SlideShare una empresa de Scribd logo
1 de 15
CLOUDY CHALLENGES AHEAD
2,197TOTAL NUMBER OF RESPONDENTS
FINANCIAL
SERVICES
15%
GOVERNMENT/PUBLIC
11%
HEALTHCARE
5%
MANUFACTURING/
CONSTRUCTION
12%
OTHER
15%
TECHNOLOGY
18%
TELECOM/CLOUD
SERVICE PROVIDER
15%
EDUCATION
9%
INDUSTRY
4%
RESPONDENT ROLE
CLOUD
ARCHITECT/DEVOPS
APPLICATION
ROLES
13%
SECURITY
19%
EXECUTIVE
24%40%
INFRASTRUCTURE/
NETWORK
© 2017 F5 Networks Source: The State of Application Delivery, 2017
01 |
Cloud is not an all or nothing proposition.
Organizations resoundingly opt for multiple
cloud environments.
INSIGHT
CLOUD IS “ALL OF THE ABOVE”
39%
Private cloud
38%
Public cloud
37%
SaaS
41%
Private cloud
32%
Public cloud
29%
SaaS
STRATEGIC
IMPACT
INVESTMENT
PLANS
1.8The average number of
cloud models in use
28%
30%
60%
25%
15%
27%
COLO
OFF PREM PRIVATE
ON PREM PRIVATE
PUBLIC IaaS
PUBLIC PaaS
SaaS
MULTIPLEANSWERSALLOWED
Source: The State of Application Delivery, 2017
02 |
Organizations cite consistency of performance
and security with multi-cloud environments
INSIGHT
CONSISTENT CLOUD
25% 35%27%23%
PERFORMANCE MANAGEMENT IDENTITY SECURITY
RESPONDENTS IMPLEMENTING MULTI-CLOUD CITE CHALLENGES WITH CONSISTENT…
Source: The State of Application Delivery, 2017
03 |
Organizations cite a skills gap as challenge for
multi-cloud
INSIGHT
SKILL SHORTAGE
29%cite readily available expertise
as challenge for multi-cloud
55%
use only one kind of cloud
hint: it’s on-premises
may partially explain
04 |
Organizations know what they want in in terms
of security in the cloud
INSIGHT
SECURITY SMARTS
39%
33%
15%
SECURITY
AVAILABILITY
IDENTITY
Source: The State of Application Delivery, 2017
02 | Encrypt data at rest (40%)
01 | Security and audit parity (50%)
04 | VPN connection (35%)
03 | Encrypt data in flight (37%)
11% of respondents
who said encryption of
data in flight is
important had NO
PLANS to implement
SSL Everywhere.
Source: The State of Application Delivery, 2017
YOU CAN DOWNLOAD THE FULL STATE OF
APPLICATION DELIVERY 2017 REPORT AT:
F5.COM/SOAD
State of Application Delivery 2017 - Cloud Insights

Más contenido relacionado

La actualidad más candente

The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...
The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...
The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...Enterprise Management Associates
 
MalCon Future of Security
MalCon Future of SecurityMalCon Future of Security
MalCon Future of SecurityNetskope
 
F5 Application Services Reference Architecture (Audio)
F5 Application Services Reference Architecture (Audio)F5 Application Services Reference Architecture (Audio)
F5 Application Services Reference Architecture (Audio)F5 Networks
 
Forrester Research: Securing the Cloud When Users are Left to Their Own Devices
Forrester Research: Securing the Cloud When Users are Left to Their Own DevicesForrester Research: Securing the Cloud When Users are Left to Their Own Devices
Forrester Research: Securing the Cloud When Users are Left to Their Own DevicesNetskope
 
3 Reasons You Need Proactive Protection Against Malware
3 Reasons You Need Proactive Protection Against Malware3 Reasons You Need Proactive Protection Against Malware
3 Reasons You Need Proactive Protection Against MalwareAkamai Technologies
 
