfigure clusters, sometimes resulting in data loss and inconsistency in production. All this will change as the 3.5 release reaches maturity …