Featured Downloads

AWS Security Case Study: Visibility into Containers Provides Application Context
Poka is a connected worker application built specifically for manufacturers. It brings together collaboration, training, and skills management into a single integrated platform to empower factory workers to learn continuously and solve problems autonomously. Designed from the ground-up as a ... Read More

Microservices and Containers: The View from Above
Microservices provide a powerful way to build applications that are more flexible, resilient and potentially secure. Many IT teams are also now discovering, however, that unless managed and governed effectively, microservices can quickly become too much of a good thing. ... Read More

Kubernetes Security: Tips, Tricks & Best Practices
Many companies are struggling to understand and mitigate the new sources of risk that Kubernetes introduces. This eBook offers a guide to protecting containerized applications throughout their lifecycle. From securing your supply chain through to your workloads and even your ... Read More

How to: Migrate to a New-Age IT Stack with KVM
Any business can benefit from a resilient, fast, and scalable IT infrastructure by adopting a new-age IT stack. It is no surprise that legacy & traditional hardware and software stacks are commoditized and run as software, primarily on open-source virtualization platforms ... Read More

Operationalizing Kubernetes at Scale
Now that Kubernetes is gaining traction in mainstream IT environments, the next biggest challenge IT teams will face is operationalizing the platform at scale. Provisioning a single Kubernetes cluster is one thing, but deploying and managing tens, hundreds or even ... Read More

Top 10 Kubernetes Security Best Practices
Over the last couple of years, Kubernetes has become all the rage and is now the most popular container orchestration and scheduling clustered system. Tons of developers have jumped on the Kubernetes bandwagon, drawing on their experience to provide best-in-class ... Read More

Hilton Enhances Digital Guest Experience with Red Hat Container and Automation Technology
As the hospitality industry expands and evolves, leading global hospitality company Hilton is focused on continuing to enhance its innovative guest services and amenities with digital offerings. The company decided to build an agile hybrid cloud computing environment—supported by continuous ... Read More

Storage Patterns for Kubernetes
Have you run Docker containers and discovered that storage isn’t as simple as mounting a directory? Perhaps you have exposure to Kubernetes and have discovered volumes but need more? The vast and flexible world of hyper-converged infrastructure and how that ... Read More
Container Journal Library
Welcome to our library of Container-related resources. Here you will find whitepapers, ebooks, and more – all that will help you in your Container journey. Access requires only a free registration. Search, scroll through and download what you like.

11 Black Holes of DevOps: How Not to Get Lost in Outer Space
As your organization kicks off its DevOps transformation, you’re aiming for wild success… and headed for all sorts of adventures. This isn’t a short test flight to Pittsburgh and back—this is a journey into uncharted territory! As you scale to create an enterprise DevOps process that works effectively across hundreds ... Read More
XebiaLabs

Enterprise Software Delivery in the Age of Containers
Containers are popular for good reason. They let developers bundle all the necessary components of an application into one package that can easily be shared and distributed. This approach can greatly simplify deployment to test, user acceptance, and production environments. However, container platforms, such as Kubernetes, Docker, and OpenShift, solve ... Read More
XebiaLabs

Executive Linux Containers Checklist
IT organizations must deliver better applications faster to stay relevant and seize business opportunities. And to promote growth and digital transformation, organizations must find the right balance between developer effectiveness and operational efficiency. This checklist helps assess business needs and impacts to help you choose a Linux® container. It also ... Read More
Redhat

Container Strategy: Understanding Amazon ECS Schedulers
Everyone has migrated to cloud. All apps are containerized. And, we’ve all moved to serverless apps. That’s how it feels based on the buzz here in Silicon Valley. But, as the head of a DevOps consultancy that works with a range of clients, I can tell you reality is entirely ... Read More
NClouds

Learn How to Build a Secure and Highly Scalable Containerized Environment
If you ask a Docker expert to identify the main benefits of containers, scalability — that is, the ability to increase or decrease the size of a software container environment — will undoubtedly be on the list. In contrast to virtual machines and bare-metal servers, containers enable organizations to build ... Read More
Twistlock

How to Securely Configure a Linux Host
This guide, as part of the Twistlock Container Security How-To Guides series, describes the concrete steps that you can follow to configure a Linux host to run Docker containers securely. Key steps highlighted in this guide include: How to start with a minimal installation of the OS and how to ... Read More
Twistlock

Proactive Security Paradigm
How Containers Can Revamp Your Approach to Security Ask most DevOps engineers about the benefits of containers and microservices, and their responses will center on the agility, modularity and scalability that microservices-based architectures provide. But there is another crucial and oft-overlooked advantage of migrating to containers and microservices: Security. Containers ... Read More
Twistlock

Guide to PCI Compliance for Containers
Our new guide, Twistlock’s Guide to HIPAA Compliance for Containers, will help you to achieve compliance with the HIPAA Security Rule for containerized workloads. In health care, there is a class of sensitive data known as electronic personal health information, or ePHI. Any covered entity, business associate, or subcontractor that ... Read More
Twistlock

Guide to HIPAA Compliance for Containers
With the prevalence of electronic payments nearly every organization is impacted by Payment Card Industry (PCI) Data Security Standard (DSS) requirements. However, there’s very little guidance on how to run containers in a manner that’s compliant with these requirements. The Twistlock Guide to PCI Compliance for Containers breaks down the ... Read More
Twistlock