Troubleshooting Webex and Microsoft Teams with ThousandEyes
Troubleshooting Webex and Microsoft Teams with ThousandEyesTroubleshooting Webex and Microsoft Teams with ThousandEyes
Troubleshooting Webex and Microsoft Teams with ThousandEyesThousandEyes
 
TiEcon 2016 Keynote - Security Challenges & Opportunities with Public Cloud A...
TiEcon 2016 Keynote - Security Challenges & Opportunities with Public Cloud A...TiEcon 2016 Keynote - Security Challenges & Opportunities with Public Cloud A...
TiEcon 2016 Keynote - Security Challenges & Opportunities with Public Cloud A...Ravinder Reddy Amanaganti
 
Operationalize all the Network Things
Operationalize all the Network ThingsOperationalize all the Network Things
Operationalize all the Network ThingsF5 Networks
 
RightScale State of the Cloud Report 2013
RightScale State of the Cloud Report 2013RightScale State of the Cloud Report 2013
RightScale State of the Cloud Report 2013arms8586
 
The Razor's Edge: Enabling Cloud While Mitigating the Risk of a Cloud Data Br...
The Razor's Edge: Enabling Cloud While Mitigating the Risk of a Cloud Data Br...The Razor's Edge: Enabling Cloud While Mitigating the Risk of a Cloud Data Br...
The Razor's Edge: Enabling Cloud While Mitigating the Risk of a Cloud Data Br...Netskope
 
Gaining Instant Insight Into Your Critical SaaS Apps With Collective Intellig...
Gaining Instant Insight Into Your Critical SaaS Apps With Collective Intellig...Gaining Instant Insight Into Your Critical SaaS Apps With Collective Intellig...
Gaining Instant Insight Into Your Critical SaaS Apps With Collective Intellig...ThousandEyes
 
Clues for Solving Cloud-Based App Performance
Clues for Solving Cloud-Based App Performance Clues for Solving Cloud-Based App Performance
Clues for Solving Cloud-Based App Performance NETSCOUT
 
WeSecure Data Security Congres: 5 must haves to safe cloud enablement
WeSecure Data Security Congres: 5 must haves to safe cloud enablementWeSecure Data Security Congres: 5 must haves to safe cloud enablement
WeSecure Data Security Congres: 5 must haves to safe cloud enablementWeSecure
 
Build and enforce defense in depth - an algo sec-cisco tetration webinar
Build and enforce defense in depth - an algo sec-cisco tetration webinarBuild and enforce defense in depth - an algo sec-cisco tetration webinar
Build and enforce defense in depth - an algo sec-cisco tetration webinarAlgoSec
 
Integrated SDN/NFV Framework for Transitioning to Application Delivery Model
Integrated SDN/NFV Framework for Transitioning to Application Delivery ModelIntegrated SDN/NFV Framework for Transitioning to Application Delivery Model
Integrated SDN/NFV Framework for Transitioning to Application Delivery ModelF5 Networks
 
Reference Architecture for Data Loss Prevention in the Cloud
Reference Architecture for Data Loss Prevention in the CloudReference Architecture for Data Loss Prevention in the Cloud
Reference Architecture for Data Loss Prevention in the CloudNetskope
 
RightScale Webinar - 2015 State of the Cloud Report
RightScale Webinar - 2015 State of the Cloud Report RightScale Webinar - 2015 State of the Cloud Report
RightScale Webinar - 2015 State of the Cloud Report RightScale
 
2014: The Year of the Data Breach
2014: The Year of the Data Breach2014: The Year of the Data Breach
2014: The Year of the Data BreachSkyhigh Networks
 
The Imperative for Visibility into Cloud Native Web Services Traffic
The Imperative for Visibility into Cloud Native Web Services TrafficThe Imperative for Visibility into Cloud Native Web Services Traffic
The Imperative for Visibility into Cloud Native Web Services TrafficDevOps.com
 
Data Privacy, Security, and Sovereignty in a Cloudy World
Data Privacy, Security, and Sovereignty in a Cloudy WorldData Privacy, Security, and Sovereignty in a Cloudy World
Data Privacy, Security, and Sovereignty in a Cloudy WorldNetskope
 

La actualidad más candente (20)

The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...
The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...
The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...
 
