An Introduction to Docker Through Story

My previous few story-based articles seem to have really hit it off and I’ve had some very good feedback from you all. As such I thought I’d continue the series and start introducing more granular topics such as containerization and Docker…. Source:

Ten Things I Wish I’d Known About Chef

This sounds obvious, but is important to call out. Chef’s structure can be bewildering to newcomers. There are so many concepts that may be new to you to get to grips with all at once…. Source:


The official Node.js docker image, made with love by the node community. Node.js is a platform built on Chrome’s JavaScript runtime for easily building fast, scalable network applications. Node…. Source:

Nginx Unit with Docker, PHP, and Laravel

As part of the announced Nginx Platform, Nginx is working on a dynamic web application server, Nginx Unit. Unit supports fully dynamic reconfiguration using a RESTful JSON API, supports multiple application languages and versions can run simultaneously…. Source:

Docker Compose + GPU + TensorFlow = ❤️

Docker is awesome — more and more people are leveraging it for development and distribution. Instant environment setup, platform independent apps, ready-to-go solutions, better version control, simplified maintenance: Docker has a lot of benefits…. Source:

Repositories on Docker Hub | Docker Documentation

Docker Hub repositories let you share images with co-workers, customers, or the Docker community at large. If you’re building your images internally, either on your own Docker daemon, or using your own Continuous integration services, you can push them to a Docker Hub repository that you add to your Docker Hub user or organization account. […]

Malware? In my Docker container? It’s more common than you think

Black Hat Docker containers are the perfect disguise for malware infections, warn researchers. Speaking at the 2017 Black Hat USA conference in Las Vegas, Aqua Security researchers Michael Cherny and Sagie Dulce said [PDF] the Docker API can be abused for remote code execution and security bypass…. Source: