MikhailTo generate a requirements.txt file for an existing Python projectHere you can find two parts: 1. Virtual Environments 2. From actual library usage from files (like import … from …)2 min read·5 days ago----
MikhailAuthentiK vs KeycloakAuthentiK and Keycloak are both open-source identity and access management (IAM) solutions, but they have different features, strengths…13 min read·6 days ago----
MikhailHow to Interact with Docker Containers Using CLI CommandsExplanation:1 min read·Jun 15, 2024----
MikhailDOCKER CONTAINER STATS under the hoodThe docker container stats command provides real-time performance information for all running containers on a Docker host. It outputs…1 min read·Jun 15, 2024----
MikhailContainers vs. Virtual MachinesWhen you explore the web for a definition of what a container is, you’ll often see comparisons to virtual machines (VMs). While there are…2 min read·Jun 14, 2024----
MikhailWhat Happens When You Run a Docker Container?In this lecture, we’ll discuss what happens behind the scenes when you run the docker container run command. There are several…2 min read·Jun 14, 2024----
MikhailMastering Docker: An Essential Guide to ContainerizationYou can find history of docker here https://medium.com/@mikhail_80802/the-evolution-and-impact-of-docker-aa362fa770b85 min read·Jun 14, 2024----
MikhailCyber threats in Tourism industryWhen I began integrating with some established players in the tourism market, I encountered various cybersecurity threats associated with…2 min read·Jun 11, 2024----
MikhailCyber Threats Top Risk for Hospitality and Tourism in 2024According to the Allianz Risk Barometer, cyber security threats have emerged as the top risk for the hospitality, leisure, and tourism…2 min read·Jun 11, 2024----
MikhailExploring AI’s Future: 2024’s Pivotal Trends and Ethical ChallengesAs we delve into 2024, artificial intelligence (AI) continues to be a transformative force, driving innovation across various sectors while…3 min read·Jun 11, 2024----