Introduction

Swoogle can be identified as a crawler-based indexing and retrieval system for the Semantic Web. Swoogle was invented as the result of a research project of the Ebiquity research group in University of Maryland. Swoogle is especially for semantic web ontologies, documents, terms and data that have been published…


With the enhancement of technology, enterprises and organizations are interested in solutions based on information technology because they can easily interact with their customers. In this scenario, web applications have taken a very important place. …


Today let’s talk about what is Software Licensing. Here I hope to discuss what is Software Licensing and different types of software license.

What is software licensing?

A software license is a document that provides legally binding guidelines for the use and distribution of software.

Software licenses typically provide end…


What is Whistle Blowing?

When you realized some maladministration activity or some wrongdoing within your organization what can you do for it? Whistle blowing is the activity of passing information about the wrongdoing information as a disclosure. Whistle blowing is also known as making a disclosure.

Whether you are an…


I would like to mention that this blog series has been written as a partial requirement for the course : SENG 41283 : Distributed and Cloud Computing.

Under this assignment, I would like to cover these topics:

  1. Set up a sample cloud environment using azure cloud computing platform.
  2. Set up…

The term hash function has been used in computer science from quite some time and it refers to a function that compresses a string of arbitrary input to a string of fixed length. However, if it satisfies some additional requirements then it can be used for cryptographic applications and then…


(Asymmetric Encryption Algorithms)

Introduction

Asymmetric key cryptography is the technique which consist of different keys used for both encryption and decryption process. The different keys are public key and private key. The public key is used for encrypting the original message or the plain text, whereas the private key is…


(Symmetric Encryption Algorithm)

Cryptography is the process of converting the original plain text into cipher text. The sender converts the plain text into cipher text. This cipher text is then sends to the receiver. The authorized receiver gets the cipher text and then convert the cipher text back into the original form. The…


Introduction

First of all, I would like to give a brief introduction about RabbitMQ before. RabbitMQ is an open-source message broker. It is originally implemented the Advanced Message Queuing Protocol (AMQP). …


Introduction for RMI

RMI support an object to invoke a method that running on another JVM (remote object). In RPC for passing necessary parameters, we used pass by value method. But, when the parameters get complex, RMI support passing object references as well.

Sever application creates an object that is…

Hirushka Nirmani

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store