F5 ブログ

The Unfiltered State of Application Survey Respondents

Whether we’re talking digital transformation, application architectures, or the importance of telemetry in maintaining a digital business, the soon-to-be-released results of our annual survey help shape F5's understanding of the market and strategic decisions. This year, we gave respondents a bit more latitude in providing freeform answers. They did not disappoint.

The Fourth Wave of Cloud is Imminent

We recently crested the third wave of cloud. Concurrently, the pandemic has shifted a lot of enterprise attitudes. One has been the approach to remote work. Another is that toward public cloud. In fact, just about every survey out there now says the market is full steam ahead on cloud migrations—but, while certainly related, an important distinction exists between cloud migration and cloud adoption.

How Cloud-Based Infrastructure Enables 5G Innovation

When it comes to 5G and innovation, one's imagination is the only limit. We all know that 5G is largely meant to satisfy the insatiable appetite for lightning-fast speeds and real-time (sub-millisecond) latencies. But it’s also the fundamental basis for enterprise vertical industries and academia enabling the development of some really remarkable technological advances.

適応型アプケーションのビジョンを従来のアプリケーションに活かす

F5は、従来のアプリケーションと最先端のアプリケーションの両方を対象とした適応型アプリケーションのビジョンを実現しようとしています。私たちは、「従来のアプリケーション」を、モノリシック、クライアント/サーバー、または3層アーキテクチャを持つものと定義しています。対照的に、「最先端のアプリケーション」は、APIを介してやり取りする分散型のクラウドネイティブまたはコンテナネイティブのサービスとして構築されています。

Credential Stuffing Increasingly Targets Video Games

Gaming accounts and microtransactions are valuable enough to have become substantial targets for hackers. Given that these accounts—like those in other industries—can be used across platforms (website, console, mobile phone), they can pose lucrative opportunities with multiple attack vectors for those savvy enough to go after them.

Musings on Monitoring after App Modernization

Whether through a mobile app using APIs to interface with an existing monolithic mainframe app or via message queues that connect Slack to a traditional client-server based customer service application, the task facing enterprise IT today is not merely to transform monoliths to microservices, but to make microservices talk to monoliths.

Edge is Driving an Infrastructure Renaissance

As organizations ramp up their generation of data and seek to extract business value from it, analytics and automation powered by AI and ML will certainly be on the table as technologies put to the task. These are exactly the type of workloads that will benefit from optimized infrastructure, and yet they are the ones least likely to be able to take advantage of it today.

Why a Structured Data Design Strategy Matters: An Example

A thoughtful and deliberate data strategy is fundamental to enabling the quality and cost-effectiveness of the most important business workflows. Further, when the workflows are instrumented to transmit their observed data exhaust to a collection and analysis infrastructure, the workflows themselves can be continuously analyzed and improved, resulting in constantly adaptive and optimized business workflows.

Scaling DDoS Protection at the Edge

While it's true that 2020 has seen different DDoS attack patterns emerge, what is also true is that DDoS attacks at the infrastructure layer are still DDoS attacks. They are what we might call "traditional" attacks. What is changing are targets and opportunities that come with a distributed workforce, along with considerations around 5G and Edge computing.

適応型アプリケーションはデータ駆動型

何かが間違っていることを知ることと、それに対して何をすべきかを知ることには大きな違いがあります。適切な要素を監視して初めて、ユーザー エクスペリエンスの状態を見極めることができ、それらの測定値の分析結果から推測される関係性やパターンを導き出すことができます。最終的に、真の適応型アプリケーションを生み出す自動化は、測定値とその理解に基づいています。

Packing Up and Moving to SaaS

While SaaS is not really all that new, what is new is the range of activities being commoditized and packaged as SaaS. All manner of business functions are joining CRM, SFA, productivity, and communications as SaaS offerings. And we anticipate that organizations will quickly jump at the chance to offload the operation of such software to a provider.

Cloud-Native Architectures Accelerate Need for New Ways to Solve Security Challenges

Despite changes in architectures and location, security problems do not change. Customers still need to protect applications, ensure availability, and defend against DDoS attacks. Application security is just a bigger challenge now due to the expanding attack surfaces and vulnerabilities.

「適応型アプリケーション」の新たな世界が始まろうとしています。今回はその意味をお伝えします。

最新の適応型アプリケーションを自動的に拡張、縮小、防御、修復します。卓越したカスタマ エクスペリエンスを実現するために、アプリの拡張や安全性の確保にF5がどのようにお役に立てるかをご紹介します。

Beyond Visibility is Operability

There are two walls in the delivery path for applications. The first (which has been the cause of much friction) is between development and production. And while DevOps methodologies have begun to break down this wall, the other—the one between production and delivery to consumers—is not so easily breached.

Lost and Found: A Simple Solution to a Difficult Problem

Pause for a minute and ask yourself the following questions: Do you know how many apps you have? Do you know how those apps are performing? Do you know what those apps are doing? These questions may seem very basic, but many enterprises are struggling to find answers to them. F5’s Adil Laari explores app visibility in the context of the company’s new SaaS offering, F5 Beacon.

Digital Transformation: Progressing from Automation to Workflows

In the three phases of digital transformation, the first phase is all about automation. The focus on digitizing of workflows in phase two will ultimately offer business a path forward to the third phase, where data-driven services will generate actionable insights that improve efficiency, reduce process friction, and increase both productivity and profits.

Lost and Found: Are Your Apps Cost Effective?

With applications residing on-premises, you may have an understanding of where they all are or at least how to find them if asked. But with a move to cloud-native apps and migration to cloud deployments, do you know where all your apps are across multi-cloud environments? Jonathan George explores these topics in the context of F5 Beacon, the company's app visibility and analytics SaaS solution.