A dashboard with user statistics : It provides us with a glimpse about the vast scale of data genaration in today’s interner-era computer systems. Picture credits: https://unsplash.com/photos/JKUTrJ4vK00?utm_source=unsplash&utm_medium=referral&utm_content=creditShareLink

This blog is going to explore WHY a project like Apache Hadoop was created, and HOW it negotiates resources in a distributed computing infrastructure. In the end of this blog, you will be able to understand the fundamental reasons of why we needed the distributed computing platforms, and how Apache Hadoop implement distributed computing. We will specially focus on resource negotiation in the distributed computings nodes.

This question is if you you were born in 90’s. Do you remember when it was all about CDs or DVDs, and downloading anything from internet was like super slow 😩 …

By then…


Young boy digs with his hands in the sand at the playground (Many thanks to https://unsplash.com/photos/mlwM6legtwY?utm_source=unsplash&utm_medium=referral&utm_content=creditShareLink)

In my previous article about the CloudSim framework, I talked about configuring the popular JAVA IDE, IntelliJ IDEA to implement CloudSim simulation scenarios.

Which is a more up-to date approach.

But what I felt while working on this fun project is that depending on an IDE to use the framework makes it IDE-bounded!

This is a fun word that I just came up with ;) The more accurate word would be the Vendor lock-in.

The risk associated with an IDE-bounded scenario is that we are building on top of the IntelliJ IDEA thus depending on the decisions taken by IDE…


Source: cloudsim

CloudSim is a simulation toolkit for cloud environments, which allows modelling cloud computing infrastructures with various application loads, configurations, etc. CloudSim is a community driven project initially developed by the Cloud Computing and Distributed Systems (CLOUDS) Laboratory, University of Melbourne and under the GPL license.

Being an extensible framework, the CloudSim toolkit allows researches to add modifications to cloud data centres similar to new resource provisioning algorithms, and then simulate how the cloud infrastructure would handle a given workload with the new modifications. The data gathered from this simulation is then used for the analysis. …


source: https://cooking.nytimes.com/recipes/1021435-perfect-chocolate-chip-cookies

Browser cookies are pieces of information set in your browser by the remote servers. Often people have heard the term but not really clear on the use case that it is intended to cover. In this blog post, I will discuss why we needed this technique in the first place, and how it helps servers to enhance the end-user experience. But before we begin, we need to talk a bit about the HTTP protocol.


https://en.wikipedia.org/wiki/Log4j

It’s needless to say that logs are the saviors for developers. They play a vital role in monitoring and debugging software solutions.

In an abstract view, logging involves providing useful information during the code execution. With production code, usually, there are different levels of logging this information such as AUDIT, INFO, DEBUG, etc. Each level helps to focus only on interesting information. For example, debug logs provide detailed information about the logical decision taken and values for runtime variables, which is extremely useful to find a runtime bug in the code. …


Image source: https://www.em360tech.com/tech-news/microsoft-office-365-used-app-enterprise/

Microsoft Word, Powerpoint, Excel…. and the familiar list go on and on. When I started using a computer, these were the mainstream apps, actually the only apps I started using!

Microsoft Office suite is been there for a long, long time. In fact, it was originally released on November 19, 1990, 28 years ago!

Since then Microsoft has been changing its shape with each iteration. You have to do that, when you have something great, it has to adapt to the changing technology. Otherwise, someone, at some point will knock you out.

We have come to the age of cloud…


source: https://www.quintessencelabs.com/blog/securing-vault-quantum-cybersecurity/

Authentication and authorization is a crucial part of any secret management system. Thus I would say, Identity and Access management is the cornerstone for all secret management systems. Secrets, which are literally needed to be handled by the correct person with the correct privileges, cannot go into wrong hands.

In this blog, we will integrate the Identity and Access Management from the open source WSO2 Identity Server, to one of the most popular secret management systems, the HashiCorp Vault.

What is the Vault by HashiCorp?

Imagine, during the development of your application, you have a requirement to create a database connection. This requires to store credentials…


Image source: https://www.em360tech.com/tech-news/microsoft-office-365-used-app-enterprise/

Microsoft Word, Powerpoint, Excel…. and the familiar list go on and on. When I started using a computer, these were the mainstream apps, actually the only apps I started using!

Microsoft Office suite is been there for a long, long time. In fact, it was originally released on November 19, 1990, 28 years ago!

Since then Microsoft has been changing its shape with each iteration. You have to do that, when you have something great, it has to adapt to the changing technology. Otherwise, someone, at some point will knock you out.

We have come to the age of cloud…


source: https://www.quintessencelabs.com/blog/securing-vault-quantum-cybersecurity/

Authentication and authorization is a crucial part of any secret management system. Thus I would say, Identity and Access management is the cornerstone for all secret management systems. Secrets, which are literally needed to be handled by the correct person with the correct privileges, cannot go into wrong hands.

In this blog, we will integrate the Identity and Access Management from the open source WSO2 Identity Server, to one of the most popular secret management systems, the HashiCorp Vault.

What is the Vault by HashiCorp?

Imagine, during the development of your application, you have a requirement to create a database connection. This requires to store credentials…


source: https://www.clickssl.net/blog/why-am-i-facing-the-certificate-not-trusted-error

When you tried the playground app with WSO2 Identity Server, did you notice that before going into the management console, the above warning message is displayed?.

And also, there will be a Not Secure warning added to the URL too.

What actually happened was...

Browser sees the user is trying to access the management console of the Identity Server, https://localhost:9443/carbon. It then asks from the identity server,

“Prove that you really own localhost!

Tharindu Bandara

Cloud and AI Researcher | Former Senior Full-Stack Engineer@WSO2 | IAM Specialist | Ph.D. Candidate

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store