Archive Search Articles

iSeries: Not Just a Better, Bigger, and Faster BIG-IP

by: Robert Haynes

With the launch of F5's BIG-IP iSeries, you get innovative new platforms that can adapt hardware capacity to match your workloads.

3 Things the Network Must Provide for IoT

by: Lori MacVittie

The Internet of Things (IoT) continues to be a topic of interest. And while consumer oriented gadgets and gizmos tend to make headlines, it’s the behind the scenes, in the data center prep work being conducted by early adopters that remain more...

The New AAA: APIs, Authentication, and Availability

by: Lori MacVittie

You might have figured out that yes, I’m one of those people playing Pokémon Go. Or, as is often the case of late, not playing Pokémon Go. That’s bad, because it also means our youngest is not playing, because as it turns out we’re bot...

Pokémon Go Launch Reminder Why ‘Build to Scale’ Important as ‘Build to Fail’

by: Lori MacVittie

One of the catch phrases of DevOps and cloud for the past, oh, many years has been “build to fail.” The premise being that too many businesses experience costly downtime and loss of revenue (and productivity) due to capacity-related performanc...

Scale in the age of Secure Everything

by: Lori MacVittie

At Apple’s WWDC (World Wide Developer Conference) in June, the mobile mogul announced that as of January 1, 2017, all apps in the app store MUST (that’s the RFC style MUST for those networkers following along) use App Transport Security (ATS). ...

Cisco Live and F5

by: Drew Milam

With fireworks in our rearview mirror, it’s time to turn our focus toward Las Vegas for Cisco Live, July 10-14, at the Mandalay Bay. Whether you’re going to the event or following online, here’s a snapshot of what to expect from F5 at...

Managing Policies with BIG-IQ 5.0

by: Dan Schrader

The introduction of BIG-IQ Centralized Management 5.0 marks a substantial advance in F5’s Management and Orchestration story. The release is, without exaggeration, the most important BIG-IQ release since the product was launched 3 years ago. While...

The Hierarchy of Application Needs

by: Lori MacVittie

Most folks have heard or seen Maslow’s Hierarchy of Needs. If you aren’t familiar with the concept (or need a refresher), here’s the TL;DR – Maslow believed that people are motivated to achieve certain needs. He defined a five level hierarchy...

At the Crossroad of Digital Transformation and Disruption

by: Kuna Nallappan

With the proliferation of devices and rapid improvement in infrastructure, Singapore, along with the rest of Asia, is at the crossroad of digital transformation and disruption. No other region is developing quite as quickly when it comes to the...

F5 at Cisco Live 2016: Your apps are in the cloud; your services should be too!

by: Jezmynn Koh

Less than a week left before we head off to Cisco Live, Melbourne from 8 – 11 March 2016 and things are starting to get real! This year F5 is on a mission to help organisations migrate their applications to the cloud and secure their journey in a...

Digitalisation in Education

by: Jezmynn Koh

If someone from the 19th century was teleported to witness a mathematics class in action in the year 2016, I would pay to see their astonished looks! From smart board interactions to children fiddling with iPads absorbing all the knowledge the...

F5 Friday: How Standardization Enables a Customizable Per-App (Microservices) Approach to App Security

by: Lori MacVittie

How Standardization Enables a Customizable Per-App (Microservices) Approach to App Security

Unintended Consequences: Proxies Under Load

by: Lori MacVittie

The need for scalability isn’t even a question these days. The answer is always yes, you need it. Business growth depends on operational growth of the applications that are, after all, part and parcel of today’s business models – no matter what...

On monoliths versus microservices

by: Lori MacVittie

Microservices (and their oft-referenced BFF, containers) are beginning to take over the hearts and minds of developers across the board. It’s not just startups that are adopting the loosely coupled, API-only, granular design principles of...

Identity theft: A threat more severe than you think

by: Kuna Nallappan

The financial services industry in Asia is one of the most heavily regulated sectors, and compliance is often touted as a form of security assurance. However, compliance is just a single aspect of security. Various regulations cover a wide range...