- Chapter 1: Container Wars -- LXCs vs. Docker
- Chapter 2: Comparing Containers and Virtual Machines
- Chapter 3: Container Security, Networking, and Management
- Chapter 4: What Users Want: Container Technology Survey Results
- Chapter 5: Container Network Functions Virtualization (Container NFV)
- Chapter 6: Linux Container Product Categories
- Chapter 7: List of Linux Container Vendors
Linux container technology: Everybody’s talking about it. Container has become one of those magic buzzwords that can conjure up billions of dollars in capital and create market-leading companies such as Docker, overnight.
But what are containers used for, exactly, and how do they apply to existing virtualization and networking markets? That is what we intend to define here in the first SDxCentral report on container infrastructure, which is sure to become an annual tradition. This includes the development of important niches of the container ecosystem, including container security, container networking, and Docker networking. Think of the container technology world as developing parallels to all of the existing tools in the networking market.
The easiest way to think about container technology is it’s a new way to manage, distribute and run applications in a more flexible and agile way. The concept of container technology uses the paradigm of shipping containers in inter-modal transport. The idea is that before shipping containers were invented, manufacturers had to be prepared to ship goods in a wide variety of modes – ships, trains, or trucks – with different sized containers and packaging. By standardizing the shipping container, goods could be seamlessly transferred among shipping methods without any additional preparation.
Register for SDxCentral
After you submit the form, we will send a randomly-generated password to your email address in the next 5 minutes. Please check your spam folder, bulk email folder or promotions tab in your email client for an email from firstname.lastname@example.org as sometimes our emails will be flagged as such. Contact email@example.com if you can’t find the email.
A reset link will be emailed to you.