Containers and virtualization
Containerization software is taking over across the IT industry as the new favored IT infrastructure, as it enables high-speed and high-efficiency platform and software performance. Learn about the technology, its leading tools and how to use it from experts.
New & Notable
Containers and virtualization News
-
July 26, 2022
26
Jul'22
Mirantis Kubernetes deployment buy ups DevOps platform ante
The Mirantis Lens IDE will integrate the Lagoon Kubernetes deployment project to provide a self-service DevOps platform alternative with no developer Kubernetes training required.
-
July 14, 2022
14
Jul'22
New Red Hat CEO faces hybrid cloud challenges
Matt Hicks, now Red Hat CEO, and newly appointed Chairman Paul Cormier discuss the links between open source security and sustainability and Red Hat's hybrid cloud mission.
-
June 02, 2022
02
Jun'22
Kubernetes multi-cluster users tap service mesh alternatives
Istio service mesh is back in the spotlight since joining the CNCF, but the foundation's existing projects are preferred by IT pros focused on multi-cluster Kubernetes resiliency.
-
May 23, 2022
23
May'22
Highlights from KubeCon + CloudNativeCon Europe 2022
Now that KubeCon + CloudNativeCon Europe has come to a close, check out these updates from vendors across the conference floor.
Containers and virtualization Get Started
Bring yourself up to speed with our introductory content
-
Is Kubernetes a hypervisor? How do they differ?
Kubernetes, on the surface, appears to perform the same task as a hypervisor. Does that make Kubernetes a hypervisor? The short answer: No. Let's clarify why it's not. Continue Reading
-
Secure your infrastructure against VM ransomware
More hackers are using VMs as an access point to install and deploy encrypted ransomware. Make sure your security strategy includes prevention, response and analysis. Continue Reading
-
distributed applications (distributed apps)
Distributed applications (distributed apps) are applications or software that run on multiple computers within a network at the same time and can be stored on servers or cloud computing platforms. Continue Reading
Evaluate Containers and virtualization Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
-
Compare Docker vs. Podman for container management
Docker and Podman offer similar capabilities to manage containers, but Docker's security vulnerabilities might make Podman more appealing for some admins. Continue Reading
-
Tanzu vs. OpenShift vs. Ezmeral: 3 rivals' Kubernetes offerings
Learn how container management products from VMware, Red Hat and Hewlett Packard Enterprise compare when it comes to their overall Kubernetes strategies. Continue Reading
-
What is network virtualization? Everything you need to know
Network virtualization is a method of combining the available resources in a network to consolidate multiple physical networks, divide a network into segments or create software networks between VMs. Continue Reading
Manage Containers and virtualization
Learn to apply best practices and optimize your operations.
-
Docker's rootless mode a welcome security update
Docker containers have root privileges by default -- a known security issue for several years. Now Docker's rootless mode separates containers from underlying infrastructure. Continue Reading
-
Address Hyper-V VM network issues for peak performance
Microsoft Hyper-V can sometimes experience poor network performance or connectivity problems. When that happens, there are several things you can do to resolve the problem. Continue Reading
-
A beginner's guide to Hyper-V checkpoints
Hyper-V checkpoints help mitigate problems with upgrade rollouts. They can pile up, so they require some storage space and management. Continue Reading
Problem Solve Containers and virtualization Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
-
How to tackle container orchestration challenges
Container orchestration brings many benefits, like improved productivity and security, but before those advantages can be realized, IT teams must overcome several hurdles. Continue Reading
-
Boost Docker API security to protect ports
Unguarded Docker APIs can let in unwanted visitors and expose data to hackers. To shield your Docker environment, follow these best practices -- and avoid common pitfalls. Continue Reading
-
Docker security checklists mitigate container cyberthreats
To improve container security, admins can use a Docker security checklist and combat common vulnerabilities, such as gain privileges and corrupt Docker images. Continue Reading