Lee Calcote

Author Archives: Lee Calcote

IDG Contributor Network: What is Docker’s Moby Project?

Being an Austinite, I enjoyed having DockerCon local, and I co-authored a guide to visiting Austin in the hopes that attendees would enjoy having DockerCon in Austin as well.During DockerCon 2017, a few major announcements were made, including the Moby Project. What is the Moby Project? It's a framework to assemble specialized container systems without reinventing the wheel. The Moby Project is to Docker what Fedora is to Red Hat Enterprise Linux. - Solomon Hykes, Docker CTO/FounderTo read this article in full or to leave a comment, please click here

IDG Contributor Network: The hybrid evolution of IT

It’s a great time to be in information technology.While that statement is true, not everyone clearly understands why (or perhaps has the fortitude to make it so). In the face of a massive movement to public cloud—by 2020, 92 percent of world’s workloads will be in cloud, with 68 percent in public and 32 percent in private—many in IT feel their value in the workplace eroding along with their identity.That feeling doesn’t need to be reality. Businesses are changing the way they operate and are transforming to leverage IT more strategically. IT has a real opportunity to lead this transformation, not let the transformation happen to them.To read this article in full or to leave a comment, please click here

IDG Contributor Network: The hybrid evolution of IT

It’s a great time to be in information technology.While that statement is true, not everyone clearly understands why (or perhaps has the fortitude to make it so). In the face of a massive movement to public cloud—by 2020, 92 percent of world’s workloads will be in cloud, with 68 percent in public and 32 percent in private—many in IT feel their value in the workplace eroding along with their identity.That feeling doesn’t need to be reality. Businesses are changing the way they operate and are transforming to leverage IT more strategically. IT has a real opportunity to lead this transformation, not let the transformation happen to them.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Cloud Native Ambassadors and Docker Captains navigate users through the container ecosystem

Navigating the container ecosystem can be confusing. Deciding where to dip your toes is challenging for those stepping into container and microservices waters. Even those who have already ventured knee-deep still wade through many questions as they progress in their cloud native journey. To help them guide them through the ecosystem, the Cloud Native Computing Foundation (CNCF) recently launched a Cloud Native Ambassadors program at its inaugural CloudNativeDay in Toronto.To read this article in full or to leave a comment, please click here

IDG Contributor Network: KubeCon donated to the Cloud Native Computing Foundation

The Cloud Native Computing Foundation (CNCF), a Linux Foundation project and organization dedicated to advancing the development of cloud-native applications and services, announced it accepted another "project" under its governance—KubeCon, the Kubernetes community conference. The donation of KubeCon to the CNCF is unique in that this isn't a software project, but a community conference, which will benefit from the "well-oiled (community conference) machine" that the Linux Foundation provides, according to Joseph Jacks of Kismatic, the original organizer of KubeCon.To read this article in full or to leave a comment, please click here

IDG Contributor Network: 22 new concerns added to Docker security benchmark

Security has, and continues to be, an impediment to container adoption. Whether containers are less or more secure than their virtual machine counterparts is a topic of continued debate.Like any debate, there are merits to arguments on both sides with a bit of FUD interlaced. Many efforts have been undertaken within the container ecosystem to educate adopters and improve their comprehension of available tooling and security postures within platforms and offerings—be that in the form of static analysis (image scanning), runtime vulnerability detection, provenance (image signing), fine-grained authorization, cryptographic verification, etc.The breadth of need for improved security capabilities has provided an opportunity for emerging start-ups to focus specifically on the container security space and others to dedicate their company's mission to securing the Internet. Having spent time with most of the vendors in this space, I'll say that as you might expect, it's a quickly changing landscape. One thing is evident: open source communities and vendors at every layer—from hardware through operating system, container runtime, container image, host-to-cluster orchestrator, PaaS to CaaS—have significantly marshalled forward security-centered improvements in the past year.To read this article in full or to leave a comment, please click here

IDG Contributor Network: 22 new concerns added to Docker security benchmark

Security has, and continues to be, an impediment to container adoption. Whether containers are less or more secure than their virtual machine counterparts is a topic of continued debate.Like any debate, there are merits to arguments on both sides with a bit of FUD interlaced. Many efforts have been undertaken within the container ecosystem to educate adopters and improve their comprehension of available tooling and security postures within platforms and offerings—be that in the form of static analysis (image scanning), runtime vulnerability detection, provenance (image signing), fine-grained authorization, cryptographic verification, etc.The breadth of need for improved security capabilities has provided an opportunity for emerging start-ups to focus specifically on the container security space and others to dedicate their company's mission to securing the Internet. Having spent time with most of the vendors in this space, I'll say that as you might expect, it's a quickly changing landscape. One thing is evident: open source communities and vendors at every layer—from hardware through operating system, container runtime, container image, host-to-cluster orchestrator, PaaS to CaaS—have significantly marshalled forward security-centered improvements in the past year.To read this article in full or to leave a comment, please click here