As
the BYOD trend has grown, there is an increasing concern about corporate data’s
safety and users’ privacy. Containerization is one way to address this problem.
(Rouse, 2014)
Normal
0
false
false
false
EN-CA
JA
X-NONE
...
Monday, July 27, 2015
Sunday, July 26, 2015
Advantages and Disadvantages of Containerization Technology
Advantages
1. Security. Containerization
technology address companies’ top main concern: security. By essentially
separating personal ‘apps’ and data from business apps and data on employees’
portable devices, it obviates the possibility of sensitive data leaking from
one to the other.
2. Resource consumption.
Containerization brings in...
Examples of Companies and Vendors that use containers

Companies:
Google
Normal
0
false
false
false
EN-CA
JA
X-NONE
...
Additional Disadvantages to Consider
1. The isolation provided by containers is not as robust as the segregation established by hypervisors for virtual machines.2. The ability of containers to detect “jailbreaking” of Apple iOS devices, which strips out Apple’s security model completely. If you have a rooted device, a container will not protect you. Then there are the problems that...
Friday, July 24, 2015
Future??
Future Use
Destruction of VMs
Could the usage of containers lead to a destruction of Virtual Machines? Containerization technology can store application codes without needing an OS to run like the VMs. Because it is optimal to run containers on “bare metal” servers, it eliminates the need for VMs. This could lead to an end of virtual machines....
Docker in 5 minutes

Here is a short video that will give you a quick background into Docker. Docker is a key player in the containerization world. Enjoy...
Wednesday, July 15, 2015
BYOD & Containers
Containerization technology promises to give IT professionals the control they need over the business data on employee devices to meet corporate security standards and external compliance requirements, while still allowing users the ability to use the device of their choice and keep their personal data secure from prying corporate eyes.
htt...
Subscribe to:
Posts (Atom)