Archive Search Articles

Load Balancing Apps and APIs: Algorithms versus Architecture

by: Lori MacVittie

For the most part, scaling apps and APIs are pretty much the same thing. Both require some sort of load balancer – usually a proxy – and are required to distribute requests across a pool of resources. But there is a fairly significant difference...

IT Automation is Strategic

by: Lori MacVittie

What if I told you that “mainframes host more transactions daily than Google (1.3 million/second on CICS vs. 68,542/second on Google), including 55 percent of all enterprise transactions.” (Forbes) Would you be shocked? You shouldn’t. While...

NetOps Take Note of SRE Focus on MTTR to Realize Availability

by: Lori MacVittie

Site Reliability Engineer (SRE) is a relatively new role – usually within engineering or operations – focused on maintaining, unsurprisingly, site reliability. That generally means availability of applications, but it also includes performance....

See How to Route Apps across Multi-Cloud Containers with F5 and Red Hat at Red Hat Summit

by: Lori MacVittie

F5 is at Red Hat Summit this week demonstrating multi-cloud capabilities with OpenShift Containers, Ansible automation, and Aspen Mesh / Istio insight.

Open Source Spotlight: URL rewrite and Helm charts with F5 Container Connector

by: Lori MacVittie

Lori MacVittie looks at how technologies like F5 Container Connector help navigate the routes between modern environments and traditional networking.

Why is a Declarative Model Important for NetOps Automation?

by: Lori MacVittie

Lori MacVittie: If you’re going to automate all the things, go declarative.

What is Infrastructure as Code for NetOps?

by: Lori MacVittie

As DevOps approaches creep over the wall into network operations, it drags with it new terminology. These colloquialisms can be confusing to NetOps who’ve not encountered them before, and can befuddle IT executives who are being pressured to...

BIG-IP Cloud Edition: Per-app Security and Scale

by: Lori MacVittie

There is a new network coming to a data center near you. And by ‘near you’ I mean within walking distance of your desk. Whether we like it or not, pressure from digital transformation continues to drive development of new apps at a frantic pace....

Eight Reasons Why the Future of Scaling Containers is Service Mesh

by: Lori MacVittie

Microservices are great for development velocity, but the complexity in these architectures lies in the service-to-service communication that microservices depend on. There are, right now, at least three different architectural options for...

Per-App Architectures Protect Apps at Home and in the Cloud

by: Lori MacVittie

The data center is being driven to change by digital transformation, with cloud, containers, and catastrophic breaches prompting this evolution sooner rather than later.

Workflows versus APIs

by: Lori MacVittie

There's an API tax. It's the time and technical debt incurred by executing complex processes using individual API calls. And it grows as processes expand.

How Cloud and Containers are Driving Application Services to Disaggregate

by: Lori MacVittie

Applications drive decisions on everything from location to the form-factor of delivery infrastructure, based on app needs and requirements.

Open Source Spotlight: What’s New for F5 in Ansible 2.5

by: Lori MacVittie

New F5 modules have been added with more security profiles, licensing support, and monitoring. More information and community support for a variety of playbooks is available on DevCentral or Github.

Production Pain Points and the Application Services that Relieve Them

by: Lori MacVittie

Developers in a RisingStack survey cite performance, security, and deployment difficulties in production environments Not all security and performance is the result of ‘bad code’. Platforms and protocol implementations are more often than not...

The Hunt for IoT Exposes Targeting of Build Infrastructure

by: Lori MacVittie

The Hunt for IoT by our own F5 Labs threat researchers continues. Its latest report exposes not only an active search for vulnerable IoT devices, but the targeting of build infrastructure.