As early as 2009, when cloud was just beginning to rise ascendant as the technology most likely to disrupt, well, everything, many of us began looking at the problem of consistency at the infrastructu...
By Lori Mac VittieThere is a lot of FUD (Fear, Uncertainty, and Doubt) that gets attached to any emerging technology trend, particularly when it involves vast legions of consumers eager to participate. And while it’s e...
By Lori Mac VittieIt’s only sort of true that people are the weakest link in the information security chain. The truly weakest link is the browser. That’s because the browser is one of those apps that no one really pa...
By Lori Mac VittieScalability is a critical capability for both business and applications. On the business side, scaling operations is key to enabling the new app economy...
By Lori Mac VittieIt is natural to assume that when we see a padlock icon in our browsers that the site is using SSL to secure our communications. It’s also apparently a signal to consumers that the site is, in fact, s...
By Lori Mac VittieF5 Previews Pre-Configured Web Application Firewall Solution for Azure Security Center
By F5F5 and VMware are partnering to support you—our customers—by integrating our technologies, products, and services to meet your business needs from the data center to the cloud. We have done so for clo...
By Frank StrobelSmart leggings.   A portable Gluten sensor.    Wireless speaker in a light bulb. The number of “things” invading the market today is incredible, and every day brings something...
By Lori Mac VittieI’m often asked after speaking at conferences just what dog F5 has in the race. Of late, that topic is usually DevOps or related to DevOps in some way. The reality is that application-affine services ...
By Lori Mac VittieA wide variety of HTTP-based attacks can (and should) be prevented in your application. The OWASP Top 10 is a prime example of attack techniques that are both detectable and preventable from within an...
By Lori Mac VittieThe network is forking. Bifurcating. Dispersing. You’re welcome to use whatever term you’d like to use to describe the phenomenon of network services relocating from the quiet suburb that is the corpo...
By Lori Mac VittieThe world of the application developer and the network architect could not be more different except, perhaps, in the way in which they each view the other’s domain. A typical network perspective of an...
By Lori Mac VittieDiscussion of F5 application services available for use in Microsoft Azure.
By F5As virtualization began to take hold there were a variety of metrics proposed for measuring success. Consolidation ratios, admins to virtual machine ratios, time to provision, and percentage of server...
By Lori Mac VittieExplore the service discovery within a microservices architecture, including client-side and server-side discovery patterns, the service registry, & more.
By Chris RichardsonWhen I say “app services” or, to use the more common networking-oriented moniker, “L4-7 services”, what do you think of? Wait, let me guess. You thought of: load balancing caching WAN optimization ...
By Lori Mac VittieIt’s an application world. That’s beginning to sound trite and cliché, but it’s still true. When it comes to security, that means our focus should start with the application and work our way out ...
By Lori Mac VittieKeep the hot side hot and the cold side cold. You may recall (if you’re old enough and no, don’t worry, I won’t ask you to raise your hand) a campaign years ago by McDonald’s promoting packaging of so...
By Lori Mac VittieThere are many more attributes that can be gleaned from a seemingly simple application request than may at first meet the eye. There is, of course, IP address. From which can be determined one’s locat...
By Lori Mac Vittie