Monday, July 27, 2015

What is secure container?

As the BYOD trend has grown, there is an increasing concern about corporate data’s safety and users’ privacy. Containerization is one way to address this problem. (Rouse, 2014) Normal 0 false false false EN-CA JA X-NONE ...
Posted on 3:25 PM | Categories:

Sunday, July 26, 2015

Advantages and Disadvantages of Containerization Technology

Advantages  1. Security. Containerization technology address companies’ top main concern: security. By essentially separating personal ‘apps’ and data from business apps and data on employees’ portable devices, it obviates the possibility of sensitive data leaking from one to the other. 2. Resource consumption. Containerization brings in...
Posted on 3:09 PM | Categories:

Additional Disadvantages to Consider

1. The isolation provided by containers is not as robust as the segregation established by hypervisors for virtual machines.2. The ability of containers to detect “jailbreaking” of Apple iOS devices, which strips out Apple’s security model completely. If you have a rooted device, a container will not protect you. Then there are the problems that...
Posted on 12:41 PM | Categories:

Friday, July 24, 2015

Future??

Future Use Destruction of VMs Could the usage of containers lead to a destruction of Virtual Machines? Containerization technology can store application codes without needing an OS to run like the VMs. Because it is optimal to run containers on “bare metal” servers, it eliminates the need for VMs. This could lead to an end of virtual machines....
Posted on 3:28 PM | Categories:

Docker in 5 minutes

Here is a short video that will give you a quick background into Docker. Docker is a key player in the containerization world. Enjoy...
Posted on 3:16 PM | Categories:

Wednesday, July 15, 2015

BYOD & Containers

Containerization technology promises to give IT professionals the control they need over the business data on employee devices to meet corporate security standards and external compliance requirements, while still allowing users the ability to use the device of their choice and keep their personal data secure from prying corporate eyes. htt...
Posted on 4:55 PM | Categories: