Thursday marked the closing of the 20th BriForum conference in Boston, Massachusetts, and the end of an era. As the largest independent virtualization industry conference, it’s a place where geeks explain how products really work (or don’t) and where unfiltered side-by-side comparisons are the norm.
Articles Tagged with virtualization
Will containers change the shoe size (footprint) of the physical servers in the data center? Recently, I was talking with peers about what containers can bring to the environment. “What changes are needed in the environment,” we asked, “to achieve the greatest success when offering containers as an option to customers?” To truly understand the change in thinking about the physical server’s footprint, we first need a basic understanding of the differences between virtualization in general and container virtualization.
In this first segment of a two-part series, we will cover the intricacies of applications (apps) as part of transitioning to a virtualization infrastructure. The second installation will delve into automation tools that can address the assessment of applications so as to minimize the work effort necessary to achieve success.
With the myriad cases of cyber-theft and security breaches that headline the news every day, it’s no wonder that system improvements are taking a back seat to security items within most IT organizations. While many vendors highlight new products or features as being better, cheaper, and/or faster, those items are having limited success compared to those that address being secure.
Mobile World Congress is in full swing in Barcelona, Spain, this week. This year, the Samsung Galaxy S7 and numerous other devices were added to the myriad options that users can purchase. While there have been many announcements about new mobile devices, manufacturers are making it clear that this year won’t be as robust as last in terms of sales of new smartphone and tablet devices. Nevertheless, last year was the turning point when the number of mobile devices worldwide exceeded desktop devices, so as expected, mobility continues to reign as monarch.
I have been following containers for quite some time now. A year ago it was safe to say that container technologies like Docker were far from production ready when it came to security. What I have seen over the past year is a ton of development towards closing that gap. For this post, I’ll focus on Docker.