> Docker containers are, by default, quite secure; especially if you take care of running your processes inside the containers as non-privileged users (i.e., non-root).
I'm not quite seeing the sense of insecurity here, especially from the conclusion. Like any piece of software, it's up the user to not use "dangerous" configurations.
Though in a Unikernel, the kernel only implements what is needed to run the service. So a database, for example, would be lacking functionality like a shell to escape to.. or even a TTY to run that shell on.. or an implementation of connect() to even initiate outbound TCP connections, in the extreme case.
There have been significant scalability improvements in that time (9.2, 9.5). There also have been lots of smaller improvements in single threaded performance in general, leading to rather noticeable aggregate improvements.
That's all for the cases where the same query plan is used in 9.0 and 9.5 - the differences where new type of plans (say index only scans) are often very large.
9.5 was supposed to get "parallel sequential scan" (which is a big deal performance-wise), but I don't see it on the "what's new in pg 9.5" page. Anyone know what's up with that?
It wasn't ready yet. A significant amount of development happened after the point where that's supposed to happen for features to be integrated in 9.5.
Now that 9.5 has its own branch I hope we'll get it in early in the 9.6 development cycle; so we have time to iron out all the potential kinks.
I don't think there ever was a clear "this will be in 9.5" statement from anyone?
Right now account sign up is wide open, but the plan is to move to paid accounts with a free trial period. I'm thinking tiered plans based on concurrency limits (right now all accounts are capped at 1 active instance).
The use case not highlighted by the blog post is is disposable databases for use with automated tests. One of my inspirations was the idea of using a Vagrant VM as a development environment and deleting each night and re-creating it each morning so that the project doesn't accumulate untracked dependencies on environment tweaks. I'd like to enable/encourage similar practices for DBs. For that, I'm working on a Jenkins plugin.
https://docs.docker.com/articles/security/