โ† Back to Home

๐Ÿ“ Blog

Articles about networking, IP addresses, and developer tools

Showing 37-40 of 40 articles

CDN Edge Computing: Cloudflare Workers vs AWS Lambda@Edge

Run code at the edge, milliseconds from users. Compare Cloudflare Workers, Lambda@Edge, and Fastly Compute for serverless edge applications.

Read More โ†’

TLS 1.3 Handshake Explained: 1-RTT, 0-RTT, and Perfect Forward Secrecy

TLS 1.3 is faster and more secure than TLS 1.2. Learn how the handshake was simplified, why RSA key exchange was removed, and how 0-RTT resumption works.

Read More โ†’

BBR vs CUBIC: The Battle of TCP Congestion Control Algorithms

YouTube switched to BBR and saw 4% higher throughput. What makes BBR different from the loss-based CUBIC algorithm? Deep dive into TCP congestion control.

Read More โ†’

RPKI and BGP Security: How Route Origin Validation Prevents Hijacking

BGP was built on trust. Anyone can announce any IP prefix. RPKI adds cryptographic proof of ownership to prevent route hijacking attacks.

Read More โ†’