6 container trends IT leaders should watch

6 container trends IT leaders should watch

What container trends should CIOs and their teams have on their radar? Let's dig in

144 readers like this


October 30, 2018
CIO Containers Ecosystem

4. New and maturing capabilities foster wider adoption

All three of those tools, along with continued development and maturity in core platforms such as Kubernetes, are examples of how the IT industry at large is already addressing and solving some of the initial problems and challenges running containerized applications in production.

Colin Chapman, chief delivery officer at Nexient, says containers have had a considerable positive impact on the software development firm’s business. That doesn’t mean there weren’t some bumps in the road. Stateful applications, like Xu notes above, or systems that had sophisticated intrinsic distributed architectures were still difficult to fit into the paradigm, Chapman says. Those issues are starting to get smoothed out, however, paving the way for wider usage.

“I would say the most exciting recent development in orchestration is the support for stateful apps and the Operator pattern, where some of our most complex systems and operations techniques can be standardized and automated,” Chapman notes.

“Another big step has been the emergence of new container-native build tools, which give us scalable event-driven workflows, allowing a shift away from the linear build pipelines we were used to towards actual reactive systems,” Chapman says. “We can respond to near real-time changes, allowing for sophisticated parallel workflows and large-scale testing, using our orchestration stack to coordinate FaaS events.”

5. Service meshes help pay off on a key promise of containers

Istio, the service mesh technology Xu mentioned above, is helping more teams move containers out of a developer’s sandbox and into production. Istio helps teams move containers around at scale, without disrupting external services around them, like load balancing and application firewalls.

“We have been able to automate many processes, like resiliency testing and cluster federation, using these meshes, as well as to help in continuous delivery, with phased deployments.”

Chapman from Nexient translates the buzz around services meshes into tangible results that his firm is seeing first-hand: “We have been able to automate many processes, like resiliency testing and cluster federation, using these meshes, as well as to help in continuous delivery, with phased deployments. The fine-grained control over security and monitoring allowed by the mesh approach has greatly simplified the application architectures we’ve used, allowing us to factor out much of the cross-cutting bloat in our application and networking layers. We can set up encryption, authorization, and monitoring, all through primitives that can be programmatically controlled and quickly changed.”

6. Container security comes of age

Enthusiasm for an emerging technology tends to get kept in check by questions such as, “So, uh, can we run this securely in production?”

“Security was previously major deterrent to container adoptions,” McClarty says. “However, containers are now hardened, secured, and tested against vulnerabilities within the continuous delivery pipeline.”

A mix of technology and cultural changes are enabling IT teams to “shift left” in their development pipelines. Gary Duan, CTO at NeuVector, points to DevSecOps as an example of this mindset.

“As container strategies mature, enterprises deploying containers within CI/CD pipelines are increasingly recognizing the importance of securing their application container development environments from start to finish,” Duan says.

That “shift left” mindset might only account for the build and ship stages; as more companies begin moving containers into production, they’ll need to secure the “run” stage, too. They’ll have a growing menu of maturing container security tools and technologies to choose from when they do.

[ Kubernetes terminology, demystified: Get our Kubernetes glossary cheat sheet for IT and business leaders. ]


7 New CIO Rules of Road

CIOs: We welcome you to join the conversation

Related Topics

Submitted By Mark Runyon
September 19, 2019

Maybe a ticked off employee will seek revenge. Maybe someone will accidentally delete critical files or expose data. Take these steps to tighten cloud security.

Submitted By Kevin Casey
September 18, 2019

Let’s quantify what’s going on with Robotic Process Automation (RPA). These statistics speak to adoption, ROI results, job openings - and hint at what’s ahead.

Submitted By Carla Rudder
September 18, 2019

Digital transformation efforts can stall for many reasons. Get to the cause of your trouble by asking these questions.


Email Capture

Keep up with the latest thoughts, strategies, and insights from CIOs & IT leaders.