Avatar photo
By: Danish Prakash

August 11, 2025 12:03 pm

244 views

Build a Container Image from Scratch

For a developer, a Container image is essentially a collection of configurations required to run a container. But what really is a container image? You might know what a container image is, how it is made up of layers and that it's a collection of tar archives. There are questions that still went unanswered, questions […]

Read More


Avatar photo
By: Aleksa Sarai

May 26, 2025 9:29 am

599 views

Four Years On, Umoci Celebrates A Long-Awaited Release

After a nearly four-year hiatus, there is a new umoci release! umoci is the reference implementation of the Open Container Initiative (OCI) image specification, and provides users with the ability to create, manipulate, and otherwise interact with container images. It is designed to be as small and unopinionated as possible, so as to act as […]

Read More


Avatar photo
By: Christian Hüller

December 19, 2024 6:20 pm

2,172 views

Local AI and Confluence

Introduction This post is part of a series on locally using AI models. Previous posts are Running AI locally Generating images with LocalAI using a GPU Introduction to AI training with openSUSE Adding own Documents to your Local AI Using RAG In the last post I explained how to use RAG to add your own […]

Read More


Avatar photo
By: Glen Kosaka

March 15, 2024 7:13 pm

3,850 views

How NeuVector Leverages eBPF to Improve Observability and Security

Extended Berkeley Packet Filter There’s been a lot of recent interest in eBPF (extended Berkeley Packet Filter) and its application for container security solutions. Let’s examine eBPF's features and benefits and how NeuVector utilizes them to enhance its full-lifecycle container security solution. eBPF enables products to run sandboxed programs in a privileged context, […]

Read More


Avatar photo
By: SUSE

October 25, 2023 4:06 pm

6,121 views

What is Container Security and Why Do You Need It?

Container security is a critical aspect of modern application development and deployment, ensuring that containerized environments remain protected from vulnerabilities and threats. This article explores the key principles of container security, the challenges organizations face in securing their containers, and best practices to safeguard your applications. Whether you are new to containers or looking to […]

Read More


Avatar photo
By: Karthikeyan Rajendran

July 25, 2020 9:21 am

13,518 views

Setup secure private Docker registry in SUSE Linux Enterprise server 15Sp2

Containerized application delivery has become the latest trend in today’s IT environment. These container images are distributed by respective Organizations/Communities through their official Docker container registries hosted online. Docker container registries are applications that manages storing and delivering of container images. Container images can be pulled from any online registry you can access to ,[…]

Read More


Avatar photo
By: SUSE

June 19, 2016 12:08 pm

4,896 views

Docker and Dads

I’m one of those lucky guys who woke up this morning with a 5-year-old’s arms around my neck and cries of “Happy Father’s Day!” Even the teenagers smiled, didn’t protest too much as they brought me breakfast (eggs for protein and fruit to keep me healthy). And they all […]

Read More


Avatar photo
By: SUSE

June 16, 2016 11:17 am

4,534 views

How do you like to learn?

If you’re anything like me, when it comes to learning, I can’t just read about it. I need to watch, listen, and be shown examples of what I’m meant to learn for it to really stick. That’s why I prefer webinars. Yeah, the live sessions are hard to fit into my […]

Read More


Avatar photo
By: Naji Almahmoud

December 17, 2015 11:07 am

5,566 views

New Technology Available in 2015

Apply security fixes to your IT systems with zero interruption It is called live patching that enable you to keep your IT system running while mitigating new threats. In other word, no more panic when the market discover new operating system vulnerability. New technology protect your operating system as it keeps running. Less than a […]

Read More