Last Updated on 27 Sept. 2016, Total: 83 Articles and Tutorials
In this article, we'll start off with a short discussion about what cloud services are all about, and then look at five things that shouldn't go into the cloud... Read More
When utilising AWS there are a few things one should consider to side-step common blunders that are often made. In this article we will look at the areas that should be given careful consideration, for these errors to be avoided, as best possible, and ultimately enhance the user experience of AWS... Read More
In this part one of this multi-part series, we'll briefly explain the benefits of using containers and some generalities about how they work... Read More
In this Part 2, we’ll start drilling down into the popular container solutions, logically beginning with the company that put containers on the map: Docker... Read More
Here in Part 3, we will take up the (sometimes touchy) subject of container security in general and Docker security in particular, what has been done and is being done to improve it, and third party security solutions that can make Docker and other containerization methods more secure... Read More
Now, in Part 4, we will continue on the security topic and go into how you can harden the Docker host using SELinux, AppArmor, Grsec and other similar systems before we get into a discussion around some of the third party security solutions that are available for Docker... Read More
In this Part 5, we will look first at Docker’s own improved security in the form of Docker Content Trust, and then touch on some of the third party security solutions that are available for Docker... Read More
In this Part 6, we’re going to wrap up the series by talking a little about CoreOS, Kubernetes (Google’s container management solution), and Microsoft’s entries into this space: Windows Server Containers and Hyper-V Containers... Read More
In this article the author discusses an idea recently presented by Microsoft researchers... Read More
The first part of this article series explains the common Office 365 requirements we might see from a customer... Read More