Dockerize

Real-World Lessons from DevOps: Dockerizing Applications

One of the benefits of working for an application management vendor is the ability to see the various and myriad ways development and operations teams architect, build and deploy applications. After all, ...
Kata Container

Palo Alto Networks Discloses Kata Container Flaws

At the online Black Hat USA 2020 conference today, researchers from the Unit 42 arm of Palo Alto Networks disclosed how they had enabled malicious code to escape from a Kata Container ...
Docker

Docker: Containers Healthy Despite Economy

In spite of the economic downturn brought on by the COVID-19 pandemic, it appears the development of container applications remains robust. Docker Inc. is reporting more than 11 billion pulls from the ...
Kubermatic

Kubermatic Launches Hub for Kubernetes Operators

Kubermatic, a provider of an open source platform for automating Kubernetes clusters, today unveiled an open source Service Management Hub dubbed KubeCarrier that automates the lifecycle management of services, applications and hardware ...
Threat Stack

Threat Stack Adds Support for AWS Fargate

Threat Stack announced today it has added support for the AWS Fargate managed serverless container service from Amazon Web Services (AWS) to its intrusion detection platform. Chris Ford, vice president of product ...
TriggerMesh

TriggerMesh Extends Reach to AWS EventBridge

TriggerMesh today announced it has integrated TriggerMesh Cloud, a serverless integration service for event-driven applications, with AWS EventBridge to enable any application to trigger functions and processes on the Amazon Web Services ...
Splice Machine

Splice Machine Leans on Kubernetes to Manage DBs

Splice Machine, a provider of an open source SQL database optimized for workloads that incorporate machine learning algorithms, has launched a framework for managing its databases that runs on top of Kubernetes ...
Kubernetes vulnerability

Common Container and Kubernetes Vulnerabilities

As Kubernetes gains more prominence, concern is mounting over how we gauge its effectiveness and mitigate container security vulnerabilities. Such vulnerabilities could leave a cluster unsecured or a container compromised, open to ...
configuration

The Keys to Successful Infrastructure Configuration

Infrastructure configuration is a relatively simple, yet important aspect of deploying and managing containers It’s no secret that container adoption in enterprise settings is on the rise. In fact, a recent survey ...
Datawire

Datawire Adds Free Kubernetes Cluster Config Tool

Datawire has launched a free tool dubbed K8s Initializer that makes it simpler to create fully configured Kubernetes clusters. Company CEO Richard Li says the tools enable IT teams to leverage a ...