Task :-

Lets Go ,

What is AWS?

Amazon Web Services (AWS) is a secure cloud services platform, offering to compute power, database storage, content delivery, and other functionality to help businesses scale and grow. Running web and application servers in the cloud to host dynamic websites.

Since we know that AWS is a technology and…


Clustering

Clustering is one of the most common exploratory data analysis techniques used to get an intuition about the structure of the data. It can be defined as the task of identifying subgroups in the data such that data points in the same subgroup (cluster) are very similar while data points in different clusters are very different. In other words, we try to find homogeneous subgroups within the data such that data points in each cluster are as similar as possible according to a similarity measure such as euclidean-based distance or correlation-based distance. …


JavaScript is a dynamic computer programming language. It is lightweight and most commonly used as a part of web pages, whose implementations allow client-side script to interact with the user and make dynamic pages. It is an interpreted programming language with object-oriented capabilities.

JavaScript was first known as LiveScript, but Netscape changed its name to JavaScript, possibly because of the excitement being generated by Java. JavaScript made its first appearance in Netscape 2.0 in 1995 with the name LiveScript. The general-purpose core of the language has been embedded in Netscape, Internet Explorer, and other web browsers.

JavaScript is a cross-platform…


Task 9 on *Kubernetes Integration with Python-CGI*

_Task Description_ 📄


So first of all lets understand,

What is Cyber Crime ?

Cybercrime is criminal activity that either targets or uses a computer, a computer network or a networked device. Most, but not all, cybercrime is committed by cybercriminals or hackers who want to make money. Cybercrime is carried out by individuals or organizations. Some cybercriminals are organized, use advanced techniques and are highly technically skilled. Others are novice hackers.

Rarely, cybercrime aims to damage computers for reasons other than profit. These could be political or personal.

Examples of the different types of cybercrime :


Hello Everyone ,

Today I am Going To launch jupyter notebook inside docker container.

Prerequisites :-

If you don’t have docker installed and don’t have any knowledge about docker containers..Visit my previous blogs for more information.

🧠Deploying Machine Learning Models inside Docker Containers 🐳 | by Parth Patel | May, 2021 | Medium

By reading this blogs you will get all the knowledge about Docker Containers.

Let’ Start :-

Steps:-

First of all after installing docker and starting its services. you need to pull one docker image.

docker pull centos

Now, as our…


𝗛𝗲𝗹𝗹𝗼 𝗘𝘃𝗲𝗿𝘆𝗼𝗻𝗲, 𝗜 𝗮𝗺 𝗯𝗮𝗰𝗸 𝘄𝗶𝘁𝗵 𝘆𝗲𝘁 𝗮𝗻𝗼𝘁𝗵𝗲𝗿 𝘁𝗮𝘀𝗸 𝗼𝗿 𝗰𝗮𝗻 𝘀𝗮𝘆 𝗽𝗿𝗼𝗷𝗲𝗰𝘁 𝗮𝗯𝗼𝘂𝘁 “𝗧𝗿𝗮𝗶𝗻𝗶𝗻𝗴 𝗮𝗻𝗱 𝗗𝗲𝗽𝗹𝗼𝘆𝗶𝗻𝗴 𝗠𝗮𝗰𝗵𝗶𝗻𝗲 𝗟𝗲𝗮𝗿𝗻𝗶𝗻𝗴 𝗠𝗼𝗱𝗲𝗹𝘀 𝗶𝗻 𝗗𝗼𝗰𝗸𝗲𝗿 𝗖𝗼𝗻𝘁𝗮𝗶𝗻𝗲𝗿𝗶𝘇𝗮𝘁𝗶𝗼𝗻”

To know more about docker and how to setup on RHEL8. You can refer my previous Blog.

𝐋𝐚𝐮𝐧𝐜𝐡𝐢𝐧𝐠 𝐀 𝐖𝐞𝐛𝐬𝐞𝐫𝐯𝐞𝐫 𝐎𝐧 𝐃𝐨𝐜𝐤𝐞𝐫 𝐂𝐨𝐧𝐭𝐚𝐢𝐧𝐞𝐫 | by Parth Patel | Medium

Hope you have referred above blog and understood 𝗗𝗼𝗰𝗸𝗲𝗿.

Now Lets Move and understand about 𝐌𝐚𝐜𝐡𝐢𝐧𝐞 𝐋𝐞𝐚𝐫𝐧𝐢𝐧𝐠.

Machine Learning :-

Machine learning is a method of data analysis that automates analytical model building. …


Ansible With Docker and Apache

Lets Understand some basics about Ansible and Ansible Playbook

To know more visit HOW ANSIBLE BENEFITS COMPANIES TO AUTOMATE

What is Ansible?

Ansible is an open-source IT Configuration Management, Deployment & Orchestration tool. It aims to provide large productivity gains to a wide variety of automation challenges.

What is Ansible Playbook?

Ansible Playbooks is the way of sending commands to remote systems through scripts. Ansible playbooks are used to configure complex system environments to increase flexibility by executing a script to one or more systems. Ansible playbooks tend to be more of a configuration language than a programming language.

Ansible playbook commands use YAML format, so there…


To know about docker and its Basic Commands, Refer my previous Blog Article.

Now We are Moving Directly to the practical

1. Download the image which supports the python interpreter.

The Image I found is centos: 8, it supports a python interpreter.

Command used to download the image: docker pull centos:8

2. Now, Run the container using the centos image

Command used: docker run -it — name myos2 centos:8

3. Download python3 using the DNF command

Command used: DNF install python3 -y


What is Docker ?

Docker is an open platform for developing, shipping, and running applications. Docker enables you to separate your applications from your infrastructure so you can deliver software quickly. With Docker, you can manage your infrastructure in the same ways you manage your applications. By taking advantage of Docker’s methodologies for shipping, testing, and deploying code quickly, you can significantly reduce the delay between writing code and running it in production.

The Docker platform

Docker provides the ability to package and run an application in a loosely isolated environment called a Container. The isolation and security allow you to run many containers simultaneously on a…

Parth Patel

ARTH Learner | Bigdata — Hadoop | Linux | Front-End Developer | Flask | Coding Enthusiast | Python | AWS | Ansible | Kubernetes

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store