You had me until you didn't say now you can use docker to run a price of software or a server on so those computers without the, it works on my machine issue all devs have run into
@@pseudo9616 Must have missed that part then. Anyway that actually makes it slower. docker runs trough the wsl virtual machine running a linux distro. putting anything outside the linux environment is a very large detriment to overal speed. i cannot say if this has a real influence to the amount of space it takes but considering systems use terabite sized drives these days i would consider space a moot point.
@@zool201975bro, nobody uses docker on wsl... It's bad, really bad. If you want to use docker, use as everyone else just on a Linux distro/server. That's with you are trash talking docker, when you just should be trash talking the integration with windows, that nobody uses.
@@arig4m3r goddamn! What is up with that! Touch some grass dude. And do not get your panties in a twist over something this unimportant and perhaps live outside a damn linux kernel.
@@AngelGarcia-op3bd Docker uses features in the Linux kernel. You can't call it a mini-VM since it's not a VM at all, the CPU is not aware of the separation that a container entails. A container image does not contain a complete OS, a lot of things you don't need are not present but you can add whatever you want. You essentially build layers of filesystems that get mounted to a specific path and then a new process is created and confined to that mounted filesystem. A container is just another process on your system with limited permissions. The benefit is that you ship the dependencies with your application in a container image. Images that use the same layers will share those layers, reducing the bloat. You need to write your Dockerfile/Container file with some thought so that the final image has well thought out content and minimal dependencies, rely on volumes and run in read-only mode, make it username and UID and GID agnostic so that the person who wants to run it can decide how to configure it so that it fits their environment and security policies.