According to Docker docs, Docker is a tool that provides OS-level virtualization to deliver software in packages called containers.
Docker made application containers easy to use by providing a simplified, opinionated wrapper around existing Linux distribution invoked as containers, process control, security, and resource management technologies.
Docker excels in these two key areas:
Docker helps you package and run applications inside isolated little boxes with all platform and application dependencies provided, thus keeping the hosting computer nice and tidy.
Docker solves problems associated with :
There are situations when the allocation of memory to store data cannot be in a contiguous block of memory or stored sequentially in memory, such situations include When :
We implement data structures such as
linked list with nodes. A node is simply a data element which consists of two parts: data & pointer to the next node. …
Many of us love the Linux kernel 💙. It uses the Unix based terminal. it’s super customizable. We thus might choose to run Linux without a desktop environment like GNOME.
Linux works magic ✨ on older hardware and it’s lightweight. We don’t sell or advertise on Linux or have to struggle with a ton of desktop bloatware and its a great platform for back-end engineers.
Another productivity tip I leaned about, was setting up Cron Jobs to schedule time-based operations, to be executed automatically on my computer. …
APIs are everywhere and have many different faces and capabilities.
Essentially APIs act as transports vehicles 🚗 that pull information from one source and feed it to another. For example, Google maps API used in navigation systems or Stripe API used for Online payments, etc.
APIs in a lot of applications serve as data points for client-based applications 🖥️ or other API clients, with read-write permissions; and as such certain endpoints need to be protected to provide access to privileged users of the application.
In this tutorial, we’ll go through a simple implementation of role-based authorization or access control in a Node.js API with the Express framework. …
Many times, we have to integrate 3rd party services into our applications; this often prompts the need to store sensitive data for authentication of different modules such as database credentials, secret key, encryption payloads, and API keys.
These sensitive keys should not be hard-coded in the
settings.py file or
views.py file in a Django project. …
Heroku is a cloud application platform that provides deployment services for multiple technologies such as Django/python. It is essentially a Platform-as-a-Service (PaaS) cloud infrastructure, which simplifies hosting applications when compared to a cloud provider like AWS Elastic Compute Cloud(EC2) or others. Heroku makes deploying applications quite simple and for good reasons 🤓.
This platform equips us with a ready runtime environment and application servers. we benefit from seamless app integration with various development instruments, a pre-installed operating system, terminal, Dynos ( isolated virtualized Linux containers ) and redundant servers 🏢 .
Therefore, we don’t need to think about infrastructure management, unlike with AWS EC2. We only need to choose a subscription package and scale up when we need more resources. …
Linux runs on a wide range of hardware. right from large supercomputers to simple wearables .
This operating system makes for very efficient use of a computer’s resource and allows for customised installation processes according to a users specifications and unique hardware requirements.
A linux installation procedure can be very flexible, and allows users to choose the modules they want to install, thus allowing Linux to even run smoothly on old hardware, this thus helps in optimal use of all the hardware resources.
Some machines require some level of tweaking to get Linux to boot on the them and get all the Linux goodies 🤩. …
With the Global surge in internet users, as well as people embracing and gaining access to digital products, It’s become the goal of many applications to bring the best user experience and retain many guest users. Social Authentication aims at simplifying the login process for visitors, thus leading to a higher conversion rate on user registrations.
Some advantages include:
And the list goes on.
I recently needed to implement social login APIs for Google and Facebook social providers. I had a lot of attempts to get it working and talking with the client application, but it proved challenging 😧 . …
Now, I admit — I’m no git expert or even close to that 🤭. But I do appreciate workflows that enable teams achieve excellent results with less effort. The engineers are more engaged and spirited 😁, so they work better to build great products.
However, most of us have no problem using advanced git features like rebase, squash and more. Yet, we still cannot wrap our heads around “this submodules concept” 🤦♂️ .
Git submodules is a method to organize changing projects or repos elegantly with in a main project .
According to the Pro Git book
Submodules allow you to keep a Git repository as a subdirectory of another Git repository. This lets you clone another repository into your project and keep your commits separate. …