Journey of an IT Architect

  • Cassandra data model (as opposed to relational model)

    Bad data model design with Cassandra causes chronic pains as application scales. I had to re-read about data model design in “Cassandra – the Definitive…

    Read
  • How memory usage adds up in Linux

    There are too many metrics that describes some aspects about memory in Linux. Further to an old article on this site, where several concepts were…

    Read
  • Common local Git operations

    This is a summary of concepts in common Git operations. We will discuss brach, merge, rebase, cherrypick, stash and reset. Then we’ll discuss pull, fetch,…

    Read
  • NTLM and Kerberos protocols

    This article explains how two most common authentication mechanisms (NTLM and Kerberos) work. Both authentication protocols are based on symmetric key cryptography. The protocols themselves…

    Read
  • Introduction to Authentication Frameworks (PAM and SSPI)

    This article gives a very brief high-level introduction to PAM (Pluggable Authentication Module) and SSPI (Security Support Provider Interface) as authentication frameworks in Linux and…

    Read
  • SASL Authentication Mechanisms

    Introduction Authentication is used in many protocols (such as LDAP binding) and it usually involves sending password. Given the nature of authentication protocol, its traffic…

    Read