F5 Blog

 

The Container Colloquialism Translator for NetOps

by: Lori MacVittie

There are days when the jargon coming out of container land makes your head swim. With each new capability or feature offered by related solutions – service mesh, orchestrators, registries – seems to mandate a new term or phrase.

Conquer Your Cloud Security Concerns with F5 Advanced WAF on AWS and Azure

by: Tom Atkins

These virtual editions protect applications and data with complete feature parity across on-premises and multi-cloud deployments.

Introducing F5's New FIPS and Turbo SSL Appliances

by: Ankita Bhalla

F5 rounds out its appliance portfolio with improved price/performance, along with enhanced security and compliance features.

You Can’t Do Immutable Infrastructure without a Per-App Architecture

by: Lori MacVittie

Back in 2013, we were introduced to the concept of an immutable server. An immutable server is, as the term immutable suggests, static. Its configuration is fixed and cannot (or at least should not) be changed. If changes are required, a new...

Mainstream Microservices Mania: Challenges Increasing with Adoption

by: Lori MacVittie

Just a few short years ago microservices were a curiosity discussed by developers with a kind of giddy excitement at the possibilities and opportunities the fledgling app architecture presented. Today, even us networky folks are talking about...

Container Automation Drives Frictionless App Services

by: Jonathan George

One of the ways app developers are able to simplify their dev and test is to incorporate containers and microservices for maximum efficiency and portability.

Application Capital

by: Kara Sprague

F5 SVP Kara Sprague outlines an evolution of physical and digital capital that has led to the present era of Application Capital as an organization's most valuable asset.

Unblocking Change: Continuous Learning in the DevOps Era

by: Teri Patrick

For network ops, industry shifts can prove quite disruptive as app teams bypass controls and systems that made perfect sense at one time.

BIG-IP Cloud Edition: The Security Advantage of Per-App Architectures

by: Zach Westall

Apps introduce risk, and the apps that rely on other apps introduce even more risk – Zach Westall continues his blog series on BIG-IP Cloud Edition

The Surprising Truth about Digital Transformation: Container Confusion

by: Lori MacVittie

This is the last blog in a series on the challenges arising from digital transformation. The Surprising Truth about Digital Transformation The Surprising Truth about Digital Transformation: Cloud Chaos The Surprising Truth about Digital...

The Health of your Apps: Analytics in BIG-IP Cloud Edition and BIG-IQ 6.0

by: Dan Schrader

A closer look at how F5 provides an application-centric view of the health, performance, and security of your applications and the devices that serve them.

A Brief Catch-Up Ahead of the AWS Public Sector Summit

by: Tom Atkins

Each year, Washington D.C. plays host to one of the largest cloud-oriented public sector gatherings on the planet – AWS’ suitably dubbed Public Sector Summit.

The Surprising Truth about Digital Transformation: Diseconomy of Scale

by: Lori MacVittie

This is the fourth blog in a series on the challenges arising from digital transformation. The Surprising Truth about Digital Transformation The Surprising Truth about Digital Transformation: Cloud Chaos The Surprising Truth about Digital...

F5 Officially Supporting Ansible for Application Services Deployment

by: Lori MacVittie

As part of the robust and expanding Ansible ecosystem, F5 provides a wide variety of Ansible modules to automate the onboarding, configuration and deployment of F5 application services. Enabling Ansible-based automation simplifies, enable...

Bot Defense Should be a Key Component of a Proactive Security Strategy

by: Lori MacVittie

Usually when we talk about app protection we immediately focus on web application firewalls. Specifically, we tend to focus on the OWASP Top Ten and application layer vulnerabilities that can lead to becoming just another security statistic. ...