Articles on Trending Technologies

Technical articles with clear explanations and examples

Difference between WiFi and Ethernet

Kiran Kumar Panigrahi
Kiran Kumar Panigrahi
Updated on 05-Jan-2023 6K+ Views

WiFi is a wireless network to connect nearby devices with each other and share the Internet via hotspots. Ethernet, on the other hand, is a LAN network standard used in wired LAN. Go through this article to find out more about the features of WiFi and Ethernet and how they are different from each other.What is WiFi?WiFi stands for Wireless Fidelity. It defines any network based on the 802.11 standards, allows computers and devices with the required wireless capacity to communicate via radio waves with other computers or devices. IEEE established the 802.11 network standards, which describe how two wireless ...

Read More

Explain the Scope and Scope Chain in JavaScript

Shubham Vora
Shubham Vora
Updated on 05-Jan-2023 2K+ Views

In JavaScript, the scope defines how and in which part of our code we can access the variables and functions. In simple terms, the scope helps us improve our code's security and readability. So, we can access the variables and functions only inside its scope but not outside. We will discuss multiple types of scopes in this tutorial. Global Scope in JavaScript The variables and functions defined globally mean outside all blocks and functions with global scope. We can access all variables and functions with the global scope anywhere inside our code. Syntax Users can follow the syntax below ...

Read More

Difference Between Downloading and Uploading

Kiran Kumar Panigrahi
Kiran Kumar Panigrahi
Updated on 05-Jan-2023 7K+ Views

Downloading is a process in which the files are copied from a web server to a client machine, whereas Uploading is a process in which a client machine transmits the data to store it on a web server.Read through this article to find out more about Downloading and Uploading how they are different from each other.What is Downloading?Downloading is the process by which any electronic device or computer acquires data from other network sources. The procedure of downloading is similar to that of storing the data. The data is really saved on another system and then communicated and stored on ...

Read More

How to upgrade docker container with previous network and volumes?

Hemant Sharma
Hemant Sharma
Updated on 05-Jan-2023 514 Views

Introduction This article is focused on the upgrading mechanism of container images. There are various methods to upgrade a container to its newest image. Here we have used some of the simple and easy-to-use methods. First, we discussed the manual method for a quick test. Then we tried some automatic methods. These methods will monitor the image and if any new update is present, they create a new container with the updated image. Methods Manually but using CLI Automatic but using CLI Automatic but using Docker Compose Manually but using CLI Here we are going to follow ...

Read More

How to get Docker containers to talk to each other while running on my local host?

Hemant Sharma
Hemant Sharma
Updated on 05-Jan-2023 13K+ Views

Introduction Connection in Docker container can be made using various ways. Some of these are explained in this article. Docker networking using the command line interface and docker-compose. This networking leads to communication between the containers. Pre-requisites Install the below prerequisites before executing the commands. Docker Engine Docker compose Methods These methods are simple and easy to implement on the local machine. Using CLI commands Using Docker Compose Using Command Line Interface Here we are going to create two different containers and connect them using the docker networking features. Step 1: Create a Docker network $ ...

Read More

How to determine if a process runs inside lxc/Docker?

Hemant Sharma
Hemant Sharma
Updated on 05-Jan-2023 756 Views

Introduction The main goal of this article is to find out the if the process is on the container. We have discussed several methods that could help us to filter out the non-container machine from the container once. Simple commands and some special kernel files are used to conclude our point. Pre-requisite To implement the complete article on your setup machine, you need to have the below-listed prerequisites − Linux OS: Ubuntu Docker Daemon and Client Methods Some of the methods that help identify the machine are listed below. The machine could be a container or a ...

Read More

How to Debug a Node.js app in a Docker Container?

Hemant Sharma
Hemant Sharma
Updated on 05-Jan-2023 994 Views

Introduction Bugs are bugging mankind since ancient times. At that time they produced different diseases but today’s bugs are logical errors in the program. Sometimes these are also a nightmare for developers. Here in this article, we will learn to create a Node.js app on a Docker container and also how to attach a debugger to the node application. What is debugging? Debugging is nothing but resolving the issues or errors in the code of the Node.js application. This application might be going through a rough time implementing all the tasks given to it. Debugging helps in smoothing all ...

Read More

How to add Credentials to Docker ADD command?

Hemant Sharma
Hemant Sharma
Updated on 05-Jan-2023 5K+ Views

Introduction Security has always been a great threat to mankind. In IT the security of credentials is a tedious task. Here, we are going to discuss various methods to add the credentials to the docker container. Also, the most useful and secure methods are mentioned. Methods Adding credentials can be done in a lot of different ways. Some of the types are mentioned below. Each method has its place in the industry. Some are just rejected by the developers due to security issues and some works very well in the case of credential security. Using the Build ...

Read More

Difference between IPSec and SSL

Kiran Kumar Panigrahi
Kiran Kumar Panigrahi
Updated on 05-Jan-2023 2K+ Views

IPSec is a suite of protocols that provides security services during communications between networks. It supports network-level peer authentication, data origin authentication, data integrity, data encryption and decryption. It is often used to create a VPN.SSL is a networking protocol that provides a secure connection between a client and a server over the internet. It works at the transport layer. It is often used to secure the communication between a web browser and a web server.Read through this article to find out more about IPSec and SSL and how they are different from each other.What is IP Security (IPSec)?IPSec is ...

Read More

Difference between CRT and LCD

Kiran Kumar Panigrahi
Kiran Kumar Panigrahi
Updated on 05-Jan-2023 18K+ Views

CRT and LCD are both display devices. CRT is an old technology whereas LCD is modern one. One major difference between CRT and LCD is in the technology used for image formation. The CRT display produces an image by using an electron beam, while LCD display produces an image on the screen using liquid crystal display. What is a CRT? CRT stands for Cathode Ray Tube. CRT displays produce an image on the screen by using a sharp beam of electrons that is highly focused to hit a phosphor screen present in front of the tube. The important components of ...

Read More
Showing 28651–28660 of 61,248 articles
Advertisements