Best Practices

Gray Calendar Icon June 29, 2017
A Gray Icon of a Clock with White Clock Hands Read time: 5 min

Cyber security is no longer a luxury. If you need a reminder of that, just take a look at the seemingly endless number of stories appearing in the news lately about things like malware and security breaches. If you manage a Docker environment, and you want to help make sure your organization or users are not mentioned in the news stories that accompany the next big breach, you should know the tools available to you for helping to secure the Docker stack, and put them to work.

Gray Calendar Icon June 26, 2017
A Gray Icon of a Clock with White Clock Hands Read time: 4 min

You have a complex monolithic system that is critical to your business. You’ve read articles and would love to move it to a more modern platform using microservices and containers, but you have no idea where to start. If that sounds like your situation, then this is the article for you. Below, I identify best practices and the areas to focus on as you evolve your monolithic application into a microservices-oriented application.

Michael Churchman
Michael Churchman
Gray Calendar Icon June 1, 2017
A Gray Icon of a Clock with White Clock Hands Read time: 7 min

So you’ve decided to use microservices. To help implement them, you may have already started refactoring your app. Or perhaps refactoring is still on your to-do list. In either case, if this is your first major experience with refactoring, at some point, you and your team will come face-to-face with the very large and very obvious question: How do you refactor an app for microservices? That’s the question we’ll be considering in this post.

Gray Calendar Icon March 29, 2017
A Gray Icon of a Clock with White Clock Hands Read time: 6 min

Your storage system should be locked down with all security and access control tools available to you as well. That is true whether the storage serves containers or any other type of application environment. How do you secure containers? That may sound like a simple question, but it actually has a six- or seven-part answer. That’s because securing containers doesn’t involve just deploying one tool or paying careful attention to one area where vulnerabilities can exist.

Get started with Rancher