Applications are getting more complex. Demand to develop faster is ever-increasing. This puts stress on your infrastructure, IT teams, and processes. Linux® containers help you alleviate issues and iterate faster — across multiple environments.

What are Linux containers?

Linux containers are technologies that allow you to package and isolate applications with their entire runtime environment — all of the files necessary to run. This makes it easy to move the contained application between environments (dev, test, production, etc.) while retaining full functionality. Containers are also an important part of IT security. …


Source: Google Data Center

Whenever we are talking about networking or pinging to different networks we are unaware of how things are actually working in the background.

So today I would like to break down the concept behind the networking and I will be creating a network from which we can ping to Google DNS but not to Facebook. This might not sound like a great idea but the concept covered would be of profound importance.

Before beginning, I would like to discuss some terminologies that are very important and are used every day in networking which might help you to understand the concepts…


Source: Cloud Native Computing Foundation

We all know how important Containers have become in today’s fast-moving IT world. Pretty much every big organization has moved out of its traditional approach of using virtual machines and started using Containers for deployment. They are looking for trained Kubernetes professionals who have in-depth knowledge about containerization and orchestration tools. So, it’s high time you understand what is Kubernetes.

🚀 Following are the topics covered in this blog:

  1. What is Kubernetes?
  2. Kubernetes Components & Architecture
  3. Rise of Kubernetes
  4. Why use Kubernetes?
  5. Feature of Kubernetes
  6. Top 3 Industry Use-Case Study

Source: Google

We have seen Hollywood movies and Web series where a person tries to hack a system using CLI. But what is CLI? It is the Command-Line Interface. Don’t worry we are not going to learn how to crack a system. But we are definitively going to use our CLI to do some hack in AWS.


Source: Amazon Web Services (AWS)

What is Cloud Computing?

Cloud computing is the on-demand delivery of IT resources over the Internet with pay-as-you-go pricing. Instead of buying, owning, and maintaining physical data centers and servers, you can access technology services, such as computing power, storage, and databases, on an as-needed basis from a cloud provider like Amazon Web Services (AWS).


Source: Google

To understand ‘Big Data’, you first need to know

What is data?

The quantities, characters, or symbols on which operations are performed by a computer, which may be stored and transmitted in the form of electrical signals and recorded on magnetic, optical, or mechanical recording media.


We can create a flutter music player application in no time which will look very similar to Spotify App.

What is Flutter?

Flutter is Google’s UI toolkit for building beautiful, natively compiled applications for mobile, web, and desktop from a single codebase. Flutter is an app SDK for building high-performance, high-fidelity apps for iOS, Android, web (beta), and desktop (technical preview) from a single codebase. The goal is to enable developers to deliver high-performance apps that feel natural on different platforms. We embrace differences in scrolling behaviors, typography, icons, and more.

Why use Flutter?

What are some advantages of Flutter? It helps you:

1. Faster code writing

For developers, Flutter…


Lets say you want to deploy a Web-app(like WordPress) with a Database(MariaDB) but you don’t know to secure them in the best ways.

Well, in this article I am going to cover something called “Demilitarized Zone”, and how it actually makes a better security for any Web-App Deployment. But before that we need to clear some basics.

What is AWS?

AWS stands for Amazon Web Services. It is a public cloud. It is the world’s most comprehensive and broadly adopted cloud platform, offering over 175 fully featured services from data centers globally. It is a subsidiary of Amazon that provides on-demand cloud computing…


Lets say you want to deploy a Web-app(like WordPress) with a Database(MySQL) but you don’t know to secure them in the best ways.

Well, in this article I am going to cover something called “Demilitarized Zone”, and how it actually makes a better security for the IT industry. But before that we need to clear some basics.

What is AWS?

AWS stands for Amazon Web Services. It is a public cloud. It is the world’s most comprehensive and broadly adopted cloud platform, offering over 175 fully featured services from data centers globally. It is a subsidiary of Amazon that provides on-demand cloud computing…


This article is based on the container service for Kubernetes provided by AWS. The clients of AWS are provided with a service named as EKS(Elastic Kubernetes Services) which help the users to create a kubernetes cluster in just one go. This is a task given by Mr. Vimal Daga Sir under LinuxWorld India AWS EKS Specialized Training. In this article you will come to know How to deploy Joomla, MySQL, Prometheus and Grafana on AWS EKS. I will discussion each and every thing in details. So, let’s go…..

What is AWS?

AWS stands for Amazon Web Services. It is a public cloud. It…

Dipaditya Das

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store