GDT Webinar Series – How to Fail at Security? Reserve Your Spot

Docker. No, not the pants, but the far and away leader in Containerization

Docker containerization

By Richard Arneson

I would be grossly remiss if I didn’t dovetail yesterday’s post about containerization without following up with info on the leader in that space―Docker. In fact, they’re so dominant in containerization, some use Docker and containers interchangeably, much like referring to all clear tape as Scotch tape, even if 3M has never laid eyes on it.
Along with having one of the most eye-catching and unique logos in the industry (blue animated whale supporting boxes, presumably containers), Docker has, in just five (5) years, set the IT world on fire. To date, their customers have placed almost 4 million applications in Docker containers, and over 37 billion apps have been downloaded.

Open Source

Docker’s open-source technology has not only been embraced by Linux-based Red Hat, Google and Facebook, to name just a few, but also by proprietary software juggernauts Microsoft and Oracle. It’s resoundingly estimated within the industry that all――yes, allcloud and IT companies are using Docker.
Remember, containers utilize shared operating systems, so they’re more efficient than resource-heavy hypervisors. Containers sit atop the OS, so unneeded resources aren’t wastefully along for the ride. Instead, containers deliver a tidy package that contains only the application(s) needed.

Not Resting on their laurels

When you’re far and away the leader in your field, it might be easy to kick back and relax a bit, if even for a sliver of time. But Docker certainly doesn’t take this approach. In fact in June, they announced its latest release of Docker Enterprise Edition, which, among other things, addresses what they feel is a containerization gap.
This release, which will be in Beta the last half of 2018, contains what Docker is calling federated application management. It will allow customers to manage multiple clusters, whether on-prem or in the cloud, and even if multiple cloud providers are being used. Clusters can be formed for multiple containers with common requirements, which simplifies the management and monitoring of them. Docker is basically making the efficiencies of containerization even more efficient.

Why Docker? It’s in the numbers…

Aside from delivering some immediate value to customers, such as a reduction in infrastructure and costs associated with supporting current applications, Docker has delivered to customers, on average:

  • Over 300% faster time to market
  • A 1,300% increase in developer productivity
  • Sixty percent (60%) faster deployments

And that’s only a few of the impressive stats they’re currently bringing to customers. To get an idea of how much savings your organization could be enjoying by using Dock, check out their ROI calculator. It’s simple to use, and pretty eye opening.

Turn to the Docker experts at GDT

Docker is one of GDT’s valued partners, and the talented solutions architects and engineers at GDT are experienced in helping customers enjoy the many benefits that Docker has repeatedly brought to organizations of all sizes, and from a variety of industries. They can be reached at SolutionsArchitects@gdt.com or at Engineering@gdt.com. They’d love to hear from you.

Author

Share this article

You might also like:

AI modernization in the contact center & beyond: A Q&A with GDT experts

Chances are, your organization is actively exploring AI modernization opportunities across your infrastructure, especially in the contact center and data center. In fact, you’ve likely already started your AI journey. Approximately one-third of organizations are investing in data center network upgrades over the next 12 months to meet the demands

Why you need to address Shadow AI—and how to get started

What is Shadow AI? Many organizations are seeking to benefit from the productivity and innovation that AI can provide. However, the use of AI elevates risk to data security, compliance, and corporate reputation. Organizations are discovering that some employees are using publicly available models or applications without IT oversight, adding

Zero Trust and hybrid work: Securing a perimeter-less world

In a world where bad actors employ increasingly sophisticated technologies to wreak havoc, organizations are looking beyond traditional perimeter approaches in favor of a Zero Trust strategy. Remote and hybrid work, increased reliance on managed services and third parties, and a rapidly evolving threat landscape comprise just some of the