Found 1354 Articles for Open Source

Difference between PGP and GPG

Md. Sajid
Updated on 04-Apr-2023 12:36:18

6K+ Views

PGP and GPG are both very powerful tools for encrypting your data. Some differences are there between the two which you should be aware of before making a decision about which one to use. Read this article to find out more about PGP and GPG and how they are different from each other. What is PGP? PGP stands for "Pretty Good Privacy" and is a program that creates an encrypted, digital file of a message or document. The sender encrypts the file with a password and only the recipient can decrypt it with their own password. It is a type ... Read More

How to start tensorflow Docker jupyter notebook?

Diksha Patro
Updated on 17-Jan-2023 18:54:37

2K+ Views

Introduction Jupyter notebooks are useful for writing, testing, and debugging code. TensorFlow is a machine learning framework that can be used with Jupyter notebooks. In this article, we will explore how to use Docker to start a TensorFlow Jupyter notebook, which will allow us to take advantage of the benefits of both of these tools. Prerequisites Before getting started, you will need to have Docker and Docker Compose installed on your machine. You can check if it is installed using the following commands − $ docker --version $ docker-compose --version You can follow the installation instructions for your ... Read More

How to rebuild Docker container on file changes?

Diksha Patro
Updated on 06-Sep-2023 12:53:52

58K+ Views

Docker is a widely used containerization solution that allows programmers to easily package and distribute software in a lightweight and portable manner. The capability of rebuilding a container once modifications are made to its files is one of Docker's key features. This can be very helpful for a number of things, like making sure that code changes are appropriately reflected in a development environment or that code updates are always reflected in a containerized application. In this article, we will go into Docker's crucial feature and examine how it may be used to rebuild a container when files are changed. ... Read More

How to manage secret values with docker-compose v3.1?

Diksha Patro
Updated on 17-Jan-2023 18:24:41

3K+ Views

Introduction As developers, we frequently need to incorporate private data into our applications, including passwords, API keys, and database credentials. Not only is it unsafe to hardcode these variables into our code or configuration files, but it can also be challenging to manage and change them when necessary. Using environment variables, which let us keep sensitive data apart from our codebase and configuration files, is one method to manage secret values. In this article, we'll look at how to maintain secret values using docker-compose v3.1 and inject them as environment variables into our containers. Prerequisites To follow along with this ... Read More

How to Improve Docker Image Size With Layers?

Diksha Patro
Updated on 17-Jan-2023 18:22:20

360 Views

In this article, we will discuss various approaches and techniques for improving Docker image size with layers, including multi-stage builds, using minimal base images, and using base images with pre-installed packages or pre-built binaries. By following these best practices, we can create smaller and more efficient Docker images that are optimized for performance and scalability. The size of Docker images with layers can be improved using a variety of methods as given below. Methods Using minimal base images Using base images with pre-built binaries Using multi-stage builds Using base images with pre-installed packages Let us discuss these methods ... Read More

How to Find the layers and layer sizes for each Docker image?

Diksha Patro
Updated on 17-Jan-2023 18:14:29

8K+ Views

Introduction By using containerization, we can quickly set up and configure our deployment environments, which helps us save time and resources. With the goal of "write once, deploy anywhere" in mind, containerization can help us streamline the process of deploying modern applications, which can be complex. Finding the layers and layer sizes for Docker images In this article, we will explore how to find the layers and layer sizes for each Docker image. This can be useful for identifying large layers that may be contributing to the overall size of the image, and for determining which layers can be removed ... Read More

How to find Docker container processes?

Diksha Patro
Updated on 17-Jan-2023 18:11:05

15K+ Views

Introduction Docker is a powerful tool that allows developers to build, ship, and run applications inside containers. Containers are small, independent executable packages that contain all the components - code, libraries, dependencies, and runtime - that an application requires to function. One of the key features of Docker is the ability to manage and monitor the processes running inside containers. In this article, we will explore how to find Docker container processes and how to use different methods to view and manage them. Prerequisites You will need Docker installed on your computer in order to follow along with this guide. ... Read More

How to directly mount NFS share/volume in a container using Docker Compose v3?

Diksha Patro
Updated on 17-Jan-2023 17:53:10

9K+ Views

Docker is a widely used tool for developing and managing containerized applications. It enables programmers to combine their applications with their dependencies into small, portable containers that are simple to set up and use on any platform. Directly mounting Network File System (NFS) shares or volumes inside a container using Docker Compose v3 is one practical Docker capability. In this article, we will explore how to use Docker Compose v3 to directly mount an NFS share or volume in a container. Method to directly mount NFS share/volume in the container using Docker Compose v3 Here are some important terms and ... Read More

Keeping SSH session alive on Linux

Pradeep Jhuriya
Updated on 17-Jan-2023 17:13:39

16K+ Views

Introduction Secure Shell (SSH) is a network protocol that allows secure remote connections between two systems. It is commonly used to access and manage Linux servers remotely. However, one of the problems with using SSH is that your session can be terminated due to downtime or network outages. This can be frustrating, especially if you're working on a long-running task that requires an uninterrupted connection. In this article, we will discuss various methods of keeping an SSH session alive on Linux. Using the ClientAlive Interval Option One way to prevent an SSH session from closing due to inactivity is to ... Read More

Writing Text to File Using Linux Cat Command

Pradeep Jhuriya
Updated on 17-Jan-2023 17:12:20

70K+ Views

Introduction The Linux cat command is a powerful utility that allows users to concatenate, view and create files. One of its useful features is the ability to write text to a file, either by appending it to the end of the file or by overwriting the existing content of the file. In this article, we'll explore how to use the cat command to write text to a file in Linux, covering the various options and flags that can be used to customize the behavior of the command. Introduction to the Linux Cat Command The cat command is a simple yet ... Read More

Advertisements