Avatar photo
By: Glen Kosaka

March 15, 2024 7:13 pm

3,161 views

How NeuVector Leverages eBPF to Improve Observability and Security

Extended Berkeley Packet Filter There’s been a lot of recent interest in eBPF (extended Berkeley Packet Filter) and its application for container security solutions. Let’s examine eBPF's features and benefits and how NeuVector utilizes them to enhance its full-lifecycle container security solution. eBPF enables products to run sandboxed programs in a privileged context, […]

Read More


Avatar photo
By: SUSE

October 25, 2023 4:06 pm

4,427 views

What is Container Security?

Introduction to Container Security Container security is a critical aspect in the domain of modern software deployment and development. At its core, container security involves a comprehensive framework comprised of policies, processes, and technologies that are specifically designed to protect containerized applications and the infrastructure they run on. These security measures are implemented throughout the […]

Read More


Avatar photo
By: Karthikeyan Rajendran

July 25, 2020 9:21 am

12,070 views

Setup secure private Docker registry in SUSE Linux Enterprise server 15Sp2

Containerized application delivery has become the latest trend in today’s IT environment. These container images are distributed by respective Organizations/Communities through their official Docker container registries hosted online. Docker container registries are applications that manages storing and delivering of container images. Container images can be pulled from any online registry you can access to ,[…]

Read More


Avatar photo
By: Sascha Grunert

September 17, 2019 4:00 pm

12,490 views

Demystifying Containers – Part III: Container Images

This series of blog posts and corresponding talks aims to provide you with a pragmatic view on containers from a historic perspective. Together we will discover modern cloud architectures layer by layer, which means we will start at the Linux Kernel level and end up at writing our own secure cloud native applications. Simple examples […]

Read More


Avatar photo
By: SUSE

April 4, 2017 7:15 am

24,825 views

Your First SLES Container

Introduction: How do you trust the random Docker hub package out there that may or may not have open-sourced their Dockerfile? It may be fine for experimenting with the Docker platform, but for mission critical applications, it’s best to know exactly what’s involved. Docker in SLES gives you all of the power of […]

Read More


Avatar photo
By: sarsene

November 10, 2016 7:18 am

16,677 views

Introducing SUSE Containers as a Service Platform

SUSE Containers as a Service Platform is the solution that puts together SUSE Linux Enterprise MicroOS, the operating system optimized for running the next generation of applications with Linux containers, and the container orchestration solution for container cluster management based on Kubernetes. SLE MicroOS technology is a modern Linux Operating System, designed for containers and […]

Read More


Avatar photo
By: SUSE

June 19, 2016 12:08 pm

4,393 views

Docker and Dads

I’m one of those lucky guys who woke up this morning with a 5-year-old’s arms around my neck and cries of “Happy Father’s Day!” Even the teenagers smiled, didn’t protest too much as they brought me breakfast (eggs for protein and fruit to keep me healthy). And they all […]

Read More


Avatar photo
By: SUSE

June 16, 2016 11:17 am

4,078 views

How do you like to learn?

If you’re anything like me, when it comes to learning, I can’t just read about it. I need to watch, listen, and be shown examples of what I’m meant to learn for it to really stick. That’s why I prefer webinars. Yeah, the live sessions are hard to fit into my […]

Read More


Avatar photo
By: Naji Almahmoud

December 17, 2015 11:07 am

5,178 views

New Technology Available in 2015

Apply security fixes to your IT systems with zero interruption It is called live patching that enable you to keep your IT system running while mitigating new threats. In other word, no more panic when the market discover new operating system vulnerability. New technology protect your operating system as it keeps running. Less than a […]

Read More