New & Notable
Containers and virtualization News
July 26, 2022
The Mirantis Lens IDE will integrate the Lagoon Kubernetes deployment project to provide a self-service DevOps platform alternative with no developer Kubernetes training required.
July 14, 2022
Matt Hicks, now Red Hat CEO, and newly appointed Chairman Paul Cormier discuss the links between open source security and sustainability and Red Hat's hybrid cloud mission.
June 02, 2022
Istio service mesh is back in the spotlight since joining the CNCF, but the foundation's existing projects are preferred by IT pros focused on multi-cluster Kubernetes resiliency.
May 23, 2022
Now that KubeCon + CloudNativeCon Europe has come to a close, check out these updates from vendors across the conference floor.
Containers and virtualization Get Started
Bring yourself up to speed with our introductory content
Kubernetes, on the surface, appears to perform the same task as a hypervisor. Does that make Kubernetes a hypervisor? The short answer: No. Let's clarify why it's not. Continue Reading
More hackers are using VMs as an access point to install and deploy encrypted ransomware. Make sure your security strategy includes prevention, response and analysis. Continue Reading
Distributed applications (distributed apps) are applications or software that run on multiple computers within a network at the same time and can be stored on servers or cloud computing platforms. Continue Reading
Evaluate Containers and virtualization Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Docker and Podman offer similar capabilities to manage containers, but Docker's security vulnerabilities might make Podman more appealing for some admins. Continue Reading
Learn how container management products from VMware, Red Hat and Hewlett Packard Enterprise compare when it comes to their overall Kubernetes strategies. Continue Reading
Network virtualization is a method of combining the available resources in a network to consolidate multiple physical networks, divide a network into segments or create software networks between VMs. Continue Reading
Manage Containers and virtualization
Learn to apply best practices and optimize your operations.
Docker containers have root privileges by default -- a known security issue for several years. Now Docker's rootless mode separates containers from underlying infrastructure. Continue Reading
Microsoft Hyper-V can sometimes experience poor network performance or connectivity problems. When that happens, there are several things you can do to resolve the problem. Continue Reading
Hyper-V checkpoints help mitigate problems with upgrade rollouts. They can pile up, so they require some storage space and management. Continue Reading
Problem Solve Containers and virtualization Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Container orchestration brings many benefits, like improved productivity and security, but before those advantages can be realized, IT teams must overcome several hurdles. Continue Reading
Unguarded Docker APIs can let in unwanted visitors and expose data to hackers. To shield your Docker environment, follow these best practices -- and avoid common pitfalls. Continue Reading
To improve container security, admins can use a Docker security checklist and combat common vulnerabilities, such as gain privileges and corrupt Docker images. Continue Reading