Tag: Docker
Docker is a set of platform as a service (PaaS) products that uses OS-level virtualization to deliver software in packages called containers.
Virtual Desktop Environment — Configuring Kasm Workspaces
What are Kasm Workspaces?
Kasm Workspaces is a container streaming platform popularly used in Virtual Desktop Infrastructure (VDI) solutions to deliver browser, desktop, and application workloads to web browsers. Users can access container applications or the entire operating system through a standard browser with full user interface support, which make a virtual desktop environment. Kasm handles authentication, container orchestration, logging, and more. Common use cases are Remote Browser Isolation (RBI), Desktop as a Service (DaaS), Remote Access Services (RAS), and Open-Source Intelligence (OSINT) collections.
How to Install Jenkins on AlmaLinux
Jenkins is an open-source continuous integration server. It is a tool for continuously compiling and testing software projects. In the field of Continuous Integration (CI), the concepts from CI are combined with those from Continuous Delivery (CD) — also known as Continuous Deployment — in the CI/CD pipeline. See our The Best DevOps Tools for Infrastructure Automation for more information about this growth area in advanced software development techniques.
What is Kubernetes Used For?
As web applications become more complex and tasked with doing more, the demand puts stress on IT teams and their infrastructure. If you pair that with the expectation that development timelines should be shorter to accommodate quicker deployment strategies, then software companies are in a bind. Tech companies have a trump card they can use to make development easier, even under the increasing pressure of time constraints.
How to Install Docker on Linux (AlmaLinux)
Docker is a tool for running container software. Leveraging containers is a terrific approach for developers and users to worry less about operating system compatibility and dependencies because the bundled software should function similarly on any system. Are you new to using a container engine? Be sure to check out the Docker for Beginners article, if you are just getting started.
How to Set Up a Mastodon Server
What is Mastodon?
Mastodon is a free, open source software written in Ruby on Rails and JavaScript (React.js and Redux). It is designed for running self-hosted social networking services. In terms of microblogging features, Mastodon is very similar to Twitter. It provides a huge number of running Mastodon nodes, and every instance has its own moderation policy, code of conduct, and terms of service.
How to Run Rootless Docker Containers
Ever found yourself in a situation where you want to use Docker but don’t have root access? Or perhaps you wish to provide Docker access to your team or clients but aren’t comfortable giving them root privileges.
Podman vs Docker: A Comprehensive Comparison
Containerization has been taking the app development world by storm. In today’s technological landscape, it’s common to hear Docker associated with containers, but there are other options.
How to Install and Configure Podman on Ubuntu 20.04
What is Podman?
Podman (Pod Manager) is a tool used to develop, manage, and run containers and images. It can perform functions that support and modify container images and also retrieve and tag containers.
How Does Containerization Work?
Introduction
If you're invested in the world of web development, you might have already heard of containerization and all its advantages or even enjoyed them yourself by using one of the many available containerization solutions. It’s not an exaggeration to say that software containerization has changed the world, just as the change from bare metal to virtual machines (VMs) did.
How to Store Secrets in Kubernetes
What is a Secret?

A Kubernetes Secret is an object that enables us to store and manage sensitive information. A Secret can contain data like SSH keys, OAuth data, or other user authentication information like passwords. It is typically stored within a cluster in a manner native to Kubernetes. Using a Secret object provides more granular control over how highly sensitive data is used. It also lowers the risk of data exposure to unauthorized parties.
Our Sales and Support teams are available 24 hours by phone or e-mail to assist.