Red Hat Tech Exchange 2016: Ho Chi Minh: Understanding the Container Landscape in APAC

Red Hat Tech Exchange 2016: Ho Chi Minh: Understanding the Container Landscape in APAC

This presentation is a 16 slide introduction to what must be thought about when building a production cloud. Proper image management is critical engineering task.

Red Hat Tech Exchange 2016: Ho Chi Minh: Linux Containers 101, 201, and 301

Red Hat Tech Exchange 2016: Ho Chi Minh: Linux Containers 101, 201, and 301

This presentation is a 16 slide introduction to what must be thought about when building a production cloud. Proper image management is critical engineering task.

ContainerCon 2016: Toronto: Containers For Grownups: Migrating Traditional and Existing Applications

ContainerCon 2016: Toronto: Containers For Grownups: Migrating Traditional and Existing Applications

This presentation is a 16 slide introduction to what must be thought about when building a production cloud. Proper image management is critical engineering task.

Red Hat Summit 2016: San Francisco: Containerization: Migrating Existing Applications

Red Hat Summit 2016: San Francisco: Containerization: Migrating Existing Applications

This presentation is a 16 slide introduction to what must be thought about when building a production cloud. Proper image management is critical engineering task.

Red Hat Summit 2016: San Francisco: A Container Stack for OpenStack

Red Hat Summit 2016: San Francisco: A Container Stack for OpenStack

This presentation is a 16 slide introduction to what must be thought about when building a production cloud. Proper image management is critical engineering task.

Red Hat Summit 2016: San Francisco: Secure Your Enterprise Software Supply Chain with Containers

Red Hat Summit 2016: San Francisco: Secure Your Enterprise Software Supply Chain with Containers

This presentation is a 16 slide introduction to what must be thought about when building a production cloud. Proper image management is critical engineering task.

Securing Docker Containers with sVirt and Trusted Sources

Securing Docker Containers with sVirt and Trusted Sources

Background As has been stated before, Docker containers do not contain all of the parts of the operating system necessary to be considered secure. That said, the advantages of using them is so compelling that many companies, large and small, have began to investigate how to run containers in a production environment. I would argue

Core Builds in the Age of Service

Core Builds in the Age of Service

Background As legacy applications are redesigned for the cloud, they are converted to run in a stateless manner. In newly designed applications, data flows between application code, messaging infrastructure, caches and databases seamlessly even during individual node failures of any one subsystem. When an active node fails, a new one is instantiated and placed back

A Practical Introduction to Docker Containers

Background Why Docker has quite an amount of buzz around it today because it makes so many things easy that were difficult with virtual machines. Docker containers makes it easy for Developers, Systems Administrators, Architects, Consultants and others to quickly test a piece of software in a container; much quicker than a virtual machine, and