docker
Exploring Default Docker Networking
Part 1
18 min read
Learn Docker networking starting with the three options every network engineer should know. Principal Engineer Hank Preston provides a step-by-step walkthrough of the default Docker bridge network environment in Linux, Docker container networking, and much more.
Quick Start: Prep Your Dev Environment for Kubernetes
3 min read
Getting started on a new platform, especially Kubernetes, can appear overwhelming. But with these tools, you’re much more likely to get ramped up quickly.
Custom Application Troubleshooting With Cisco IOx
7 min read
With Cisco IOx, creating your own custom application is a well-defined process. However, there may be subsequent steps during which you will create an application docker image. Read about the potential challenges when creating an IOx docker-based application image, and how best to handle them.
How to Simplify Container Automation: Intro to Cloud Native Buildpacks
3 min read
Here's one way DevNet supports App developer's NetDevOps journey -- Learn how buildpacks have everything app devs need to containerize their apps by executing one command.
Understanding Container Images, Part 3: Working with Overlays
4 min read
Learn more about the mechanism Docker uses to work with image layers, and how you can use it for other projects.
Understanding Container Images, Part 2: Optimizing Your Images
4 min read
See how to build containers that help you build your application in an automated and consistent way, and then use it in your environment.
Understanding Container Images, Part 1: Image Layers
9 min read
See how thinking about container images as an advanced file packaging system may be just what’s needed to make your application run.
Xanthe – Docker aware miner
1 min read
By Vanja Svajcer and Adam Pridgen, Cisco Incident Command Attackers are constantly reinventing ways of monetizing their tools. Cisco Talos recently discovered an interesting campaign affecting Linux systems employing a multi-modular botnet with several ways to spread and a payload focused on providing financial benefits for the attacker by mining Monero online currency. The actor […]
Face mask detection with ML/AI on Cisco industrial hardware
3 min read
Learn how machine learning, artificial intelligence and Cisco IoT are helping with face mask detection.
32