MalCon Future of Security
MalCon Future of SecurityMalCon Future of Security
MalCon Future of Security
 
F5 Application Services Reference Architecture (Audio)
F5 Application Services Reference Architecture (Audio)F5 Application Services Reference Architecture (Audio)
F5 Application Services Reference Architecture (Audio)
 
Forrester Research: Securing the Cloud When Users are Left to Their Own Devices
Forrester Research: Securing the Cloud When Users are Left to Their Own DevicesForrester Research: Securing the Cloud When Users are Left to Their Own Devices
Forrester Research: Securing the Cloud When Users are Left to Their Own Devices
 
3 Reasons You Need Proactive Protection Against Malware
3 Reasons You Need Proactive Protection Against Malware3 Reasons You Need Proactive Protection Against Malware
3 Reasons You Need Proactive Protection Against Malware
 
Troubleshooting Webex and Microsoft Teams with ThousandEyes
Troubleshooting Webex and Microsoft Teams with ThousandEyesTroubleshooting Webex and Microsoft Teams with ThousandEyes
Troubleshooting Webex and Microsoft Teams with ThousandEyes
 
TiEcon 2016 Keynote - Security Challenges & Opportunities with Public Cloud A...
TiEcon 2016 Keynote - Security Challenges & Opportunities with Public Cloud A...TiEcon 2016 Keynote - Security Challenges & Opportunities with Public Cloud A...
TiEcon 2016 Keynote - Security Challenges & Opportunities with Public Cloud A...
 
Operationalize all the Network Things
Operationalize all the Network ThingsOperationalize all the Network Things
Operationalize all the Network Things
 
RightScale State of the Cloud Report 2013
RightScale State of the Cloud Report 2013RightScale State of the Cloud Report 2013
RightScale State of the Cloud Report 2013
 
The Razor's Edge: Enabling Cloud While Mitigating the Risk of a Cloud Data Br...
The Razor's Edge: Enabling Cloud While Mitigating the Risk of a Cloud Data Br...The Razor's Edge: Enabling Cloud While Mitigating the Risk of a Cloud Data Br...
The Razor's Edge: Enabling Cloud While Mitigating the Risk of a Cloud Data Br...
 
Gaining Instant Insight Into Your Critical SaaS Apps With Collective Intellig...
Gaining Instant Insight Into Your Critical SaaS Apps With Collective Intellig...Gaining Instant Insight Into Your Critical SaaS Apps With Collective Intellig...
Gaining Instant Insight Into Your Critical SaaS Apps With Collective Intellig...
 
Clues for Solving Cloud-Based App Performance
Clues for Solving Cloud-Based App Performance Clues for Solving Cloud-Based App Performance
Clues for Solving Cloud-Based App Performance
 
WeSecure Data Security Congres: 5 must haves to safe cloud enablement
WeSecure Data Security Congres: 5 must haves to safe cloud enablementWeSecure Data Security Congres: 5 must haves to safe cloud enablement
WeSecure Data Security Congres: 5 must haves to safe cloud enablement
 
Build and enforce defense in depth - an algo sec-cisco tetration webinar
Build and enforce defense in depth - an algo sec-cisco tetration webinarBuild and enforce defense in depth - an algo sec-cisco tetration webinar
Build and enforce defense in depth - an algo sec-cisco tetration webinar
 
Integrated SDN/NFV Framework for Transitioning to Application Delivery Model
Integrated SDN/NFV Framework for Transitioning to Application Delivery ModelIntegrated SDN/NFV Framework for Transitioning to Application Delivery Model
Integrated SDN/NFV Framework for Transitioning to Application Delivery Model
 
Reference Architecture for Data Loss Prevention in the Cloud
Reference Architecture for Data Loss Prevention in the CloudReference Architecture for Data Loss Prevention in the Cloud
Reference Architecture for Data Loss Prevention in the Cloud
 
