Archivar Search Blogs

Availability is a Diversion and We are Falling for It

by: Lori MacVittie

In a more balanced world, application users would have the same level of concern for the security of their data as they do for their access to it.

BIG-IP Cloud Edition: Making Sure Your App Party is Well Provisioned

by: Zach Westall

Zach Westall explains what intelligent traffic management, orchestration, and autoscaling have to do with a good party, wrapping up his series on BIG-IP Cloud Edition.

How to Prepare for Cloud-to-Cloud Migration

by: Lori MacVittie

Oh yes. It’s happening. Consider making it a part of your overarching cloud strategy to make the process less painful. What do the following have in common? Salmon, Canadian Geese, Monarch butterflies, and applications. If you guessed all of...

Software is Still Eating IT: Its Next Course is Application Services

by: Lori MacVittie

Back in 2015, I noted that Software was Eating IT. That was based on data culled from a variety of industry sources included RightScale, HBR, PWC, and others. From development to deployment to delivery, software was taking over everywhere. But...

F5 SSL Orchestrator Further Benefits Customers Thanks to Strong Partnerships

by: Frank Strobel

Frank Strobel highlights the role of F5's partner ecosystem in strengthening security, increasing scale and availability, and reducing operational costs.

SSL/TLS: Visibility Isn’t Enough, You Need Orchestration

by: David Holmes

A full-proxy for both SSL/TLS and HTTP, SSL Orchestrator can make intelligent decisions to steer inbound and outbound traffic to service chains within the security stack. No other solution can do that.

Protecting the Identity Perimeter

by: Graham Alderson

What do terms like Identity Perimeter and Zero Trust actually mean for you? Graham Alderson takes a look in the context of F5's new Access Manager.

Miners and Minions: Data Breaches aren’t the Only Thing that Cost You

by: Lori MacVittie

Sure, a data breach may cost more (at least right now) and it certainly forces your failure into the limelight (you gotta notify) but security can’t be just about data exposure. These days you only hear about a breach if there’s been a data...

Open Source Spotlight: F5 Eclipse Plugin for NetOps

by: Lori MacVittie

As a developer, my favorite editor for writing code is vim. I know, I know. But it’s fast, I can get around in it, and it isn’t emacs. (Yeah, I went there.)

Pay-As-You-Go BIG-IP VE and Advanced WAF Now Available for Azure Government

by: Tom Atkins

Perfect for development and test purposes, these instances provide true cloud-native operational flexibility with no long-term commitments or contracts.

What Makes F5 a Leader in WAF?

by: Brian A. McHenry

Brian McHenry looks at F5's diversity of WAF services and web application security capabilities in the context of a recent analyst report.

Big data doesn’t lie but the people who enter it might

by: Lori MacVittie

There’s an old business axiom we all know that  goes like this: The customer is always right. In this digital economy, it turns out that axiom has to change to read: The customer’s data is always right. Let me illustrate with a little...

The Container Colloquialism Translator for NetOps

by: Lori MacVittie

There are days when the jargon coming out of container land makes your head swim. With each new capability or feature offered by related solutions – service mesh, orchestrators, registries – seems to mandate a new term or phrase.

BIG-IP Cloud Editionによるアプリケーション中心の管理

by: Dan Schrader

F5において、アプリケーションデリバリコントローラ(ADC)では、常にアプリケーションを中心に据えています。

なぜアプリケーションサービスへのアプリごと(Per-App)のアプローチが重要なのか

by: Lori MacVittie

アプリケーション開発者のレンズを通してこの調査レポートを読むと、大変興味深い絵が浮かび上がってきます。