Containers and virtualization
Containerization software is taking over across the IT industry as the new favored IT infrastructure, as it enables high-speed and high-efficiency platform and software performance. Learn about the technology, its leading tools and how to use it from experts.
New & Notable
Containers and virtualization News
-
August 11, 2022
11
Aug'22
Sigstore co-creator talks GitHub, Kubernetes and next steps
Dan Lorenc reflects on a whirlwind year for his open source project, now officially incorporated into Kubernetes and GitHub's npm registry, and his plans for the year to come.
-
August 11, 2022
11
Aug'22
Researchers reveal Kubernetes security holes, prevention
Researchers with Palo Alto Networks took the stage at Black Hat to explain how configurations and system privileges in Kubernetes clusters can allow container escape and takeover.
-
July 26, 2022
26
Jul'22
Mirantis Kubernetes deployment buy ups DevOps platform ante
The Mirantis Lens IDE will integrate the Lagoon Kubernetes deployment project to provide a self-service DevOps platform alternative with no developer Kubernetes training required.
-
July 14, 2022
14
Jul'22
New Red Hat CEO faces hybrid cloud challenges
Matt Hicks, now Red Hat CEO, and newly appointed Chairman Paul Cormier discuss the links between open source security and sustainability and Red Hat's hybrid cloud mission.
Containers and virtualization Get Started
Bring yourself up to speed with our introductory content
-
How to establish a Kubernetes governance strategy
Because Kubernetes is a large, complex tool that touches so much of the IT ecosystem, governance policies are important to meet both internal and external standards. Continue Reading
-
Is Kubernetes a hypervisor? How do they differ?
Kubernetes, on the surface, appears to perform the same task as a hypervisor. Does that make Kubernetes a hypervisor? The short answer: No. Let's clarify why it's not. Continue Reading
-
Secure your infrastructure against VM ransomware
More hackers are using VMs as an access point to install and deploy encrypted ransomware. Make sure your security strategy includes prevention, response and analysis. Continue Reading
Evaluate Containers and virtualization Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
-
Compare running Kubernetes on VMs vs. bare-metal servers
Planning to run a cloud-native application with Kubernetes? Compare the advantages and drawbacks of deployments on VMs and physical servers. Continue Reading
-
Compare Docker vs. Podman for container management
Docker and Podman offer similar capabilities to manage containers, but Docker's security vulnerabilities might make Podman more appealing for some admins. Continue Reading
-
Tanzu vs. OpenShift vs. Ezmeral: 3 rivals' Kubernetes offerings
Learn how container management products from VMware, Red Hat and Hewlett Packard Enterprise compare when it comes to their overall Kubernetes strategies. Continue Reading
Manage Containers and virtualization
Learn to apply best practices and optimize your operations.
-
Docker's rootless mode a welcome security update
Docker containers have root privileges by default -- a known security issue for several years. Now Docker's rootless mode separates containers from underlying infrastructure. Continue Reading
-
Address Hyper-V VM network issues for peak performance
Microsoft Hyper-V can sometimes experience poor network performance or connectivity problems. When that happens, there are several things you can do to resolve the problem. Continue Reading
-
A beginner's guide to Hyper-V checkpoints
Hyper-V checkpoints help mitigate problems with upgrade rollouts. They can pile up, so they require some storage space and management. Continue Reading
Problem Solve Containers and virtualization Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
-
What to do when a VM is compromised
When security incidents arise -- and they will -- IT administrators can restore, reset or completely wipe VMs to return them to health and get them back into production. Continue Reading
-
How to tackle container orchestration challenges
Container orchestration brings many benefits, like improved productivity and security, but before those advantages can be realized, IT teams must overcome several hurdles. Continue Reading
-
Boost Docker API security to protect ports
Unguarded Docker APIs can let in unwanted visitors and expose data to hackers. To shield your Docker environment, follow these best practices -- and avoid common pitfalls. Continue Reading