RightScale Webinar - 2015 State of the Cloud Report
RightScale Webinar - 2015 State of the Cloud Report RightScale Webinar - 2015 State of the Cloud Report
RightScale Webinar - 2015 State of the Cloud Report
 
2014: The Year of the Data Breach
2014: The Year of the Data Breach2014: The Year of the Data Breach
2014: The Year of the Data Breach
 
The Imperative for Visibility into Cloud Native Web Services Traffic
The Imperative for Visibility into Cloud Native Web Services TrafficThe Imperative for Visibility into Cloud Native Web Services Traffic
The Imperative for Visibility into Cloud Native Web Services Traffic
 
Data Privacy, Security, and Sovereignty in a Cloudy World
Data Privacy, Security, and Sovereignty in a Cloudy WorldData Privacy, Security, and Sovereignty in a Cloudy World
Data Privacy, Security, and Sovereignty in a Cloudy World
 

Similar a State of Application Delivery 2017 - Cloud Insights

Unlocking the Cloud Operating Model: The Provisioning Strategy
Unlocking the Cloud Operating Model: The Provisioning StrategyUnlocking the Cloud Operating Model: The Provisioning Strategy
Unlocking the Cloud Operating Model: The Provisioning StrategyMitchell Pronschinske
 
2019 Enterprise Cloud Index Report
2019 Enterprise Cloud Index Report2019 Enterprise Cloud Index Report
2019 Enterprise Cloud Index ReportAndrew James
 
Industry Insights & Cloud Skeptics - How Enterprises Use The Cloud And What S...
Industry Insights & Cloud Skeptics - How Enterprises Use The Cloud And What S...Industry Insights & Cloud Skeptics - How Enterprises Use The Cloud And What S...
Industry Insights & Cloud Skeptics - How Enterprises Use The Cloud And What S...Alexander Miller
 
How do Organizations Plan to Assure Application Delivery in a Multi-Cloud World?
How do Organizations Plan to Assure Application Delivery in a Multi-Cloud World?How do Organizations Plan to Assure Application Delivery in a Multi-Cloud World?
How do Organizations Plan to Assure Application Delivery in a Multi-Cloud World?Citrix
 
Automate and simplify multi cloud complexity with f5 and hashi corp
Automate and simplify multi cloud complexity with f5 and hashi corpAutomate and simplify multi cloud complexity with f5 and hashi corp
Automate and simplify multi cloud complexity with f5 and hashi corpMitchell Pronschinske
 
Infographic: Bringing Your Cloud Visibility Back Into Focus
Infographic: Bringing Your Cloud Visibility Back Into FocusInfographic: Bringing Your Cloud Visibility Back Into Focus
Infographic: Bringing Your Cloud Visibility Back Into FocusFortinet
 
2018 Cloud Survey Results by Syncsort
2018 Cloud Survey Results by Syncsort2018 Cloud Survey Results by Syncsort
2018 Cloud Survey Results by SyncsortPrecisely
 
Modern App Architecture - Microservices, API Friendly
Modern App Architecture - Microservices, API FriendlyModern App Architecture - Microservices, API Friendly
Modern App Architecture - Microservices, API FriendlyDevOps Indonesia
 
2019 CIO Think Tank: Pathways to Multicloud Transformation
2019 CIO Think Tank: Pathways to Multicloud Transformation2019 CIO Think Tank: Pathways to Multicloud Transformation
2019 CIO Think Tank: Pathways to Multicloud TransformationIBM
 
The Enterprise Adoption of Cloud Technology - Infographic by RapidValue
The Enterprise Adoption of Cloud Technology - Infographic by RapidValueThe Enterprise Adoption of Cloud Technology - Infographic by RapidValue
The Enterprise Adoption of Cloud Technology - Infographic by RapidValueRapidValue
 
Is South Africa behind the enterprise cloud curve?
Is South Africa behind the enterprise cloud curve?Is South Africa behind the enterprise cloud curve?
Is South Africa behind the enterprise cloud curve?Brian Pinnock
 
