This week we asked ourselves a critical container question. What is the command that's used to make containers completely?
We've covered the many aspects of Container Security in previous shows, but over the last couple of weeks it seemed like the community was starting to believe that many VMs were the silver bullet for container security. We spend most of the show talking about defense-in-depth and the pros and cons of using VMs as for isolation and security. Sometimes the show gets a little ranty, so bear with us.
The show will always be available on this blog (search: #PodCTL), as well as RSS Feeds, iTunes, Google Play, Stitcher, TuneIn and all your favorite podcast players.
关于作者
Brian Gracely (@bgracely) is Sr. Director, Portfolio Strategy at Red Hat. He has previously held leadership, product management, engineering, marketing and M&A roles at Cisco, EMC, NetApp, Virtustream, Solo. He is an industry-recognized leader in cloud computing, and hosts the industry's #1 cloud computing and AI podcast, The Cloudcast.