Analysis and Implementation of Comparison Between Podman and Docker in Container Management
Abstract
Keywords
Full Text:
PDFReferences
R. M. Akbar and R. R. W. Giri, “Analysis Of Digital Skill Confirmation Factors In The Use Of Mobile Banking Services In Bogor Regency,” Jurnal Ekonomi, vol. 12, no. 04, pp. 313–326, 2023.
B. Cherinka et al., “Marvin: A tool kit for streamlined access and visualization of the SDSS-IV MaNGA data set,” The Astronomical Journal, vol. 158, no. 2, p. 74, 2019.
A. R. Kunduru, “Cloud BPM Application (Appian) Robotic Process Automation Capabilities,” Asian Journal of Research in Computer Science, vol. 16, no. 3, pp. 267–280, 2023.
R. Khattar, R. Hales, D. P. Ames, E. J. Nelson, N. L. Jones, and G. Williams, “Tethys App Store: Simplifying deployment of web applications for the international GEOGloWS initiative,” Environmental Modelling & Software, vol. 146, p. 105227, 2021.
H. Husain, A. Anggrawan, H. Santoso, H. T. Sihotang, D. Pyanto, and F. R. Hidayat, “Pengaturan Bandwidth Management Dan Time Limitation Berbasis User Manajer Mikrotik,” Jurnal Mantik Penusa, vol. 2, no. 2, 2018.
L. Baier, F. Jöhren, and S. Seebacher, “Challenges in the Deployment and Operation of Machine Learning in Practice.,” in ECIS, 2019.
K. Zandberg and E. Baccelli, “Femto-containers: Devops on microcontrollers with lightweight virtualization & isolation for iot software modules,” arXiv preprint arXiv:2106.12553, 2021.
S. Abraham, A. K. Paul, R. I. S. Khan, and A. R. Butt, “On the use of containers in high performance computing environments,” in 2020 IEEE 13th International Conference on Cloud Computing (CLOUD), IEEE, 2020, pp. 284–293.
S. Kaiser, M. S. Haq, A. Ş. Tosun, and T. Korkmaz, “Container technologies for ARM architecture: A comprehensive survey of the state-of-the-art,” IEEE Access, 2022.
S. Kaiser, A. Ş. Tosun, and T. Korkmaz, “Benchmarking Container Technologies on ARM-Based Edge Devices,” IEEE Access, 2023.
B. Ward, “SQL Server 2022 on Linux, Containers, and Kubernetes,” in SQL Server 2022 Revealed: A Hybrid Data Platform Powered by Security, Performance, and Availability, Springer, 2022, pp. 389–412.
S. Kadri, A. Sboner, A. Sigaras, and S. Roy, “Containers in bioinformatics: applications, practical considerations, and best practices in molecular pathology,” The Journal of molecular diagnostics, vol. 24, no. 5, pp. 442–454, 2022.
A. K. Mishra, E. S. Pilli, and M. C. Govil, “CONTAIN4n6: a systematic evaluation of container artifacts,” Journal of Cloud Computing, vol. 11, no. 1, pp. 1–14, 2022.
V. T. Tran, “Maintaining Linux Repositories For Closed Network Infrastructure,” 2023.
D. Siswanto, G. Priyandoko, N. Tjahjono, R. S. Putri, N. B. Sabela, and M. I. Muzakki, “Development of Information and Communication Technology Infrastructure in School using an Approach of the Network Development Life Cycle Method,” in Journal of Physics: Conference Series, IOP Publishing, 2021, p. 12026.
I. Kamu, M. T. Parinsi, M. W. Kuhu, and A. V. Mananggel, “Computer Network Design in Vocational School Using Network Simulator,” International Journal of Information Technology and Education, vol. 2, no. 1, pp. 22–31, 2022.
A. M. Potdar, D. G. Narayan, S. Kengond, and M. M. Mulla, “Performance evaluation of docker container and virtual machine,” Procedia Computer Science, vol. 171, pp. 1419–1428, 2020.
I. Miell and A. Sayers, Docker in practice. Simon and Schuster, 2019.
F. Björklund, “A comparison between native and secure runtimes: Using Podman to compare crun and Kata Containers.” 2021.
S. Giallorenzo, J. Mauro, M. G. Poulsen, and F. Siroky, “Virtualization costs: benchmarking containers and virtual machines against bare-metal,” SN Computer Science, vol. 2, no. 5, p. 404, 2021.
S. Prabakaran et al., “Predicting attack pattern via machine learning by exploiting stateful firewall as virtual network function in an SDN network,” Sensors, vol. 22, no. 3, p. 709, 2022.
K. Voulgaris et al., “A Comparison of Container Systems for Machine Learning Scenarios: Docker and Podman,” presented at the 2022 2nd International Conference on Computers and Automation (CompAuto), IEEE, 2022, pp. 114–118.
D. P. VS, S. C. Sethuraman, and M. K. Khan, “Container Security: Precaution levels, Mitigation Strategies, and Research Perspectives,” Computers & Security, p. 103490, 2023.
R. Keller Tesser and E. Borin, “Containers in HPC: a survey,” The Journal of Supercomputing, vol. 79, no. 5, pp. 5759–5827, 2023.
R. Kałaska and P. Czarnul, “Investigation of Performance and Configuration of a Selected IoT System—Middleware Deployment Benchmarking and Recommendations,” Applied Sciences, vol. 12, no. 10, p. 5212, 2022.
DOI: http://dx.doi.org/10.24042/ijecs.v3i2.19860
Refbacks
- There are currently no refbacks.
International Journal of Electronics and Communications System (IJECS) is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.