The Art of CyberSecurity in the Cloud
The Art of CyberSecurity in the CloudThe Art of CyberSecurity in the Cloud
The Art of CyberSecurity in the CloudAmazon Web Services
 
The Modern Day Pressures and Trends Driving Cloud Access Requirements
The Modern Day Pressures and Trends Driving Cloud Access RequirementsThe Modern Day Pressures and Trends Driving Cloud Access Requirements
The Modern Day Pressures and Trends Driving Cloud Access RequirementsAmazon Web Services
 
Technology Megatrends Reshaping IT: What’s Your Migration Path
Technology Megatrends Reshaping IT: What’s Your Migration PathTechnology Megatrends Reshaping IT: What’s Your Migration Path
Technology Megatrends Reshaping IT: What’s Your Migration PathFadi Semaan
 
Australia Conference 2018_Taming the multi-cloud hydra – innovate with confid...
Australia Conference 2018_Taming the multi-cloud hydra – innovate with confid...Australia Conference 2018_Taming the multi-cloud hydra – innovate with confid...
Australia Conference 2018_Taming the multi-cloud hydra – innovate with confid...Martin Thompson
 
Sicurezza IT: una nuova cultura del rischio IT per promuovere la trasformazio...
Sicurezza IT: una nuova cultura del rischio IT per promuovere la trasformazio...Sicurezza IT: una nuova cultura del rischio IT per promuovere la trasformazio...
Sicurezza IT: una nuova cultura del rischio IT per promuovere la trasformazio...IDC Italy
 
DevOps as a competitive advantage
DevOps as a competitive advantageDevOps as a competitive advantage
DevOps as a competitive advantageIdo Green
 
Effecientip DNS security.pdf
Effecientip DNS security.pdfEffecientip DNS security.pdf
Effecientip DNS security.pdfneoalt
 
TCS Global Cloud Study – Continental Europe
TCS Global Cloud Study – Continental EuropeTCS Global Cloud Study – Continental Europe
TCS Global Cloud Study – Continental EuropeTata Consultancy Services
 

Similar a State of Application Delivery 2017 - Cloud Insights (20)

Unlocking the Cloud Operating Model: The Provisioning Strategy
Unlocking the Cloud Operating Model: The Provisioning StrategyUnlocking the Cloud Operating Model: The Provisioning Strategy
Unlocking the Cloud Operating Model: The Provisioning Strategy
 
2019 Enterprise Cloud Index Report
2019 Enterprise Cloud Index Report2019 Enterprise Cloud Index Report
2019 Enterprise Cloud Index Report
 
Industry Insights & Cloud Skeptics - How Enterprises Use The Cloud And What S...
Industry Insights & Cloud Skeptics - How Enterprises Use The Cloud And What S...Industry Insights & Cloud Skeptics - How Enterprises Use The Cloud And What S...
Industry Insights & Cloud Skeptics - How Enterprises Use The Cloud And What S...
 
How do Organizations Plan to Assure Application Delivery in a Multi-Cloud World?
How do Organizations Plan to Assure Application Delivery in a Multi-Cloud World?How do Organizations Plan to Assure Application Delivery in a Multi-Cloud World?
How do Organizations Plan to Assure Application Delivery in a Multi-Cloud World?
 
Automate and simplify multi cloud complexity with f5 and hashi corp
Automate and simplify multi cloud complexity with f5 and hashi corpAutomate and simplify multi cloud complexity with f5 and hashi corp
Automate and simplify multi cloud complexity with f5 and hashi corp
 
Infographic: Bringing Your Cloud Visibility Back Into Focus
Infographic: Bringing Your Cloud Visibility Back Into FocusInfographic: Bringing Your Cloud Visibility Back Into Focus
Infographic: Bringing Your Cloud Visibility Back Into Focus
 
2018 Cloud Survey Results by Syncsort
2018 Cloud Survey Results by Syncsort2018 Cloud Survey Results by Syncsort
2018 Cloud Survey Results by Syncsort
 
