Archive Search Articles

Taking Customers to AWS, Through Our Channel

by: David Helfer

SVP of Worldwide Channels David Helfer highlights F5's selection for the AWS Channel Opportunity Registration Program and just-achieved AWS Security Competency.

F5 BIG-IP Availability on IBM Cloud for VMware Solutions

by: Craig Scarborough

For most enterprises, the concept of cloud is well in the process of crossing the “chasm” from early adoption to early majority.

Automation: Managing F5 BIG-IP Configurations Using Puppet

by: Mani Gadde

Most of us are still learning new ways to optimize continuous deployments and reduce release cycles. In complex environments this often includes automating, streamlining, and eliminating costly, wasteful processes.

Example-driven Insecurity Illustrates Need for WAF

by: Lori MacVittie

Learning online is big. Especially for those who self-identify as a developer. If you take a peek at Stack Overflow’s annual developer survey...

Solace and F5: Partnering for Better IoT

by: Frank Strobel

In addition to being equipped to handle huge numbers of devices and massive amounts of data traffic, IoT deployments have to be built for some unique ways of communicating.

Making Multi-Cloud Manageable: F5 Application Connector Now Available for Microsoft Azure

by: Lori MacVittie

When using multiple public clouds to host applications, you’ve still got to manage those apps and connect them to a secure inbound path.

Bots are the Bane of Turing Security Test

by: Lori MacVittie

Bots are cool. Bots are scary. Bots are the future. Bots are getting smarter every day. Depending on what kind of bot we’re talking about, we’re either frustrated or fascinated by them.

Open Source Spotlight: Auto Scaling Mesos

by: Lori MacVittie

Thanks to cloud, auto scaling applications is now nearly synonymous with scalability. And until recently, auto scaling apps with Mesos was a mostly manual endeavor.

Ceding Control of IoT for the Sake of Security

by: Lori MacVittie

We are, I think it’s safe to say, universally delighted by technology. The mundane is transformed into the magical by the mere introduction of technology. The novelty wears off after a time, of course, but by then there’s some other task that has...

Vulnerable Stuff Running in Containers Still Vulnerable Stuff

by: Lori MacVittie

It has been said – and not just by me – that encrypted malicious code is still malicious code. The encryption does nothing to change that...

The Dawn of Cloud Arbitrage: Equinix Builds and F5 helps Pave the Way

by: Calvin Rowland

Along with their just-opened San Jose data center, Equinix leverages F5 BIG-IP for application services to support multi-cloud interconnection.

AnsibleFest 2017’s Code of Conduct as a Metaphor for DevOps

by: Thomas A. McGonagle

The Ansible community requires everyone to be nice to each other, to be empathetic and to be kind. This is best evidenced by the Ansible Code of Conduct for events. One excerpt: “Ansible is dedicated to providing a harassment-free conference...

Successful Cloud Migrations: Making the Leap

by: Calvin Rowland

F5 SVP Calvin Rowland walks you through the mindset of moving to the cloud, with a nod to just announced IBM/VMware/F5 solutions.

Maslow’s Hierarchy of Automation Needs

by: Lori MacVittie

If there’s anything hotter than containers right now, it’s probably something based on containers, like serverless. In addition to being the “cool” kid on the block right now, it’s also the focus of just how important automation and orchestration*...

AnsibleFest and the Rise of Network Automation

by: Thomas A. McGonagle

Over the past year, F5 and Ansible have been working hard to bring network automation solutions to our customers. In successive releases, Ansible has introduced more and more network automation functionality, including persistent connections,...