Docker Blog
-
Dec 17, 2025
A Safer Container Ecosystem with Docker: Free Docker Hardened Images
Security for everyone. Docker Hardened Images are now free to use, share, and build on with no licensing surprises.
Read now
-
Feb 23, 2026
Gordon: Docker’s AI Agent Just Got an Update
Meet Gordon, Docker’s AI agent built into Docker Desktop. It understands your containers, images, and environment — and helps you debug, generate Dockerfiles, and execute fixes with approval.
Read now
-
Feb 23, 2026
Run OpenClaw Securely in Docker Sandboxes
Run OpenClaw in a Docker Sandbox with Docker Model Runner for private, local AI coding; no API keys, no cloud costs, strong isolation.
Read now
-
Feb 20, 2026
State of Agentic AI Report: Key Findings
See what 800+ global leaders report on agentic AI: production adoption, top barriers, MCP readiness, lock-in concerns, and why containers matter.
Read now
-
Guest Contributor Feb 19, 2026
How Medplum Secured Their Healthcare Platform with Docker Hardened Images (DHI)
See how Medplum cut CVE noise and strengthened HIPAA/SOC 2 compliance using Docker Hardened Images—non-root by default, minimal code changes.
Read now
-
Feb 17, 2026
The Multi-Model Database for AI Agents: Deploy SurrealDB with Docker Extension
Deploy SurrealDB in Docker Desktop with its extension, then build a WhatsApp RAG chatbot using vectors, graphs, and real-time queries all in one database.
Read now
-
Feb 16, 2026
Running NanoClaw in a Docker Shell Sandbox
Learn how to run NanoClaw, a Claude-powered WhatsApp assistant, inside a Docker Sandboxes shell sandbox for stronger isolation and proxy-managed API keys.
Read now
-
Feb 13, 2026
How to solve the context size issues with context packing with Docker Model Runner and Agentic Compose
Learn how to use context packing with Docker Model Runner and Agentic Compose to fit more into small local LLM context windows without hurting performance.
Read now
-
Feb 10, 2026
Hardened Images Are Free. Now What?
Docker Hardened Images are now free. Learn the waterline model, supply chain isolation, VEX, and policy automation to cut CVE noise and meet compliance.
Read now