Victor Coisne

DockerCon 2017: The Top Rated Sessions

After the general session videos from DockerCon Day 1 and Day 2 yesterday, we’re happy to share with you the video recordings of the top rated sessions by DockerCon attendees. All the slides will soon be published on our slideshare account and all the breakout session video recordings available on our DockerCon 2017 youtube playlist. Cilium: Network and Application Security with BPF and XDP by Thomas Graf Docker?!? But I am a Sysadmin by Mike Coleman Creating Effective Images by Abby Fuller Taking Docker from Local to Production at Intuit by JanJaap Lahpor and Harish Jayakumar Container Performance Analysis by Brendan Gregg Secure Substrate: Least Privilege Container Deployment by Diogo Mónica and Riyaz Faizullabhoy Escape from VMs with Image2Docker by Elton Stoneman and Jeff Nickoloff What Have Namespaces Done for You Lately? by Liz Rice Watch the top rated sessions from #dockercon cc @brendangregg @abbyfuller @lizrice @diogomonica   Click To Tweet

Victor Coisne

DockerCon 2017 Day 1 Highlights

What an incredible DockerCon 2017 we had last week. Big thank you to all of the 150+ confirmed speakers, 100+ sponsors and over 5,500 attendees for contributing to the success of these amazing 3 days in Austin. You’ll find below the videos and slides from general session day 1.All the slides will soon be published on our slideshare account and all the breakout session video recordings available on our DockerCon 2017 youtube playlist. Here’s what we covered during the day 1 general session: 17:00 Developer Workflow improvements and demo 37:00 Secure Orchestration and demo 59:00 Introducing LinuxKit: a toolkit for building secure, lean and portable linux subsystems 1:15 Introducing the Moby Project: a new open source project to advance the software containerization movement Development workflow Improvements Solomon’s keynote started by introducing new Docker features to improve the development workflows of Docker users: multi-stage builds and desktop-to-cloud integration. With multi-stage builds Continue reading…

Dee Kumar

WEBINAR Q&A: Modernize Traditional Applications with Docker Enterprise Edition

This week at DockerCon, we announced the Modernize Traditional Applications (MTA) Program to help enterprises make their existing legacy apps more secure, more efficient and portable to hybrid cloud infrastructure. This webinar covers the importance of “WHY NOW and HOW” to start modernizing traditional applications with Docker Enterprise Edition. Legacy applications often serve critical business needs and have to be maintained for a long time. The maintenance of these applications can become expensive and very time consuming. Some applications may have been written decades ago, grown to millions of lines of code  and the team that built and deployed the app may no longer be at your company. That can pose a challenge for app maintenance, security and support. Docker Enterprise Edition and the Image2Docker Tool presents a unique opportunity to modernize these apps into containers to make them portable, more secure and Continue reading…

Ying Li

Introducing Docker Secrets Management

Containers are changing how we view apps and infrastructure. Whether the code inside containers is big or small, container architecture introduces a change to how that code behaves with hardware – it fundamentally abstracts it from the infrastructure. Docker believes that there are three key components to container security and together they result in inherently safer apps. A critical element of building safer apps is having a secure way of communicating with other apps and systems, something that often requires credentials, tokens, passwords and other types of confidential information—usually referred to as application secrets. We are excited to introduce Docker Secrets, a container native solution that strengthens the Trusted Delivery component of container security by integrating secret distribution directly into the container platform. With containers, applications are now dynamic and portable across multiple environments. This  made existing secrets distribution solutions Continue reading…

Get the Latest Docker News by Email

Docker Weekly is a newsletter with the latest content on Docker and the agenda for the upcoming weeks.

Jenny Burcio

More DockerCon Speakers Announced

Today, we are announcing the next group of awesome DockerCon speakers and we can’t wait for the lessons, stories, tips, tricks and insights they will share. Need tips on how to create effective images, even when you have to include a bunch of image processing libraries? What about learning how other organizations are taking Docker into production and adopting DevOps? Want to deep dive into the Docker internals from Docker’s technical staff? Join us at the largest container conference in the world to hear these stories and many more DockerCon speakers from the community.  Docker Security Deep Dive Journey to Docker Production: Evolving Your Infrastructure and Processes Creating Effective Docker Images Plug-ins: Building, Shipping, Storing and Running Docker for Ops Docker Networking               Modern Storage Platform for Containerized Environments Do you really want to attend sessions Continue reading…


Announcing Federal Security and Compliance Controls for Docker Datacenter

Security and compliance are top of mind for IT organizations. In a technology-first era rife with cyber threats, it is important for enterprises to have the ability to deploy applications on a platform that adheres to stringent security baselines. This is especially applicable to U.S. Federal Government entities, whose wide-ranging missions, from public safety and national security, to enforcing financial regulations, are critical to keeping policy in order. Federal agencies and many non-government organizations are dependent on various standards and security assessments to ensure their systems are operating in controlled environments. One such standard is NIST Special Publication 800-53, which provides a library of security controls to which technology systems should adhere. NIST 800-53 defines three security baselines: low, moderate, and high. The number of security controls that need to be met increases from the low to high baselines, and agencies Continue reading…

Betty Junod

Get all the Docker talks from Tech Field Day 12

As 2016 comes to a close, we are excited to have participated in a few of the Tech Field Day and inaugural Cloud Field Day events to share the Docker technology with the IT leaders and evangelists that Stephen Foskett and Tom Hollingsworth have cultivated into this fantastic group.  The final event was Tech Field Day 12 hosting in Silicon Valley. In case you missed the live stream, check out videos of the sessions here. Session 1: Introduction to Docker and Docker Datacenter Session 2: Securing the Software Supply Chain with Docker Session 3: Docker for Windows Server and Windows Containers Session 4: Docker for AWS and Azure Session 5: Docker Networking Fabric These are great overviews of the Docker technology applied to enterprise app pipelines, operations, and  diverse operating systems and cloud environments. And most importantly, this was a great opportunity Continue reading…

Banjot Chanana

Docker Datacenter adds enterprise orchestration, security policy and refreshed UI

Today we are excited to introduce new additions to Docker Datacenter, our Container as a Service (CaaS) platform for enterprise IT and application teams. Docker Datacenter provides an integrated platform for developers and IT operations teams to collaborate securely on the application lifecycle. Built on the foundation of Docker Engine, Docker Datacenter (DDC) also provides integrated orchestration, management and security around managing resources like access, images, applications, networks and more across the cluster. This latest release of Docker Datacenter includes a number of new features and improvements focused in the following areas: Enterprise orchestration and operations to make running and operating multi container applications simple, secure and scalable Integrated end to end security to cover all of the components and people that interact with the application pipeline User experience and performance improvements ensure that even the most complex operations are handled efficiently Continue reading…