F5 ブログ


Gen AI Apps: Moving from experiment to production

Generative AI applications have potential for enhancing productivity and profits, but transitioning from experimental to production stages requires companies to navigate through a maze of ethical, legal, and technical hurdles. Find out how to reap the benefits of rapidly evolving AI.

Crucial Concepts in AI: Transparency and Explainability

While transparency and explainability are imperative to building trust in AI so that businesses can reap the benefits of the technology, neither of these are the responsibility of AI security.

Enhancing DoD’s Zero Trust Overlays with F5 Solutions

See how F5 enhances the DoD's Zero Trust architecture with advanced MFA, cyber threat intelligence, & network access control, ensuring robust federal security.

The Need for AI Infrastructure Solutions to Focus on GPU Optimization

Discover how AI infrastructure solutions are needed to scale AI and optimize GPU utilization.

The Benefits of VMware to OpenShift Virtualization Migration

Discover the strategic advantages of virtualization migration and how transitioning from VMware to OpenShift improves operational flexibility and security.

Four Reasons Why the Public Sector Turns to F5

See why the public sector relies on F5 to secure its apps from increasingly sophisticated cyberattacks—while delivering the performance constituents demand.

No “One Model to Rule Them All” with Generative AI

Three AI deployment patterns are emerging, each with their own operational responsibilities and trade-offs. The choice of model and deployment pattern should be strategic while acknowledging the fast-evolving landscape of generative AI for enterprises.

Building a Vibrant LGBTQ+ Community at F5

The F5 Pride EIG builds community and advocates for the company’s LGBTQ+ employees, and seeks broader impact by extending allyship to employees’ family and friends.

Protecting Hybrid Environments with AWS Zero Trust Security and F5

Discover how AWS zero trust security with F5 protects hybrid environments with enhanced cloud workload protection, continuous monitoring solutions, and more.

Fortifying DNS Resilience and Performance with Hybrid Architecture

Discover how two F5 solutions, BIG-IP DNS and Distributed Cloud DNS, can work together to build resiliency, security, elasticity, and performance into your network.

Three Things You Should Know about AI Applications

AI applications are modern apps, but they do have differences. Learn the key things to know when it comes to AI-powered applications.

F5 is Scaling AI Inference from the Inside Out

Don't let GPU resources sit idle, build out scalable and secure AI compute complexes with the right hardware that lets inferencing inference.

From OpenAPI to NGINX as an API Gateway Using a Declarative API

Explore how to transform an OpenAPI schema definition into a fully functioning NGINX configuration running as an API Gateway with Web Application Firewall security and a Developer Portal using a declarative API approach.

The Impact of AI Inferencing on Data Center Architecture

To support the full AI life cycle, organizations will require significant updates in their architecture—specifically changes in the network. Failure to do so may lead to the inability scale and unreliable operations.

NGINX One Update: New Features Released

NGINX One is the next phase of our journey and an effort to make all NGINX products easier to configure, secure, scale and manage.

AI Inference Patterns

AI inference services enable AI access for developers, and can be consumed in a variety of ways. Key patterns include SaaS, Cloud Managed, and Self-Managed, each with unique trade-offs in scalability, cost, and data control.

Nutanix and F5: Partnering to Nurture Growth, Efficiency, and Heightened Security

As recent industry shifts reshape the market, the collaboration between Nutanix and F5’s BIG-IP product unit not only addresses current challenges but also promises innovation to spearhead future growth and security.

Shift Security Left with BIG-IP Next Access

Learn how to enhance security with MFA and SSO authentication methods and configure secure application access control using BIG-IP Next Access.

Understanding the EU's Digital Operational Resilience Act (DORA) Regulation Compliance in Financial Services

Explore key DORA incident reporting requirements, third-party risk compliance, and software solutions to enhance risk management in the EU financial sector.