Design, develop, and test a fresh distributing computing framework from scratch while focusing being Simple, Modern, and Extensible

“The joy of building something new” —

The way of writing software is much different now. Being cloud native is one of the key goals for almost every software system architecture out there.

In this article, we will explore how can we build a simple and extensible distributed computing framework, tailored for the modern cloud. …


A dashboard with user statistics : It provides us with a glimpse about the vast scale of data genaration in today’s interner-era computer systems. Picture credits:

This blog is going to explore WHY a project like Apache Hadoop was created, and HOW it negotiates resources in a distributed computing infrastructure. In the end of this blog, you will be able to understand the fundamental reasons of why we needed the distributed computing platforms, and how Apache…


Young boy digs with his hands in the sand at the playground (Many thanks to )

In my , I talked about configuring the popular JAVA IDE, IntelliJ IDEA to implement CloudSim simulation scenarios.

Which is a more up-to date approach.

But what I felt while working on this fun project is that depending on an IDE to use the framework…


Source:

CloudSim is a simulation toolkit for cloud environments, which allows modelling cloud computing infrastructures with various application loads, configurations, etc. CloudSim is a community driven project initially developed by the Cloud Computing and Distributed Systems (CLOUDS) Laboratory, University of Melbourne and under the GPL license.

Being an extensible framework, the…


source:

Browser cookies are pieces of information set in your browser by the remote servers. Often people have heard the term but not really clear on the use case that it is intended to cover. In this blog post, I will discuss why we needed this technique in the first place…


It’s needless to say that logs are the saviors for developers. They play a vital role in monitoring and debugging software solutions.

In an abstract view, logging involves providing useful information during the code execution. With production code, usually, there are different levels of logging this information such as AUDIT…


Image source:

Microsoft Word, Powerpoint, Excel…. and the familiar list go on and on. When I started using a computer, these were the mainstream apps, actually the only apps I started using!

Microsoft Office suite is been there for a long, long time. …


source:

Authentication and authorization is a crucial part of any secret management system. Thus I would say, Identity and Access management is the cornerstone for all secret management systems. Secrets, which are literally needed to be handled by the correct person with the correct privileges, cannot go into wrong hands.

In…


Image source:

Microsoft Word, Powerpoint, Excel…. and the familiar list go on and on. When I started using a computer, these were the mainstream apps, actually the only apps I started using!

Microsoft Office suite is been there for a long, long time. …


source:

Authentication and authorization is a crucial part of any secret management system. Thus I would say, Identity and Access management is the cornerstone for all secret management systems. Secrets, which are literally needed to be handled by the correct person with the correct privileges, cannot go into wrong hands.

In…

Tharindu Bandara

Cloud and AI Researcher | Former Senior Full-Stack Engineer@WSO2 | IAM Specialist | Ph.D. Candidate

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store