The Top 6 Questions You Asked on Containerizing Production Apps

We recently hosted IDC research manager Gary Chen as a guest speaker on a webinar where he shared results from a recent IDC survey on container and container platform adoption in the enterprise. IDC data shows that more organizations are deploying applications into production using containers, driving the need for container platforms like Docker Enterprise that integrate broad management capabilities including orchestration, security and access controls.

The audience asked a lot of great questions about both the IDC data and containerizing production applications. We picked the top questions from the webinar and recapped them here.

If you missed the webinar, you can watch the webinar on-demand here.

Top Questions from the Webinar

Q: What are the IDC stats based on?

A: IDC ran a survey of 300+ container deployers from companies with more than 1,000 employees and have primary responsibility for container infrastructure in the US and modeled it from a variety of data sources they collect about the industry. 

Q: IDC mentioned that 54% of containerized applications are traditional apps. Is there is simple ‘test’ to see if an app can be containerized easily?

Source: IDC, Container Infrastructure Market Assessment: Bridging Legacy and Cloud-Native Architectures — User Survey Continue reading

BrandPost: Top Ten Reasons to Think Outside the Router – No. 10: It’s Getting Cloudy

Borrowing from the iconic David Letterman Top Ten List segment from his former Late Show, this new blog series will countdown the Top Ten Reasons to Think Outside the Router.The #10 reason it’s time to retire traditional routers at the branch: It’s getting cloudy! In fact, it’s already cloudy. In November 2017, Forrester projected that 2018 would be the year that more than 50% of enterprise applications would be hosted in public and private clouds. Here we are in 2018, and  96% of 997 SMB and enterprise companies surveyed now use cloud services. The migration to cloud-based applications and infrastructure continues to accelerate and is happening faster than anyone predicted. The challenge: enterprise router-centric WAN architectures weren’t designed for the cloud.To read this article in full, please click here

Rackspace launches disaster recovery as a service program

Give managed cloud computing provider Rackspace points for timing. Coming right after the Uptime Institute issued a warning for data center operators to improve their environmental disaster plans, the company announced it is broadening its existing disaster recovery as a service (DRaaS) program for on-premises, colocation, and multi-cloud environments.The expansion utilizes Zerto’s disaster recovery software, which is specifically designed to provide business continuity and disaster recovery in a cloud and virtualized environment.To read this article in full, please click here

Rackspace launches disaster recovery as a service program

Give managed cloud computing provider Rackspace points for timing. Coming right after the Uptime Institute issued a warning for data center operators to improve their environmental disaster plans, the company announced it is broadening its existing disaster recovery as a service (DRaaS) program for on-premises, colocation, and multi-cloud environments.The expansion utilizes Zerto’s disaster recovery software, which is specifically designed to provide business continuity and disaster recovery in a cloud and virtualized environment.To read this article in full, please click here

OpenStack Foundation releases software platform for edge computing

The OpenStack Foundation, the joint project created by NASA and Rackspace to create a freely usable Infrastructure-as-a-Service (IaaS) platform, has announced the initial release of StarlingX, a platform for edge computing.StarlingX is designed for remote edge environments, offering node configuration in host, service management, and perform software updates remotely. It can also warn operators if there are any issues with the servers or the network.The foundation says the platform is optimized for low-latency, high-performance applications in edge network scenarios and is primarily aimed at carrier networking, industrial Internet of Things (IIoT), and Internet of Things (IoT).To read this article in full, please click here

5G and 6G wireless technologies have security issues

Network security concerns remain an issue with the upcoming 5G and 6G wireless network standards.That's because security measures being aren't being adopted in new 5G standards, and there's a newly discovered potential for Man-in-the-Middle attacks in terahertz-based 6G networks, multiple research studies have discovered.One of those studies — a formal analysis of 5G authentication conducted by scientists from ETH Zurich, the University of Lorraine/INRIA, and the University of Dundee — found that criminals will be able intercept 5G communications and steal data because “critical security gaps are present,” the group says in their press release. That’s in part because “security goals are underspecified” and there’s a “lack of precision” in the 3GPP standards, they say.To read this article in full, please click here