Cloud Computing

Last Updated on 14 June 2016, Total: 78 Articles and Tutorials

  1. Cloud Security - Five Things that Should Never Go Into the Cloud (Part 1)

    In this article, we'll start off with a short discussion about what cloud services are all about, and then look at five things that shouldn't go into the cloud... Read More

  2. Considerations for AWS

    When utilising AWS there are a few things one should consider to side-step common blunders that are often made. In this article we will look at the areas that should be given careful consideration, for these errors to be avoided, as best possible, and ultimately enhance the user experience of AWS... Read More

  3. Containerization Proliferation: The Docker Effect (Part 1)

    In this part one of this multi-part series, we'll briefly explain the benefits of using containers and some generalities about how they work... Read More

  4. Containerization Proliferation: The Docker Effect (Part 2)

    In this Part 2, we’ll start drilling down into the popular container solutions, logically beginning with the company that put containers on the map: Docker... Read More

  5. Containerization Proliferation: The Docker Effect (Part 3)

    Here in Part 3, we will take up the (sometimes touchy) subject of container security in general and Docker security in particular, what has been done and is being done to improve it, and third party security solutions that can make Docker and other containerization methods more secure... Read More

  6. Containerization Proliferation: The Docker Effect (Part 4)

    Now, in Part 4, we will continue on the security topic and go into how you can harden the Docker host using SELinux, AppArmor, Grsec and other similar systems before we get into a discussion around some of the third party security solutions that are available for Docker... Read More

  7. Containerization Proliferation: The Docker Effect (Part 5)

    In this Part 5, we will look first at Docker’s own improved security in the form of Docker Content Trust, and then touch on some of the third party security solutions that are available for Docker... Read More

  8. Containerization Proliferation: The Docker Effect (Part 6)

    In this Part 6, we’re going to wrap up the series by talking a little about CoreOS, Kubernetes (Google’s container management solution), and Microsoft’s entries into this space: Windows Server Containers and Hyper-V Containers... Read More

  9. Data Furnaces

    In this article the author discusses an idea recently presented by Microsoft researchers... Read More

  10. Deep Dive Into Office 365 Deployment (Part 1)

    The first part of this article series explains the common Office 365 requirements we might see from a customer... Read More

Featured Links