A Brief History of Containerization: Why Container Security Best Practices Need to Evolve Now


middleware, to application code, all combined into a single image. Therefore, the way the that a container runs in development is the same way it runs in Quality Assurance (QA) and production, resulting in running the application without hassle when the application is moved from one environment into other, which can help in fast deployment of applications.

This is the first installment in a two-part series about application containers. Stay tuned for part two to learn how to apply security best practices to application containers.


Think about a revolutionary invention. What’s the first thing that comes to mind?


Maybe it’s the advent of the internet, or perhaps your brain skipped all the way back to the steam engine. When asked that question, how many people do you think would land on shipping containers? They might not be the first thing that comes to mind, but the invention of shipping containers in the 1950s catalyzed change. Introducing a standard container helped pave the way for faster, cheaper and more reliable transportation of goods across the globe.


In many ways parallel to how physical containers shaped shipping, application containers are revolutionizing software development methods. Much like physical containers, application containers are a form of digital packaging. They rely on that attribute to provide virtual isolation for deploying or running various applications that use the same operating system (OS) or cloud.


Containers support a microservice-based architecture, an approach to redefining large-scale software projects to be m ..

Support the originator by clicking the read the rest link below.