Container orchestration, object storage, and more

Network Computing
March 24, 2018
bar
Kubernetes Primer: Key Concepts and Terms
In this chapter excerpt from "Mastering Kubernetes," learn what the container orchestration platform does and its basic architecture.

Continue Reading


 

TOP STORIES


The Evolution of Object Storage
Chris Evans looks at the rise of object storage and how the technology is changing to meet enterprise requirements.
Read More
Network Design: Router Vs. Switch
Peter Welcher examines design considerations when choosing a router or a switch in various scenarios.
Read More
Docker Orchestration Tools: A Comparison
Learn the key capabilities of Kubernetes, AWS Elastic Container Service, and Docker Swarm, and the advantages and drawbacks of each.
Read More
Facebook Debuts Data Center Fabric Aggregator
Social media giant unveils new open networking design at OCP Summit while Microsoft disaggregates flash storage.
Read More
Edge Computing Applications: 3 Traits
In the emerging IoT era, applications that require autonomy, low latency, and a lot of bandwidth are better suited for the edge.
Read More

TECH RESOURCES


WHITE PAPERS


ONLINE EVENTS
How to Build an Effective Incident Response Program
This session offers some guidance on how to build an incident response plan that can identify and re...
Learn More


PARTNER PERSPECTIVES
Applications & Identities Initial Targets in 86% of Breaches: Report
The startling numbers of breached data are sobering: 11.8 billion records compromised in 337 of 433 incidents examined by F5 researchers. They include 10.3 billion usernames, passwords, and email accounts.
Read More

 
9 Reasons to Be Extra Excited About Interop ITX 2018
From DevOps certification and hands-on sessions to a bowling party, there is a lot of new and fun stuff to enjoy at this year's conference in Las Vegas. Read More
Top Trends Impacting Enterprise Infrastructure
Interop ITX Infrastructure Chair Keith Townsend provides guidance on hyperconvergence, cloud migration, network disaggregation, and containers. Read More
Data Protection in the Public Cloud: 6 Steps
Follow these tips for securing corporate data when using public cloud services. Read More
Network Computing c/o UBM
303 Second St., Suite 900 South Tower
San Francisco, CA 94107

Contact Us | Privacy Policy | Unsubscribe
© UBM 2017. All Rights Reserved.