Featured Downloads

AWS Security Case Study: Visibility into Containers Provides Application Context
Poka is a connected worker application built specifically for manufacturers. It brings together collaboration, training, and skills management into a single integrated platform to empower factory workers to learn continuously and solve problems autonomously. Designed from the ground-up as a ... Read More

Microservices and Containers: The View from Above
Microservices provide a powerful way to build applications that are more flexible, resilient and potentially secure. Many IT teams are also now discovering, however, that unless managed and governed effectively, microservices can quickly become too much of a good thing. ... Read More

Kubernetes Security: Tips, Tricks & Best Practices
Many companies are struggling to understand and mitigate the new sources of risk that Kubernetes introduces. This eBook offers a guide to protecting containerized applications throughout their lifecycle. From securing your supply chain through to your workloads and even your ... Read More

How to: Migrate to a New-Age IT Stack with KVM
Any business can benefit from a resilient, fast, and scalable IT infrastructure by adopting a new-age IT stack. It is no surprise that legacy & traditional hardware and software stacks are commoditized and run as software, primarily on open-source virtualization platforms ... Read More

Operationalizing Kubernetes at Scale
Now that Kubernetes is gaining traction in mainstream IT environments, the next biggest challenge IT teams will face is operationalizing the platform at scale. Provisioning a single Kubernetes cluster is one thing, but deploying and managing tens, hundreds or even ... Read More

Top 10 Kubernetes Security Best Practices
Over the last couple of years, Kubernetes has become all the rage and is now the most popular container orchestration and scheduling clustered system. Tons of developers have jumped on the Kubernetes bandwagon, drawing on their experience to provide best-in-class ... Read More

Hilton Enhances Digital Guest Experience with Red Hat Container and Automation Technology
As the hospitality industry expands and evolves, leading global hospitality company Hilton is focused on continuing to enhance its innovative guest services and amenities with digital offerings. The company decided to build an agile hybrid cloud computing environment—supported by continuous ... Read More

Storage Patterns for Kubernetes
Have you run Docker containers and discovered that storage isn’t as simple as mounting a directory? Perhaps you have exposure to Kubernetes and have discovered volumes but need more? The vast and flexible world of hyper-converged infrastructure and how that ... Read More
Container Journal Library
Welcome to our library of Container-related resources. Here you will find whitepapers, ebooks, and more – all that will help you in your Container journey. Access requires only a free registration. Search, scroll through and download what you like.

AWS Security Case Study: Visibility into Containers Provides Application Context
Poka is a connected worker application built specifically for manufacturers. It brings together collaboration, training, and skills management into a single integrated platform to empower factory workers to learn continuously and solve problems autonomously. Designed from the ground-up as a cloud native application, Poka lets companies build their own proprietary ... Read More
Lacework

Microservices and Containers: The View from Above
Microservices provide a powerful way to build applications that are more flexible, resilient and potentially secure. Many IT teams are also now discovering, however, that unless managed and governed effectively, microservices can quickly become too much of a good thing. DevOps teams of all sizes are finding they need to ... Read More
Container Journal

Kubernetes Security: Tips, Tricks & Best Practices
Many companies are struggling to understand and mitigate the new sources of risk that Kubernetes introduces. This eBook offers a guide to protecting containerized applications throughout their lifecycle. From securing your supply chain through to your workloads and even your Kubernetes infrastructure, this eBook will help you understand and apply ... Read More
StackRox

How to: Migrate to a New-Age IT Stack with KVM
Any business can benefit from a resilient, fast, and scalable IT infrastructure by adopting a new-age IT stack. It is no surprise that legacy & traditional hardware and software stacks are commoditized and run as software, primarily on open-source virtualization platforms such as KVM and containers/Kubernetes. KVM is one of the most ... Read More
StorPool

Operationalizing Kubernetes at Scale
Now that Kubernetes is gaining traction in mainstream IT environments, the next biggest challenge IT teams will face is operationalizing the platform at scale. Provisioning a single Kubernetes cluster is one thing, but deploying and managing tens, hundreds or even thousands of Kubernetes clusters is still beyond the capabilities of ... Read More
Container Journal

Top 10 Kubernetes Security Best Practices
Over the last couple of years, Kubernetes has become all the rage and is now the most popular container orchestration and scheduling clustered system. Tons of developers have jumped on the Kubernetes bandwagon, drawing on their experience to provide best-in-class rules for items you should look out for when pushing ... Read More
Alcide

Hilton Enhances Digital Guest Experience with Red Hat Container and Automation Technology
As the hospitality industry expands and evolves, leading global hospitality company Hilton is focused on continuing to enhance its innovative guest services and amenities with digital offerings. The company decided to build an agile hybrid cloud computing environment—supported by continuous integration and continuous delivery (CI/CD) and automation capabilities — to ... Read More
Red Hat