Containers

Article #2: Dependency and Runtime Management
This article is the second in a three-part series, exploring how open-source Buildpacks and their ecosystem offer a compelling alternative to Docker for container image creation ...

Article #1: Uplevelling Your Container Lifecycle Management
This article is the first in a series of three exploring how open-source Buildpacks and their ecosystem offer a compelling alternative to Docker for container image creation ...

Beyond Size: Don’t Panic at the Distroless
The idea behind distroless is straightforward enough — take away everything unnecessary, leaving only the application and its absolute bare minimum runtime dependencies ...

Solving Container Security Challenges: Vulnerabilities, Shadow Deployments and Deployment Gaps
In containerized environments security risks can exist in three areas: Vulnerabilities in software, shadow containers and deployment problems ...

Getting Started with Containers: A Beginner’s Guide to Docker & DevOps
A beginner-friendly blog and the basic concepts for anyone learning about containers and their importance in the world of DevOps ...

Akamai Unfurls Managed Container Service for Distributed Applications
Akamai Technologies today launched a Managed Container Service that enables organizations to deploy cloud-native applications across a global network made up of more than 4,300 points of presence (PoPs) ...

Navigating Linux Container Challenges With Scott McCarty
Scott McCarty, principal product manager for RHEL Server at Red Hat, discusses the evolving landscape of Linux containers. He talks about how containers have matured from hype to mainstream adoption, yet still ...

Container Adoption Comes with Risks for Software Supply Chain
Multiple critical vulnerabilities and risks have been found lurking within some of the most commonly downloaded Docker Hub container images. The NetRise study examined 70 randomly selected images from the top 250 ...

Edera’s Big Container Security Question: Am I Isolated?
Company releases ‘Am I Isolated’, an open source container security benchmark and Rust-based container runtime scanner ...

Unlocking the Full Potential of Container Vulnerability Scans
Given the complex dependencies of container images, which can rely on other container images with potential vulnerabilities, it is crucial for developers to proactively identify and address container security vulnerabilities before deployment ...