Home Application Delivery Virtualization

Virtualization

Hybrid Cloud is Not the Goal – A Case for Full Virtualization

In the world of cloud and virtualization, the buzz word of the day is ‘hybrid’. Everyone wants a hybrid cloud environment because they want...

APAC Carriers need time to prepare all the changes required for 5G

Carriers converged on Singapore last week to discuss the state of the industry and plans for 5G. Singapore remained the same as ever.  Hot and...

Uber-less Austin virtually full of common themes at Light Reading’s BCE

In the “Silicon Hills” capital of the deep South, the world of technology movers and shakers descended upon Austin’s Convention Center for Light Reading’s...

Virtualization: Millennial Networks for the Millennial Generation

The virtualized networks we build today are millennial networks for millennial expectations. I was talking to someone the other day about how the...

The ADC is a Force Multiplier for NFV

The IT industry is moving towards virtualization and software-defined .  IT architects are realize that management and orchestration systems are required ...

Virtualizing the ADC – Molding Mature Technologies for the Cloud

Virtualization of existing technologies is an evolutionary step in the development of cloud designs.  The cloud is supposed to be an architecture...

Mobile World Congress 2016 Recap

After all the meetings have finished, the jamon has been eaten, Rioja has been drunk and all the world’s Mobile Carriers have returned from...

What to Expect at MWC 2016

Once again another year has started and the Mobile industry will descend upon Barcelona to discuss the latest trends.  There will be the obligatory...

Orchestrating and Automating My Holiday Shopping

This holiday season, I purchased most of my gifts online.  The process was easy and informative every step of the way.  From browsing the...

Why Every Network Needs a Doctor

Every year, I go to my doctor for my annual physical.  My doctor goes through a standard series of procedures every time.  He asks...

How Application Delivery Can Simplify Enterprise Challenges

In enterprise environments it is common for an application to be hosted by a pool of servers, either physical or virtual.  Over time these...

Must Read

Application Security in the Microservices Era

As organizations break their applications down into microservices, the responsibility for securing these environments is shifting as well.

The Evolution of Application Development

Delivering and securing containers and microservices is relatively new. Though there may be a few hiccups, all will normalize to a strong, steady state.

Agile Security Is Now A Reality

Businesses are looking to optimize and accelerate their SDLC, in order to improve their operational efficiency and gain a competitive edge.

New DemonBot Discovered

Are you using Hadoop for data analytics? If so, know that a new bot is targeting Hadoop clusters with the intention of performing DDoS...

IDBA: A Patented Bot Detection Technology

Over half of all internet traffic is generated by bots — some legitimate, some malicious. Competitors and adversaries alike deploy “bad” bots that leverage different methods to achieve nefarious objectives. This includes account takeover, scraping data, denying available inventory and launching denial-of-service attacks with the intent of stealing data or causing service disruptions.