Swoogle is a crawler-based indexing and retrieval system for the Semantic Web. Swoogle is especially for semantic web ontologies, documents, terms and data that have been published on the web. As I mentioned earlier it is a crawler based indexing and retrieval system and it crawls for documents written in…


Web API is the improved version of the web application to provide services on modern devices like laptop, mobile, and others. Nowadays, every type of business tries to connect with IT solutions to improve their revenue. Web applications can be identified as very popular, since there is no requirement for…


Software licensing describes the legal rights pertaining to the authorized use of digital material. Failure to adhere to software license agreement terms often incurs criminal charges related to licensed intellectual property (IP) and copyrighted material.

Simply that is an agreement between you and the owner of a software program that…


What will you do when you realized, there have been illegal, or maladministration scenarios happen within your organization? Do you like to blow the whistle expose the wrongdoing? How do you handle that sort of complicated incident while protecting your reputation as a professional?

This article is about ethical whistle…


Introduction

First of all, I would like to mention that this blog series has been written as a partial requirement for the course : SENG 41283 : Distributed and Cloud Computing.

The scope I am going to cover from this article is:

  1. Setting up testing cloud environment using Azure cloud…

A secure digest function is also called as secure hash function and it is a mathematical function that converts an input into a fixed length output and that output is called a hash. Hashes are also called as message digests and digital fingerprints. …


ASYMMETRIC KEY CRYPTOGRAPHY

Asymmetric key cryptography is the technique which consist of different keys used for both encryption and decryption process. Normally, there are two key types and one key is called public key and another key is called private key.

Private key — This key must be known only…


Cryptography is all about hiding information. That means Cryptography is used to ensure the protection of data when that data might be exposed to untrusted parties. Even from the past days to present various cipher methods, physical devices, and aids have been used to encrypt and decrypt the data.

In…


Introduction

In distributed systems, message passing among application takes a very important role. Therefore, message broker concept can be recognized as an effective mechanism for communication. It provides decoupling to the communication because senders (providers) does not need to be aware of their receivers which means it provides space uncoupling.


Introduction for Remote Method Invocation

As we discussed about the RPC (Remote Procedure Calls) in previous article, both RPC and RMI is for facilitate the communication between the client and the server (direct communication).

Simply, Remote Method Invocation is to allow an object to invoke an object that runs in…

Yasiru Kavishka

Software Engineering Undergraduate at University of Kelaniya

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store