Container Hardening with Docker Bench for Security

Security for virtual machines has some well established protocols. But as containers continue to infiltrate the data center, what are the best security practices? Docker released a behemoth security documents, but at over 200 pages, not a lot of IT professionals have the time to ingest it in a timely fashion. Luckily, James Green wrote up a little walkthrough on how to run their “Docker Bench of Security” tool. This reviews your Docker configuration for common security holes, and is a must for any Docker deployments. James breaks down how to install, run, and interpret the tool and its findings.


Drive and Rack Scale Storage Architectures

Big data storage problems getting you down? Never fear! James Green put together a video highlighting two companies from last month’s Tech Field Day that are presenting solutions. Igneous offers an array of nanoservers equipped drives, making each network addressable. James also highlights DriveScale’s take on managing big data with their rack adapter to address a pool of JPOD storage. It’s a really great comparison between the two approaches!


The Container Storage Persistence Challenge

James Green published a great video summarizing the current state of persistent container storage. One of the more interesting offerings was presented at Tech Field Day this month by StorageOS, which runs on the application layer as a container itself. If you need to get up to speed on container storage, James made it easy with this video.


The Silent Threat of Dark Data

How much do you think about secondary storage? Probably not a ton. It’s all the data that’s not mission critical, the reams of backup data, archives, test/dev, and machine generated data that lives in separate silos. Cohesity demoed a holistic solution to deal with this mess, but why do you need it? James Green knows the answer: dark data. All that data that sits in storage, without metadata or context, data you don’t even know is there. Its a problem for any business that keep financial or medical records. All it takes is one malicious attack, and all that data you didn’t even know you had becomes a huge liability. Cohesity’s solution seems like a ray of light into this work. James breaks down how exactly they go about it.


Have We Really Outgrown RAID?

Have We Really Outgrown RAID?


Greasing the Skids on Object Storage

Greasing the Skids on Object Storage


10 on Tech Episode 013: J Metz on NVMe and NVMe-oF

10 on Tech Episode 013: J Metz on NVMe and NVMe-oF


#VMworld 2016 Interview with Scality

#VMworld 2016 Interview with Scality


Disaggregated Physical Storage Architectures and Hyperconvergence

Disaggregated Physical Storage Architectures and Hyperconvergence


News from Intel Cloud Day 2016

News from Intel Cloud Day 2016


Programmable ASICs Will Change Infrastructure Investments

Programmable ASICs Will Change Infrastructure Investments


VMworld 2015 In Review

VMworld 2015 In Review


VFD5 in Boston – PernixData

VFD5 in Boston – PernixData


VFD5 in Boston – OneCloud Software

VFD5 in Boston – OneCloud Software


VFD5 in Boston – VMTurbo

VFD5 in Boston – VMTurbo


#VFD4 Live – Scale Computing

#VFD4 Live – Scale Computing


#VFD4 Live – Dell

#VFD4 Live – Dell


#VFD4 Live – CommVault

#VFD4 Live – CommVault


#VFD4 Live – Solarwinds

#VFD4 Live – Solarwinds


#VFD4 Live – StorMagic

#VFD4 Live – StorMagic