Home Application Delivery

Application Delivery

Should Business Risk Mitigation Be A Factor When We Choose Our Suppliers And Manufacturers?

This is something that I have struggled with for most of my working life. As a technology professional, it is my job to pick...

Single Sign On (SSO) Use Cases

SSO reduces password fatigue for users having to remember a password for each application. With SSO, a user logs into one application and then...

Global Server Load Balancing (GSLB) Use Cases

Whenever applications are deployed to multiple locations (physical or virtualized data centers and/or public cloud), some mechanism is required to distribute the user requests...

Maintaining Your Data Center’s Agility and Making the Most Out of Your Investment in ADC Capacity

Deciding on an appropriate application delivery controller (ADC) and evaluating the need for supporting infrastructure is a complex, complicated, and challenging job. Such challenges...

5G Security Challenges and Ways to Overcome Them

As the world waits for the introduction of 5G networks, the industry gears up to address the security challenges that may accompany 5G. The...

An Overview of the TCP Optimization Process

The Transmission Control Protocol (TCP) drives major internet operations such as video streaming, file transfers, web browsing, and communications, accounting for very high percentages...

Marrying the Business Need With Technology Drive: Recapping It All

Throughout the past four blogs in this series we have harkened back to some of the same key points. Today, we will recap. 1) Not...

Automation in Software Defined Data Centers

Automation is an interesting conversation that I have had with many of our customers lately, especially with cloud migration in play and DevOps processes...

Operational Visibility for Load Balanced Traffic in SDDC

Management and monitoring in Software Defined Data Centers (SDDC) benefit from automation principles, programmability, API and policy-driven provisioning of application environments through self-service templates....

Marrying the Business Need With Technology Drive, Part 4: Use Tools to Save Some Time (They Do Exist)!

In the past 20 years I have often found myself looking for just the right technology tool to solve a specific problem. Most often...

Load Balancers and Elastic Licensing

Last week I met with a very large enterprise in finance that has adopted provisioning on demand. They spin up applications on demand, having...

Marrying the Business Need With Technology, Part 3: Re-aggregating the Tools

In part one of this blog series we discussed how there is oftentimes a lack of knowledge when it comes to infrastructure technology and...

Must Read

Application Security in the Microservices Era

As organizations break their applications down into microservices, the responsibility for securing these environments is shifting as well.

The Evolution of Application Development

Delivering and securing containers and microservices is relatively new. Though there may be a few hiccups, all will normalize to a strong, steady state.

The State-Sponsored Cyberthreat Landscape

State-sponsored cyberattacks have emerged as one of the preeminent threats targeting companies today.

Agile Security Is Now A Reality

Businesses are looking to optimize and accelerate their SDLC, in order to improve their operational efficiency and gain a competitive edge.

Nation-State Attacks: Motivations & Consequences

Organizations leave sensitive, monetizable data unprotected, making cyberattacks a high-stakes, low-risk venture for nation-states.