In this article, we are going to run a Firefox application which is basically a GUI Software inside a Docker Container.

What are Linux containers?

Linux containers are technologies that allow you to package and isolate applications with their entire runtime environment — all of the files necessary to run. This makes it easy to move the contained application between environments (dev, test, production, etc.) while retaining full functionality. Containers are also an important part of IT security. By building security into the container pipeline and defending your infrastructure, you can make sure your containers are reliable, scalable, and trusted.

Why use Linux containers?

Linux containers help…


Created by Dipaditya Das

In this article, we are going to create our Machine Learning Model in Python Programming Language.

Applications are getting more complex. Demand to develop faster is ever-increasing. This puts stress on your infrastructure, IT teams, and processes. Linux® containers help you alleviate issues and iterate faster — across multiple environments.

What are Linux containers?

Linux containers are technologies that allow you to package and isolate applications with their entire runtime environment — all of the files necessary to run. This makes it easy to move the contained application between environments (dev, test, production, etc.) while retaining full functionality. Containers are also an important part…


In this article, we are going to talk about the Confusion Matrix used by the Cyber-Security Analyst in order to make their systems safer.

In May of 2017, a nasty cyber attack hit more than 200,000 computers in 150 countries over the course of just a few days. Dubbed “WannaCry,” it exploited a vulnerability that was first discovered by the National Security Agency (NSA) and later stolen and disseminated online.

It worked like this: After successfully breaching a computer, WannaCry encrypted that computer’s files and rendered them unreadable. In order to recover their imprisoned material, targets of the attack were…


In Linux, Logical Volume Manager (LVM) is a device mapper framework that provides logical volume management for the Linux kernel. Most modern Linux distributions are LVM-aware to the point of being able to have their root file systems on a logical volume.

Heinz Mauelshagen wrote the original LVM code in 1998 when he was working at Sistina Software, taking its primary design guidelines from the HP-UX’s volume manager.

Volume management creates a layer of abstraction over physical storage, allowing you to create logical storage volumes. This provides much greater flexibility in a number of ways than using physical storage directly…


Applications are getting more complex. Demand to develop faster is ever-increasing. This puts stress on your infrastructure, IT teams, and processes. Linux® containers help you alleviate issues and iterate faster — across multiple environments.

What are Linux containers?

Linux containers are technologies that allow you to package and isolate applications with their entire runtime environment — all of the files necessary to run. This makes it easy to move the contained application between environments (dev, test, production, etc.) while retaining full functionality. Containers are also an important part of IT security. …


Source: Google Data Center

Whenever we are talking about networking or pinging to different networks we are unaware of how things are actually working in the background.

So today I would like to break down the concept behind the networking and I will be creating a network from which we can ping to Google DNS but not to Facebook. This might not sound like a great idea but the concept covered would be of profound importance.

Before beginning, I would like to discuss some terminologies that are very important and are used every day in networking which might help you to understand the concepts…


Source: Cloud Native Computing Foundation

We all know how important Containers have become in today’s fast-moving IT world. Pretty much every big organization has moved out of its traditional approach of using virtual machines and started using Containers for deployment. They are looking for trained Kubernetes professionals who have in-depth knowledge about containerization and orchestration tools. So, it’s high time you understand what is Kubernetes.

🚀 Following are the topics covered in this blog:

  1. What is Kubernetes?
  2. Kubernetes Components & Architecture
  3. Rise of Kubernetes
  4. Why use Kubernetes?
  5. Feature of Kubernetes
  6. Top 3 Industry Use-Case Study

Source: Google

We have seen Hollywood movies and Web series where a person tries to hack a system using CLI. But what is CLI? It is the Command-Line Interface. Don’t worry we are not going to learn how to crack a system. But we are definitively going to use our CLI to do some hack in AWS.


Source: Amazon Web Services (AWS)

What is Cloud Computing?

Cloud computing is the on-demand delivery of IT resources over the Internet with pay-as-you-go pricing. Instead of buying, owning, and maintaining physical data centers and servers, you can access technology services, such as computing power, storage, and databases, on an as-needed basis from a cloud provider like Amazon Web Services (AWS).


Source: Google

To understand ‘Big Data’, you first need to know

What is data?

The quantities, characters, or symbols on which operations are performed by a computer, which may be stored and transmitted in the form of electrical signals and recorded on magnetic, optical, or mechanical recording media.

Dipaditya Das

IN ● MLOps Engineer ● Linux Administrator ● DevOps and Cloud Architect ● Kubernetes Administrator ● AWS Community Builder ● Google Cloud Facilitator ● Author

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store