Modern App Architecture - Microservices, API Friendly
Modern App Architecture - Microservices, API FriendlyModern App Architecture - Microservices, API Friendly
Modern App Architecture - Microservices, API Friendly
 
2019 CIO Think Tank: Pathways to Multicloud Transformation
2019 CIO Think Tank: Pathways to Multicloud Transformation2019 CIO Think Tank: Pathways to Multicloud Transformation
2019 CIO Think Tank: Pathways to Multicloud Transformation
 
Network Engineering and Operations in a Multi-Cloud World
Network Engineering and Operations in a Multi-Cloud WorldNetwork Engineering and Operations in a Multi-Cloud World
Network Engineering and Operations in a Multi-Cloud World
 
The Enterprise Adoption of Cloud Technology - Infographic by RapidValue
The Enterprise Adoption of Cloud Technology - Infographic by RapidValueThe Enterprise Adoption of Cloud Technology - Infographic by RapidValue
The Enterprise Adoption of Cloud Technology - Infographic by RapidValue
 
Is South Africa behind the enterprise cloud curve?
Is South Africa behind the enterprise cloud curve?Is South Africa behind the enterprise cloud curve?
Is South Africa behind the enterprise cloud curve?
 
The Art of CyberSecurity in the Cloud
The Art of CyberSecurity in the CloudThe Art of CyberSecurity in the Cloud
The Art of CyberSecurity in the Cloud
 
The Modern Day Pressures and Trends Driving Cloud Access Requirements
The Modern Day Pressures and Trends Driving Cloud Access RequirementsThe Modern Day Pressures and Trends Driving Cloud Access Requirements
The Modern Day Pressures and Trends Driving Cloud Access Requirements
 
Technology Megatrends Reshaping IT: What’s Your Migration Path
Technology Megatrends Reshaping IT: What’s Your Migration PathTechnology Megatrends Reshaping IT: What’s Your Migration Path
Technology Megatrends Reshaping IT: What’s Your Migration Path
 
Australia Conference 2018_Taming the multi-cloud hydra – innovate with confid...
Australia Conference 2018_Taming the multi-cloud hydra – innovate with confid...Australia Conference 2018_Taming the multi-cloud hydra – innovate with confid...
Australia Conference 2018_Taming the multi-cloud hydra – innovate with confid...
 
Sicurezza IT: una nuova cultura del rischio IT per promuovere la trasformazio...
Sicurezza IT: una nuova cultura del rischio IT per promuovere la trasformazio...Sicurezza IT: una nuova cultura del rischio IT per promuovere la trasformazio...
Sicurezza IT: una nuova cultura del rischio IT per promuovere la trasformazio...
 
DevOps as a competitive advantage
DevOps as a competitive advantageDevOps as a competitive advantage
DevOps as a competitive advantage
 
Effecientip DNS security.pdf
Effecientip DNS security.pdfEffecientip DNS security.pdf
Effecientip DNS security.pdf
 
TCS Global Cloud Study – Continental Europe
TCS Global Cloud Study – Continental EuropeTCS Global Cloud Study – Continental Europe
TCS Global Cloud Study – Continental Europe
 

Más de Lori MacVittie

So you think you can scale containers
So you think you can scale containersSo you think you can scale containers
So you think you can scale containersLori MacVittie
 
So you think you can scale
So you think you can scaleSo you think you can scale
So you think you can scaleLori MacVittie
 
Beyond POLB (Plain Old Load Balancing)
Beyond POLB (Plain Old Load Balancing) Beyond POLB (Plain Old Load Balancing)
Beyond POLB (Plain Old Load Balancing) Lori MacVittie
 
Pushing the DevOps envelope into the network with microservices
Pushing the DevOps envelope into the network with microservicesPushing the DevOps envelope into the network with microservices
Pushing the DevOps envelope into the network with microservicesLori MacVittie
 
