Swoogle can be identified as a Google for all semantic web documents. i.e. it functions as a search engine for semantic web documents or SWDs. Although it was started as a research project at the University of Maryland, it has gained much popularity since then as a system to collect and retrieve semantic web documents.

Swoogle homepage accessible via http://swoogle.umbc.edu/

Any online document written in RDF or OWL can be identified as a semantic web document. These documents have either .rdf or .owl extensions. Other extensions such as rss, n3 and daml are also accepted by Swoogle. Swoogle uses crawler-based indexing and retrieval for SWDs…


Introduction

A Web API or Web Application Programming Interface is a framework which facilitates the provision of services and data to different devices such as laptops, mobile devices etc. A web API can be accessed through HTTP. Simply put, it is an API for the web.

A web API is a web development concept and is limited to the client-side of the web application and details about the webserver or the web browser are not included.

It can be built using technologies such as Java, ASP.net etc. It is an ideal platform to build REST-ful services over the .NET framework. …


SE/2015/012

Photo by Rafael Garcin on Unsplash

This article has been written as a partial requirement for the course : SENG 41283 : Distributed and Cloud Computing at University of Kelaniya, Sri Lanka. The main areas discussed here are :

  • setting up a sample environment in Azure cloud platform
  • the cloud infrastructure setup for a simple web application using the available services in Azure

Disclaimer : The website used in this article is only a sample online platform built by me and does not represent the NATIONAL BLOOD TRANSFUSION SERVICE — SRI LANKA or any of its entities.

Azure Dev Tools

What was formerly known by the names Microsoft Imagine…


A secure digest function or secure hash function is a mathematical function that converts an input into a fixed length output which is called a hash. Hashes are also called as message digests and digital fingerprints.

Graphical representation

Cryptography

Cryptography is the study and practice of hiding data. It provides the services : Confidentiality, Integrity, Authentication and Non-repudiation.

Cryptography is mainly focused on securing data at transit but it can be used for securing data at rest too. It is heavily used in technical controls.

Cryptography ensures that the message sent by the authorized sender is only received by the authorized recipient. Any other party should not be able to read the message.

Message sent by Alice to Bob should not be readable to Mallory

Cryptography

Cryptography is the study and practice of hiding data. It provides the services : Confidentiality, Integrity, Authentication and Non-repudiation.

Cryptography is mainly focused on securing data at transit but it can be used for securing data at rest too. It is heavily used in technical controls.

Cryptography ensures that the message sent by the authorized sender is only received by the authorized recipient. Any other party should not be able to read the message.

Message sent by Alice to Bob should not be readable to Mallory

RabbitMQ is an open-source software and is very popular for message queuing. It is also called as a message-broker or queue manager because it is an intermediary for messaging.

Applications connect to RabbitMQ where queues are defined and those queues are used by the application to transfer messages.

A message could be any one of the following : a text message, information about a process or task that should start on another application etc. RabbitMQ stores these messages until an application that should receive the message connects and takes it from the queue.


What is Remove Method Invocation?

Remove Method Invocation or RMI is a mechanism used by an object residing in one system to call an object running on another address space. It is the Java version of what is generally known as a Remote Procedure Call (RPC). RMI is used to build distributed systems. RMI creates a public remote server object that enables the client and the server to communicate using simple method calls on the server object.

This communication is handled using two intermediate objects : Stub object which is on the client side and Skeleton object which is on the server side.

The stub/skeleton…


What is RPC?

Remote Procedure Call or RPC is a protocol used by a program in order to request a service from another program which could be located in another a computer or network. The program does not have to understand the network’s details when using RPC. A procedure call is also known as function call or subroutine call.

RPC uses client-server model

How does RPC work?

When a remote call is made, the calling environment or client environment is suspended. The parameters of the procedure are transferred across to the environment in which the procedure is to be executed. The procedure is then executed in that environment.

Once the procedure…


What is external data representation?

eXternal data representation or XDR is a standard data serialization format. In other words it is a standard for the description of data in a machine-independent format. It is used in computer network protocols and allows data to be transferred between different kinds of computer networks.

Local representation -> XDR is encoding

XDR -> Local representation is decoding

XDR standard allows representation of data which is independent of computer architectures, programming languages, and compiler conventions. Hence it allows the representation of portable data. …

Shehara Grabau

Inspired by the little things in life, I aspire to be more.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store