Tharindu B. Hewage“Together, Stronger!” — My Toastmaster Journey: Part 02 — Writing a Speech for a PurposeMy Toastmaster Journey part 02 — Writing a Speech for a PurposeApr 7, 2022Apr 7, 2022
Tharindu B. HewageI want to break free!The journey to the Ice Breaker speech of a shy, introvert person who thought he will never be able to face a public audienceJan 29, 2022Jan 29, 2022
Tharindu B. HewageinTowards Data ScienceLet’s build a simple distributed computing system, for modern cloudDesign, develop, and test a fresh distributing computing framework from scratch while focusing on three factors: Simple, Modern, and…Jun 24, 20214Jun 24, 20214
Tharindu B. HewageinExplore CodingDistributed Computing and Apache Hadoop: Why? and How?This blog explains WHY we needed the distributing computing in the first place, and HOW Apache Hadoop implements itJun 4, 20211Jun 4, 20211
Tharindu B. HewageBuilding an open-source playground for the CloudSim FrameworkWe are going to build a CloudSim playground from the ground-up.May 17, 2021May 17, 2021
Tharindu B. HewageCloudSim Setup using IntelliJ IDEAA step-by-step guide on how to configure and execute cloud infrastructure simulations using the CloudSim toolkit with IntelliJ IDEAMay 13, 20211May 13, 20211
Tharindu B. HewageBrowser Cookies Explained!Despite being a buzz word, sometimes browser cookies can confuse end-users or even developers. This blog explains cookies in simpler terms.Nov 21, 2020Nov 21, 2020
Tharindu B. HewageinIdentity UnlockedWriting a custom Log4j2 appender for WSO2 Identity ServerIt’s needless to say that logs are the saviors for developers. They play a vital role in monitoring and debugging software solutions.Sep 9, 2020Sep 9, 2020
Tharindu B. HewageinIdentity Beyond BordersDeploy Office 365 with WSO2 Identity Server!Microsoft Word, Powerpoint, Excel…. and the familiar list go on and on. When I started using a computer, these were the mainstream apps…Apr 4, 2019Apr 4, 2019
Tharindu B. HewageinIdentity Beyond BordersAuthenticate with Vault by HashiCorp Using WSO2 Identity ServerAuthentication and authorization is a crucial part of any secret management system. Thus I would say, Identity and Access management is…Apr 4, 2019Apr 4, 2019