Archiver Search Articles

I’ve Taken the Super-NetOps Course. Now How Do I Develop my Powers?

by: Robert Haynes

Robert Haynes walks you through suggested next steps once you've completed F5's initial Super-NetOps training.

Garbage In, Garbage Out: Don’t Automate Broken Processes

by: Lori MacVittie

When I was a wee lass getting ready to deliver my company’s very first Internet-enabled application, I learned a valuable lesson. It wasn’t about technology. It wasn’t about the Internet. It was about processes and how frustrating they can be t...

The Importance of ADCs for IoT in Public Cloud Environments

by: Frank Strobel

With F5 BIG-IP virtual editions, IoT-focused organizations can seamlessly deploy in public or multi-cloud environments with maximum flexibility.

#PressForProgress through the Power of Influence

by: Shallu Behar-Sheehan

On International Women's Day, F5's Shallu Behar-Sheehan comments on how influence impacts the workplace, and what it means for her career.

F5 Acquires Microsoft Gold Cloud Competency

by: Tom Atkins

Confidence in the public cloud is on the rise as the market and platforms mature, thanks in part to certification and competency validations from major providers.

New F5 Private Cloud Solution Package for OpenStack

by: Ankita Bhalla

OpenStack supports an increasing number of mission-critical applications, but it can still be complex to set up. F5 makes it easier.

NetOps Needs to be Agile because the Cloud Can Change Overnight

by: Lori MacVittie

NetOps needs to embrace DevOps methodologies and principles to restore the balance of stability and speed to support the growing number of applications deployed in the public cloud. There is a belief on this side (the network side) of the fence...

Announcing F5 Managed Rulesets for AWS WAF

by: Andrew Hendry

AWS has just announced enhanced F5 managed security capabilities on AWS WAF around Bot Protection, CVE Vulnerabilities, and Web Exploits.

Application Services Update: Security, Speed, and Suspicious Visitors

by: Lori MacVittie

It’s time again to dig into the application services organizations are actually using to make apps faster and safer. Of note is a rise in use of bot defense services and the slow but steady inroads being made by HTTP/2. While not an application...

Don’t take your eye off GTP en route to 5G

by: Peter Nas

Changes to the EU’s roaming regulations and raised awareness of security risks are fueling dramatic increases in GPRS Tunneling Protocol (GTP) traffic.

Three Signs of an App Attack Developers Should Know

by: Lori MacVittie

Apps are under siege. Attacks occur with alarming frequency – every 39 seconds according to research conducted by the University of Maryland

Unlocking smart core network slicing for IoT and MVNOs

by: Bart Salaets

Network slicing is one of the most important 5G innovations available to mobile operators, allowing them to subdivide one physical network into multiple logical networks.

Conquering video: Overcoming the congestion conundrum

by: Raffaele D'Albenzio

F5 technology offers a cost-effective solution to the challenge of video by improving the way Transmission Control Protocol (TCP) works on the mobile network.

Open Source Spotlight: F5 Enables A/B Testing and Blue/Green Deployments with Red Hat OpenShift

by: Lori MacVittie

Today’s fast-paced, digitally-enabled data centers need to be able to direct traffic, not just distribute it. Red Hat OpenShift is in use by 21% of respondents according to the State of Application Delivery 2018. A/B Testing and Blue/Gre...

My New Car, the Rise of Multi-Access Edge Computing, and the BIG-IP i15000 Series

by: Glenn Graham

New network designs must better accommodate traffic to and from a massive number of smart devices. A 5G world is coming soon—F5 solutions can help as your 4G networks evolve.