Archivar Search Blogs

DevSecOpsが必要な本当の理由?DevSecCon Singapore 2019から学ぶ、DevOpsセキュリティの現場とは。

by: Keii



by: Keii

皆さん、こんにちは。先月の私のブログでもご紹介した通り、毎年発表している弊社のアプリケーション基盤の利用動向調査の最新版である2019年度結果が発表されました。簡単にご紹介しますと、これは全世界のユーザ企業様に対してオンラインでアンケート形式のアプリケーション基盤技術の利用動向をお聞きし、集計したものになります。日本からも多数のご協力、ご参加をいただきました。この場を借りて厚くお礼申し上げます。 さて、今回のグローバルのレポート発行に伴い、特に日本のユーザ企業様向けに結果を一部抜粋でご紹...


by: Keii


Containers, APIs, and Security Rule Two

by: Lori MacVittie

#LockTheDoor already You would think by now that nothing about security would surprise me. Maybe it’s not that I’m surprised, but rather I’m disappointed. Disappointed in the failure to adhere to even the most basic of security principles. You...

Why Infrastructure Matters to Developers using Containers

by: Lori MacVittie

Today, one of the most frequently heard questions in the halls of an infrastructure provider is how to explain the value of that infrastructure to the developer community. Trouble is, most of the benefits of infrastructure are garnered after...

Why Should DevOps Practitioners Care about Per-App Architectures?

by: Lori MacVittie

Implied in that question is the conclusion that you should. For decades now we have been deploying the application services that comprise much of the production pipeline on shared platforms. Application services like load balancing, application...

Is there a Minimal Viable Deployment for NetOps

by: Lori MacVittie

Is it really all or nothing for network automation? Network automation – the practice of DevOpsing the production pipeline – is already in use by a significant percentage of organizations. While very few are fully engaged, the majority (77%...

The IP Address as Identity is Lazy Security

by: Lori MacVittie

It’s also largely ineffective The Internet works largely because of DNS. The ability to match a site with an IP address – needed to route requests and responses across the Internet – is what ultimately makes the Internet usable. The majority of...

“Props” to our Partners for the Strong Value Prop

by: Frank Strobel

One of the interesting things about the cyber security industry is the degree to which vendors essentially wind up on the same side.

Leaders and Laggards in Cloud: It’s all about the Application Services

by: Lori MacVittie

Sometimes I love reading commentary from El Reg on IT and technology. Delivered with just the right amount of bite, their bark is often right on target. Other times, though, they miss the mark in their biting commentary. In a diatribe on cloud...

Size Matters (But not that Much) in Network Automation

by: Lori MacVittie

So says the data. It would be easy to dismiss the importance of network automation by claiming that the size of your organization (and subsequently, demand) doesn’t warrant the admittedly significant effort required. After all, if there’s only...

Using F5 BIG-IP to Eliminate Tiers When Scaling Apps in Containers

by: Lori MacVittie

Or is that ‘tears’ of frustration? ¯\_(ツ)_/¯ Perhaps it’s both. There is a relationship between network and application architectures. Usually we like to talk about how changes and shifts in application architectures impact the...

Availability is a Diversion and We are Falling for It

by: Lori MacVittie

In a more balanced world, application users would have the same level of concern for the security of their data as they do for their access to it.

BIG-IP Cloud Edition: Making Sure Your App Party is Well Provisioned

by: Zach Westall

Zach Westall explains what intelligent traffic management, orchestration, and autoscaling have to do with a good party, wrapping up his series on BIG-IP Cloud Edition.

How to Prepare for Cloud-to-Cloud Migration

by: Lori MacVittie

Oh yes. It’s happening. Consider making it a part of your overarching cloud strategy to make the process less painful. What do the following have in common? Salmon, Canadian Geese, Monarch butterflies, and applications. If you guessed all of...