At Kubecon last week, Containous launched their new Traefik Ambassador Program in an effort to give contributors to the open source cloud-native edge router some recognition for their contributions. Community members are already expressing their enthusiasm for the new initiative. Let’s take a closer look.
By 2023, it is predicted that companies will have more than two containerised applications in place. Don’t go into containers without knowing what is true and what is just a myth. Read about these five big misconceptions regarding container security and overcome the challenges of planning for strong security models.
Security is no joke, especially as more and more companies are moving to cloud-based container setups. The stakes are high, and the price of a security breach can be catastrophic. CEO of NeuVector Fei Huang shares his thoughts about why DevSecOps matters and how to shift left and right to ensure security is considered all through the lifecycle, not just at deployment.
Every Monday, we take a step back and look at all the cool stuff that went down during the previous week. Last week we had an eye-opening interview about OpenWebStart, discussed the implications of the GitHub restrictions imposed over trade laws & more. Let’s take a look.
Running software in containers is catching on, and nearly half of IT leaders plan to deploy containers in production. Containers are extremely useful and can solve many problems associated with multiple environments, but they have their limitations. What do you need to know about containerization and its pros versus con before you begin?
Do you struggle with memorizing Docker commands? LazyDocker is a simple, yet customizable, terminal user interface for Docker and Docker-compose. It was written with the minimalistic Go library, gocui. Watch the demo video and see how this project can help programmers with Docker commands and container tracking.
As container usage spreads, the number of tools in the ecosystem grows. Floki is an open source tool aims to help users launch and use interactive Docker containers, without any Docker run commands. It features Docker-in-Docker support and can forward host user information.
Containerized environments are very complex, making observability both more important and difficult. One must look in a top-down manner to choose the right tools and strategies to solve them. In this article, Arijit Mukherji has some handy advice.
Container adoption continues to grow, according to the results of Portworx and Aqua Security’s annual research. The 2019 Container Adoption Survey reveals some trends about containers and what organizations use them for, and want from the technology. This year, security was a pressing topic of discussion. How does your team’s container usage compare to the survey results?
Containerisation is potentially the biggest milestone of the ongoing cloud revolution. However, there are a few obstacles still standing in the way. Anil Kumar, the Director of Product Management at Couchbase, discusses the obstacles and explains why revolutions will only benefit the business if the entire organisation is brought along.
Having a hard time finding the right Kubernetes operators? Red Hat’s new OperatorHub.io is a public registry for Kubernetes Operator services. This curated list ensures developers can find exactly what they are looking for… without any documentation surprises.
It’s been almost two years since Docker donated containerd, its core container runtime, to CNCF. containerd is now the fifth project to graduate, following Kubernetes, Prometheus, Envoy, and CoreDNS.
Linux containers are gaining an ever stronger foothold in the IT of modern companies. For this reason, developers need a simple way of creating containerized applications. Buildah makes it easy to build containers without the need for the overhead required by Docker.
Were you affected by the runC container breakout? Make sure your containers are all patched up and running safely and securely. When it comes to using containers, ensuring security should be everyone’s number one priority. What makes container vulnerabilities so dangerous?