Sign in

Prior to the 1980s, free software such as UNIX was available, but users were not permitted to share or alter it. Charging for software licenses became a common business strategy for software firms and computer manufacturers in the late 1970s and early 1980s. Copyrights, trademarks, and other contracts were used…

When I first heard about Serverless computing, the word itself perplexed me. I began to wonder where the code ran, but after reading more about it, I discovered that the term “serverless computing” is misleading because serverless computing uses servers as well. Now we all have the same question: what…

Confusion Matrix, Cybercrimes, Security, Machine learning

What is a cyber attack?

A cyber attack is an attempt to gain unauthorized access to a computer, computing system, or computer network with the intent to cause damage. Cyber attacks aim to disable, disrupt, destroy or control computer systems or to alter, block, delete, manipulate or steal the data held within these systems.

What is Cyber Security?



In this article, I am going to show you how to create a machine learning model inside the docker.


  1. pull the centOS image from DockerHub
  2. Install the Python on the container
  3. Create the ML model inside Docker

Firstly, we have to check that the docker is installed or…

Discussion about Docker security and docker vulnerabilities.

Over the past few years, the use of virtualization technologies has increased exponentially. Accordingly, the demand for efficient and secure virtualization solutions is increasing. The two most used virtualization technologies are Container-based virtualization and hypervisor-based virtualization. …


Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store