Mobile Data

The Mobile Momentum: How Can Carriers Manage Increasing Traffic in the Mobile Space?

As their revenues decline and mobile carriers continue to struggle with the increasing traffic demand from their customers, Long Term Evolution (LTE) looks like...

Road-show in APAC: It Was a Hell of a Ride!

A couple of weeks ago I returned from a business trip to Korea and China where I met with a number of customers and...

Mobile World Congress 2012: When Intermingling Smartphones, IP phones, POTS lines and more, how do you maintain consistent quality of service?

It’s all in the delivery of the applications traversing the network. Visit Radware at the IMA partner booth (Hall 6 – C50) Remember when you...

Impressions from a Business Seminar in Vienna: Freezing Outside, Hot Inside!

A couple of weeks ago, during part of my European business travel to visit our customers, I had the privilege of being invited to...

Our Next-Generation ADC Rocks! (or so our customers say…)

Several weeks ago I returned from a business trip to Europe, in which I met with customers and new prospects from the UK and...

Mobile Data Growth Drives the Standardization on Diameter

As mobile data and the demand for extensive bandwidth-hungry content and applications continues to grow, service providers are forced to evolve and migrate legacy...

Cyber Monday Survival Tips for eRetailers: Ensuring Network and Application Availability and Guaranteeing High QoE

With Thanksgiving right around the corner, businesses everywhere are readying themselves for the post-holiday shopping blitz. And with the National Retail Federation predicting that...

To LSN or Not to LSN?

While everyone is talking about IPv6 in light of the IPv4 address space depletion - driven by the increasing demand for mobile and hand-held data...

The Rise of the Tablet: How It Affects IT Organizations… and You

Tablet computers popularity skyrockets. Devices like Apple iPad, Samsung Galaxy Tab, ASUS Eee Pad, BlackBerry Playbook and more not only change our life-style, the...

Mobile Data Advancements & Cloud Transformation

Everyone knows that both the bandwidth and scope of mobile applications continue to grow and evolve. It’s all around. Just take a quick look...

Must Read

Application Security in the Microservices Era

As organizations break their applications down into microservices, the responsibility for securing these environments is shifting as well.

The Evolution of Application Development

Delivering and securing containers and microservices is relatively new. Though there may be a few hiccups, all will normalize to a strong, steady state.

Agile Security Is Now A Reality

Businesses are looking to optimize and accelerate their SDLC, in order to improve their operational efficiency and gain a competitive edge.

New DemonBot Discovered

Are you using Hadoop for data analytics? If so, know that a new bot is targeting Hadoop clusters with the intention of performing DDoS...

IDBA: A Patented Bot Detection Technology

Over half of all internet traffic is generated by bots — some legitimate, some malicious. Competitors and adversaries alike deploy “bad” bots that leverage different methods to achieve nefarious objectives. This includes account takeover, scraping data, denying available inventory and launching denial-of-service attacks with the intent of stealing data or causing service disruptions.