Archive | Article RSS feed for this section
circle-of-trust

Securing Docker Containers with sVirt and Trusted Sources

Background As has been stated before, Docker containers do not contain all of the parts of the operating system necessary to be considered secure. That said, the advantages of using them is so compelling that many companies, large and small, have began to investigate how to run containers in a production environment. I would argue […]

infrastructure

Core Builds in the Age of Service

Background As legacy applications are redesigned for the cloud, they are converted to run in a stateless manner. In newly designed applications, data flows between application code, messaging infrastructure, caches and databases seamlessly even during individual node failures of any one subsystem. When an active node fails, a new one is instantiated and placed back […]

rhscl logo

Software Collections and the Developer Community

Background Red Hat Software Collections 1.2 was recently released and with it, comes a different message to developers on Red Hat Enterprise Linux and CentOS. Unless you need 10 years of support for your application stack (MySQL, PHP, Ruby, Rails), use Red Hat Software Collections (RHSCL). RHSCL provides developers with the latest version of tools […]