Architectural Patterns for Scaling Microservices and APIs - GlueCon 2015
Architectural Patterns for Scaling Microservices and APIs - GlueCon 2015Architectural Patterns for Scaling Microservices and APIs - GlueCon 2015
Architectural Patterns for Scaling Microservices and APIs - GlueCon 2015Lori MacVittie
 
HTTP/2 Changes Everything
HTTP/2 Changes EverythingHTTP/2 Changes Everything
HTTP/2 Changes EverythingLori MacVittie
 
5 ways to use node.js in the network
5 ways to use node.js in the network5 ways to use node.js in the network
5 ways to use node.js in the networkLori MacVittie
 
What are Software Defined Application Services
What are Software Defined Application ServicesWhat are Software Defined Application Services
What are Software Defined Application ServicesLori MacVittie
 
Operationalize all the network things
Operationalize all the network thingsOperationalize all the network things
Operationalize all the network thingsLori MacVittie
 
Programming proxies to do what we need so we don't have to talk to the networ...
Programming proxies to do what we need so we don't have to talk to the networ...Programming proxies to do what we need so we don't have to talk to the networ...
Programming proxies to do what we need so we don't have to talk to the networ...Lori MacVittie
 
Dynamic Infrastructure
Dynamic InfrastructureDynamic Infrastructure
Dynamic InfrastructureLori MacVittie
 
Nine Ways to Use Network-Side Scripting
Nine Ways to Use Network-Side ScriptingNine Ways to Use Network-Side Scripting
Nine Ways to Use Network-Side ScriptingLori MacVittie
 
Web 2 And Application Delivery Public
Web 2 And Application Delivery PublicWeb 2 And Application Delivery Public
Web 2 And Application Delivery PublicLori MacVittie
 

Más de Lori MacVittie (14)

So you think you can scale containers
So you think you can scale containersSo you think you can scale containers
So you think you can scale containers
 
So you think you can scale
So you think you can scaleSo you think you can scale
So you think you can scale
 
Devops is all greek
Devops is all greekDevops is all greek
Devops is all greek
 
Beyond POLB (Plain Old Load Balancing)
Beyond POLB (Plain Old Load Balancing) Beyond POLB (Plain Old Load Balancing)
Beyond POLB (Plain Old Load Balancing)
 
Pushing the DevOps envelope into the network with microservices
Pushing the DevOps envelope into the network with microservicesPushing the DevOps envelope into the network with microservices
Pushing the DevOps envelope into the network with microservices
 
Architectural Patterns for Scaling Microservices and APIs - GlueCon 2015
Architectural Patterns for Scaling Microservices and APIs - GlueCon 2015Architectural Patterns for Scaling Microservices and APIs - GlueCon 2015
Architectural Patterns for Scaling Microservices and APIs - GlueCon 2015
 
HTTP/2 Changes Everything
HTTP/2 Changes EverythingHTTP/2 Changes Everything
HTTP/2 Changes Everything
 
5 ways to use node.js in the network
5 ways to use node.js in the network5 ways to use node.js in the network
5 ways to use node.js in the network
 
What are Software Defined Application Services
What are Software Defined Application ServicesWhat are Software Defined Application Services
What are Software Defined Application Services
 
Operationalize all the network things
Operationalize all the network thingsOperationalize all the network things
Operationalize all the network things
 
Programming proxies to do what we need so we don't have to talk to the networ...
Programming proxies to do what we need so we don't have to talk to the networ...Programming proxies to do what we need so we don't have to talk to the networ...
Programming proxies to do what we need so we don't have to talk to the networ...
 
Dynamic Infrastructure
Dynamic InfrastructureDynamic Infrastructure
Dynamic Infrastructure
 
Nine Ways to Use Network-Side Scripting
Nine Ways to Use Network-Side ScriptingNine Ways to Use Network-Side Scripting
Nine Ways to Use Network-Side Scripting
 
Web 2 And Application Delivery Public
Web 2 And Application Delivery PublicWeb 2 And Application Delivery Public
Web 2 And Application Delivery Public
 

Último

Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 

Último (20)

Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

State of Application Delivery 2017 - Cloud Insights