Nipun Nadeeshana LiyanageRate LimitersThink of a scenario where a client sends large amounts of requests to a service in succession. There are scaling protocols in place with…Oct 31, 2022Oct 31, 2022
Nipun Nadeeshana LiyanageMicroservicesIn this article, let’s take a look at the domain of microservices.Oct 30, 2022Oct 30, 2022
Nipun Nadeeshana LiyanageWhat are DoS and DDoS attacks? SimplifiedIf you have touched even the surface of the subject of Cyber Security, there’s a 99.9% chance that you have heard the words DoS and DDoS…Oct 12, 2022Oct 12, 2022
Nipun Nadeeshana LiyanageHow to Manage Dependencies with BOMDependencies are packages or code libraries that support the development process. They provide commonly reused functionalities and makes…Oct 6, 2022Oct 6, 2022
Nipun Nadeeshana LiyanageServerless withAWSFirst of all, before going into the content, let us clarify what serverless means. Serverless is a cloud development model that allows…Sep 23, 2022Sep 23, 2022
Nipun Nadeeshana LiyanageJava ThreadsThere are two main ways that multitasking in a computer is facilitated.Sep 7, 2022Sep 7, 2022
Nipun Nadeeshana LiyanageWeb Services using SOAPWhat comes to your mind when you hear the word webservice? A common misconception that people have about web services is that they are…Sep 6, 2022Sep 6, 2022
Nipun Nadeeshana LiyanagePush, Polling and StreamsWhen you are designing an asynchronous system, these technical design concepts are really useful. In this article let’s take a look at…Sep 5, 2022Sep 5, 2022
Nipun Nadeeshana LiyanageWhat is a Proxy?The word proxy in general means an agent who has the legal authority to represent someone else. A proxy server on the internet does more or…Sep 5, 2022Sep 5, 2022
Nipun Nadeeshana LiyanageREST URL Naming ConventionsRepresentational State Transfer or most commonly known as REST is an architectural style that provides standards between computer systems…Sep 5, 2022Sep 5, 2022