Design, develop, and test a fresh distributing computing framework from scratch while focusing being Simple, Modern, and Extensible

“The joy of building something new” —

The way of writing software is much different now. Being cloud native is one of the key goals for almost every software system architecture out there.

In this article, we will explore how can we build a simple and extensible distributed computing framework, tailored for the modern cloud. …

A dashboard with user statistics : It provides us with a glimpse about the vast scale of data genaration in today’s interner-era computer systems. Picture credits:

This blog is going to explore WHY a project like Apache Hadoop was created, and HOW it negotiates resources in a distributed computing infrastructure. In the end of this blog, you will be able to understand the fundamental reasons of why we needed the distributed computing platforms, and how Apache…

Young boy digs with his hands in the sand at the playground (Many thanks to )

In my , I talked about configuring the popular JAVA IDE, IntelliJ IDEA to implement CloudSim simulation scenarios.

Which is a more up-to date approach.

But what I felt while working on this fun project is that depending on an IDE to use the framework…

Source:

CloudSim is a simulation toolkit for cloud environments, which allows modelling cloud computing infrastructures with various application loads, configurations, etc. CloudSim is a community driven project initially developed by the Cloud Computing and Distributed Systems (CLOUDS) Laboratory, University of Melbourne and under the GPL license.

Being an extensible framework, the…

source:

Authentication and authorization is a crucial part of any secret management system. Thus I would say, Identity and Access management is the cornerstone for all secret management systems. Secrets, which are literally needed to be handled by the correct person with the correct privileges, cannot go into wrong hands.

In…

source:

Authentication and authorization is a crucial part of any secret management system. Thus I would say, Identity and Access management is the cornerstone for all secret management systems. Secrets, which are literally needed to be handled by the correct person with the correct privileges, cannot go into wrong hands.

In…

Tharindu Bandara

Cloud and AI Researcher | Former Senior Full-Stack Engineer@WSO2 | IAM Specialist | Ph.D. Candidate

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store