F5 Blog

 

Inteligencia sobre amenazas a la aplicación: ¿qué necesitan saber los CISOs?

by: Mike Convertino

Siempre menciono cuán importante es una fuerte gestión del riesgo para un CISO. Cuando se trata de riesgo, las aplicaciones de las que dependen los usuarios son una gran preocupación. En una encuesta de seguridad realizada en el...

Ceding Control of IoT for the Sake of Security

by: Lori MacVittie

We are, I think it’s safe to say, universally delighted by technology. The mundane is transformed into the magical by the mere introduction of technology. The novelty wears off after a time, of course, but by then there’s some other task that has...

Vulnerable Stuff Running in Containers Still Vulnerable Stuff

by: Lori MacVittie

It has been said – and not just by me – that encrypted malicious code is still malicious code. The encryption does nothing to change that...

The Dawn of Cloud Arbitrage: Equinix Builds and F5 helps Pave the Way

by: Calvin Rowland

Along with their just-opened San Jose data center, Equinix leverages F5 BIG-IP for application services to support multi-cloud interconnection.

AnsibleFest 2017’s Code of Conduct as a Metaphor for DevOps

by: Thomas A. McGonagle

The Ansible community requires everyone to be nice to each other, to be empathetic and to be kind. This is best evidenced by the Ansible Code of Conduct for events. One excerpt: “Ansible is dedicated to providing a harassment-free conference...

Successful Cloud Migrations: Making the Leap

by: Calvin Rowland

F5 SVP Calvin Rowland walks you through the mindset of moving to the cloud, with a nod to just announced IBM/VMware/F5 solutions.

Maslow’s Hierarchy of Automation Needs

by: Lori MacVittie

If there’s anything hotter than containers right now, it’s probably something based on containers, like serverless. In addition to being the “cool” kid on the block right now, it’s also the focus of just how important automation and orchestration*...

AnsibleFest and the Rise of Network Automation

by: Thomas A. McGonagle

Over the past year, F5 and Ansible have been working hard to bring network automation solutions to our customers. In successive releases, Ansible has introduced more and more network automation functionality, including persistent connections,...

Closing Data Center Generational Gaps with NetOps

by: Lori MacVittie

Don’t let anyone tell you hardware doesn’t matter. Hardware is everywhere. In every mobile phone. Every Fitbit and techno-gadget we own. In our cars. In our laptops and tablets. Increasingly, it’s in our appliances. In our watches. And apparently,...

New Skill and New Demands: The Private Cloud Challenge for Network Operations

by: Robert Haynes

Cloud adoption changes the way we deploy applications, and the way that IT fulfills its responsibility of “stopping everything breaking.”

Forget the kids. We need this for IT Automation.

by: Lori MacVittie

To untangle the complexity inherent in IT automation today, we need to find a better way to construct the workflows that represent the processes used to deploy, manage, and configure IT infrastructure.

Realizing Multi-Cloud Consistency with F5 and VMware Cloud on AWS

by: Lori MacVittie

In the beginning (back in 2007 or so), there was cloud. And it was mostly SaaS, as organizations eagerly consumed business-ready offerings that replaced previously rented line of business apps...

F5 Availability in the AWS GovCloud Marketplace!

by: Calvin Rowland

It’s no secret that security is the leading concern for the majority of public cloud users, but for some organizations and government agencies, it is even more paramount. For these groups, highly stringent regulatory and compliance requirements...

Treat Your IT Automation Code Like Cattle, Too.

by: Lori MacVittie

IT has to embrace standardization of the code that makes IT go or risk creating systems that syphon off the financial and efficacy benefits of IT automation. I spent nearly a decade developing software. Embedded software. Web software....

Hoisted by Our Own Petards: Big Dirty Data

by: Lori MacVittie

Big data. Petabytes generated on an hourly basis for millions of sensors and monitors embedded in things across the business value chain. From manufacturing to delivery, from POS to consumers, data is being generated in unprecedented amounts. ...