Results 1 to 10 of about 58,341 (324)
The doctors and the dockers [PDF]
AbstractBackgroundLondon Dockers unloading a dusty asbestos cargo in 1965, consulted an eminent Occupational Health physician, Dr. Donald Hunter who informed them that they had been at serious risk. A second, opinion provided jointly by a Consultant Chest Physician, the Port Medical Officer, and the Medical Advisor to the Trades Union Congress ...
Morris Greenberg
openalex +3 more sources
DIVDS: Docker Image Vulnerability Diagnostic System
Since the development of Docker in 2013, container utilization projects have emerged in various fields. Docker has the advantage of being able to quickly share application build environments among developers through container technology, but it does not ...
Jong-Hyouk Lee
exaly +3 more sources
Developing Docker and Docker-Compose Specifications: A Developers’ Survey [PDF]
Cloud computing and Infrastructure-as-Code (IaC), supported by technologies such as Docker, have shaped how many software systems are built and deployed. Previous research has identified typical issues for some types of IaC specification but not why they
David Reis +4 more
doaj +2 more sources
An Efficient Random Forest Classifier for Detecting Malicious Docker Images in Docker Hub Repository
The number of exploits of Docker images involving the injection of adversarial behaviors into the image’s layers is increasing immensely. Docker images are a fundamental component of Docker. Therefore, developing a machine learning classifier that
Qussai Yaseen
exaly +3 more sources
Docker Performance Evaluation across Operating Systems
Docker has gained significant popularity in recent years. With the introduction of Docker Desktop for Windows and macOS, there is a need to determine the impact of the operating system on the performance of the Docker platform.
Maciej Sobieraj
exaly +3 more sources
Docker network topologies: Analysis of Bridge, Overlay, and MacvLAN modes [PDF]
In modern container technologies, Docker is a key tool for deploying and managing applications. Understanding the performance of different Docker networking modes is crucial for efficient system design.
Stanišić Sava +3 more
doaj +2 more sources
A Step Towards Generation of DoS/DDoS Attacks Dataset for Docker-Centric Computing [PDF]
Docker provides an effective containerized environment for modern computing. However, the security issues present in Docker provide an edge to the attackers thus resulting in various attacks.
Aparna Tomar +3 more
doaj +1 more source
In recent years, container-based virtualization technology for edge and cloud computing has advanced dramatically. Virtualization solutions based on Docker Containers provide a more lightweight and efficient virtual environment for Edge and cloud-based ...
Vishnu Kumar Kaliappan +5 more
doaj +1 more source
Reflections on an international engagement in the fight against torture
Contribution to the 30th Anniversary of the Torture Journal by Henrik Døcker. The author describes some of the early beginnings of the RCT and Torture Journal.
Henrik Døcker
doaj +1 more source
The COVID-19 pandemic has affected contemporary performing arts in several ways, not least in the form of mass cancellations of performances and production processes in many countries around the world in the year 2020.
Georg Döcker
doaj +1 more source

