Posts

Showing posts from October 21, 2015

New momentum when it comes to deploy and manage Docker distributed applications.

Streamline end-to-end digital and IT experiences is in our DNA. The stakes are huge for everyone from students, developers, IT leaders, to executives.
The Docker ecosystem is growing and drives lot of excitements among developers and organizations that are looking for holistic tools to build, ship, run, scale and monitor distributed apps.
Those who turn to this ecosystem are impressed inter alia by: Docker Hub, a cloud service for development teams to automate their build pipelines; the Docker Trusted Registry for those teams wanting to automate their build pipelines on-premise instead of in the cloud.
Henceforth with the acquisition of Tutum, a cloud service used by developers and sysadmins to deploy and manage Docker applications, Docker aims to help IT teams extend their use of the Docker platform to production enabling the “Run” in “Build, Ship, and Run.

Automation of identification of all open source code and the detection of any known security vulnerabilities.

Wariness related to security and agility when it comes to open source code and container technology is justified. But the most exciting and promising is to recall, holistic security initiative emerge from the ground up to eradicate the risks.
Open source code and container technology represent the future of the app industry: innovation in open source software security matters; innovation in open source security is vital; use of open source software is exploding worldwide, and Adoption of container technology is surging.
So, industry-wide efforts need to be accelerated in order to ensure containers are secure for enterprise adoption.
For the informational purpose, Connectikpeople.co recalls that, Black Duck Hub can enable organizations to automate both the identification of all their open source code and the detection of any known security vulnerabilities.

Kubernetes a Google technology with its exciting feature called namespaces.

Image
Manage different environments within the same cluster in our container technology age. The isolation for improved and streamlined security, agility and performance is henceforth at the core the app industry: develop, run, manage, monitor, and scale.
Kubernetes a Google technology paves its way with the ability to manage various environments. Connectikpeople.co observes that, Kubernetes includes an exciting feature called namespaces, which can enable you to manage different environments within the same cluster. 
Key examples include: different test and staging environments in the same cluster of machines; run different types of server, batch, or other tasks in the same cluster without worrying about them affecting each other.

Secure and Trusted Linux Containers to the Enterprise.

Image
Certainly that, container (isolation of each app within a machine) is becoming a mainstream technology in our digital age.
But as, an early stage technology, it contains high priority security vulnerabilities that are progressively overcome. 
Connectikpeople.co salutes the new momentum leads by Red Hat, Inc., and Black Duck Software, when it comes to establish a secure and trusted model for containerized application delivery by providing verification that application containers are free from known vulnerabilities and include only certified content.
Connectikpeople.co recalls that, as an initial part of the collaboration, both companies plan to integrate Black Duck’s container scanning and open source security vulnerability-mapping software - Black Duck Hub - with OpenShift, Red Hat’s Platform-as-a-Service (PaaS) offering, providing reports and data on potential vulnerabilities present in container images made available in the OpenShift registry, a Red Hat-backed repository of validated,…

Nearly 154 vulnerabilities across multiple products at Oracle; addressed.

Image
Connectikpeople.co recalls that, Oracle has released its Critical Patch Update for October 2015 to address 154 vulnerabilities across multiple products. Exploitation of some of these vulnerabilities may allow a remote attacker to take control of an affected system. So, Connectikpeople.co encourages users and administrators to review the Oracle October 2015 Critical Patch Update and apply the necessary updates.