Adopt TLS 1.3 – Kill Two Birds with One Stone Transport Layer Security (TLS) version 1.3 provides significant business benefits by making applications more secure, improving performance and reducing latency… Prakash Sinha | September 13, 2018
Considerations for Load Balancers When Migrating Applications to the Cloud According to a new forecast from the International Data Corporation (IDC) Worldwide Quarterly Cloud IT Infrastructure Tracker, total spending on IT… Prakash Sinha | July 31, 2018
Application SLA – Knowing is Half the Battle In today’s world, digital transformation has changed how people interact with businesses and conduct their work. They interface with applications… Frank Yue | January 4, 2018
Marrying the Business Need With Technology Drive, Part One: Choosing Your Cloud Several years ago, the monolithic approach to application development fell out of vogue because time to market became the key… Daniel Lakier | November 30, 2017
Are You Migrating Applications to the Cloud? According to a recent report from IDC, by 2020, almost half of IT infrastructure spend will be on cloud IT… Prakash Sinha | August 31, 2017
The ADC Key Master Delegates Application Security Functions One of the responsibilities of the Key Master is to provide access to the sensitive and secure information hidden within… Frank Yue | August 3, 2017
The ADC is the Key Master for All Things SSL/TLS In the movies (and real life) one often needs to go through the Key Master to get to the destination.… Frank Yue | July 25, 2017
Virtualization Requires New Models for Old Technologies Driving a car is like riding a bike, if one refers to the old expression. It is fairly easy to… Frank Yue | July 11, 2017
Route Domains – Half-baked Virtualization Delivers Half-baked Results Imagine browsing your favorite websites on your computer or playing a browser-based game when things start slowing down. You click… Frank Yue | May 24, 2017
You Cannot Do Application Delivery Without Security Security is an ever-evolving concept in theory and application. It is important to deploy and leverage technologies that can adapt… Frank Yue | March 30, 2017
Trends in Software Defined Data Centers I recently met with a regional cloud service provider (CSP) that has adopted provisioning on demand as their IT model.… Prakash Sinha | March 29, 2017
SCADA Part 3: Mission critical, highly vulnerable, almost un-protectable. I’m back with another exciting installment on SCADA security. Today I want to cover authentication and System redundancy. It should… Daniel Lakier | March 23, 2017