F5-Blog

BLOGS FILTERN NACH:
Lösung
  • Application Security
  • Automation & Orchestration
  • Cloud
  • Traffic Management
  • Service Provider
PRODUKT
  • Security
  • BIG-IP
  • Automation & Orchestration
  • Platforms
Jahr

The Unfiltered State of Application Survey Respondents

Whether we’re talking digital transformation, application architectures, or the importance of telemetry in maintaining a digital business, the soon-to-be-released results of our annual survey help shape F5's understanding of the market and strategic decisions. This year, we gave respondents a bit more latitude in providing freeform answers. They did not disappoint.

The Fourth Wave of Cloud is Imminent

We recently crested the third wave of cloud. Concurrently, the pandemic has shifted a lot of enterprise attitudes. One has been the approach to remote work. Another is that toward public cloud. In fact, just about every survey out there now says the market is full steam ahead on cloud migrations—but, while certainly related, an important distinction exists between cloud migration and cloud adoption.

How Cloud-Based Infrastructure Enables 5G Innovation

When it comes to 5G and innovation, one's imagination is the only limit. We all know that 5G is largely meant to satisfy the insatiable appetite for lightning-fast speeds and real-time (sub-millisecond) latencies. But it’s also the fundamental basis for enterprise vertical industries and academia enabling the development of some really remarkable technological advances.

Unsere Vision von moderner Adaptivität für traditionelle Anwendungen

F5 verwirklicht die Vision von adaptiven Anwendungen sowohl für traditionelle als auch für moderne Anwendungen. Wir definieren „traditionelle Anwendungen“ als solche, die eine monolithische, Client-Server- oder dreischichtige Architektur aufweisen. Im Gegensatz dazu sind „moderne Anwendungen“ als verteilte Cloud- oder containerbasierte Dienste konzipiert, die über APIs interagieren.

Credential Stuffing Increasingly Targets Video Games

Gaming accounts and microtransactions are valuable enough to have become substantial targets for hackers. Given that these accounts—like those in other industries—can be used across platforms (website, console, mobile phone), they can pose lucrative opportunities with multiple attack vectors for those savvy enough to go after them.

Musings on Monitoring after App Modernization

Whether through a mobile app using APIs to interface with an existing monolithic mainframe app or via message queues that connect Slack to a traditional client-server based customer service application, the task facing enterprise IT today is not merely to transform monoliths to microservices, but to make microservices talk to monoliths.

One Gateway to Secure them All

The advantages just aren’t about defense; careful control over entry points also results in a multiplicative increase in the efficacy of defenders. It’s no surprise, then, that these principles are often applied in the world of digital security.

Edge is Driving an Infrastructure Renaissance

As organizations ramp up their generation of data and seek to extract business value from it, analytics and automation powered by AI and ML will certainly be on the table as technologies put to the task. These are exactly the type of workloads that will benefit from optimized infrastructure, and yet they are the ones least likely to be able to take advantage of it today.

Why a Structured Data Design Strategy Matters: An Example

A thoughtful and deliberate data strategy is fundamental to enabling the quality and cost-effectiveness of the most important business workflows. Further, when the workflows are instrumented to transmit their observed data exhaust to a collection and analysis infrastructure, the workflows themselves can be continuously analyzed and improved, resulting in constantly adaptive and optimized business workflows.