Archive Search Articles

Container Danger in the Cloud

by: Lori MacVittie

The slow but steady migration to cloud-based environments has had an impact on many aspects of IT. One we rarely make mention of is administration. But we should.

Is 2017 Half Empty or Half Full?

by: Peter Silva

F5 DevCentral's Pete Silva takes a look at tech trends thus far in 2017, with ransomeware (still) top-of-mind.

Unpacking a Multi-Cloud Approach

by: Calvin Rowland

SVP Calvin Rowland breaks down what it means for organizations to deploy multi-cloud solutions, touching on DevOps topics as well.

Rethink Your Access Strategy, Think BeyondCorp

by: Lee Slaughter

F5's Lee Slaughter offers his take on the 'zero trust' model, along with solutions from F5 and Google.

In Container Land, Declarative Configuration is King

by: Lori MacVittie

Digital transformation on the inside is integral to enabling digital transformation on the outside. One of the foundational components of internal digital transformation is automation, which relies heavily on the control plane. The control plane...

TCP Optimization Enhancements for a Better Mobile Experience

by: Patricia Du

The industry's use of TCP has evolved (far) beyond its original intentions. Patricia Du examines the ways TCP optimization better addresses modern user behavior.

Digital Transformation is More than just Going Paperless

by: Lori MacVittie

F5's Lori MacVittie discusses the interplay between 'big box' and 'big digital' shopping in light of an experience economy.

Stop the IoT attack that comes before THE ATTACK

by: Lori MacVittie

Generally speaking, the use of the term “attack” has come to mean an attempt to deny service to an organization. That’s likely because the frequency and volume of DDoS attacks have had serious consequences for high-profile organizations. The...

Private Clouds Demand a Different Mindset

by: Robert Haynes

Successful private cloud adoption is not (just) about the infrastructure. It requires fundamental changes in the way your network operations work.

Top Security Findings in the F5 State of Application Delivery Report

by: David Holmes

Nearly one in five of report respondents have security titles. F5's David Holmes takes a closer look at what's important to them.

Production Ready is not User Ready

by: Lori MacVittie

Continuous delivery is the penultimate goal of organizations’ embracing DevOps. It is not the ultimate goal, because that would continuous deployment. Much ado is made in the alleyways of DevOps with respect to the ability to deliver...

Virtualize to Scale on Demand: Dynamic Service Function Chaining in the S/Gi-LAN

by: Patricia Du

F5's Patricia Du discusses service provider topics, including how value-added services improve the customer experience by controlling traffic based on user profiles, network policies, and application characteristics.

Three Things App Security is Not

by: Lori MacVittie

App security is a lot of things, but sometimes we need to stop and consider what it isn’t, particularly as the volume and frequency of applications developed and deployed to meet the insatiable demand continues to rise. 1. Not a high priority A...