SlideShare a Scribd company logo
June 13th News: F5’s DevCentral
Moves to the Cloud
2




Summary of F5 DevCentral Announcement
 •   DevCentral runs F5’s cloud-enabled ADN solution in multiple Bluelock Virtual
     Datacenters hosted in the public cloud

 •   Allows DevCentral to adhere to IT best practices for scale, control, and security.

 •   DevOps Agility Becomes a Reality

 •   Enterprise grade security brings peace of mind

 •   TMOS in the Cloud Affords Great Control, Scale, and Ops




                                                                                          © F5 Networks, Inc.
3




With F5, Bluelock is able to provide a more
advanced set of solutions to our customers
without the need for costly infrastructure or
long term commitments.


                                    Pat O’Day
                      Chief Technology Officer  © F5 Networks, Inc.
4




F5 DevCentral
F5’s Global Technical Community

•   Over 100,000 members worldwide

•   55% of visits originate outside U.S.

•   Over 60,000 Forum Posts All Time
                                                    “F5 Networks has set the gold standard for
•   iRules, iControl, Advanced                      all scripting environments combined with a
                                                    community site with its TCL based iRules
    Design/Config, ISV solutions, and more!         and DevCentral community.” - Zeus
                                                    Kerravala, ZK Research, 2012
                                                                 “F5 has developed a large community of committed
•   Critical platform for our customers and                      users [DevCentral] that fuels the use of iRules to
    partners to build skills and connect with                    solve unique data center application
                                                                 challenges, creating an increasingly loyal and
    peers                                                        engaged user base.” - Gartner – Magic Quadrant for
                                                    “…DevCentral creates2010
                                                                 ADCs, a modest network effect for
    •   Members express high product satisfaction   F5 and it would be difficult for a competitor to
    •   Member NPS scores world class; over 2x      replicate the large and growing library of custom
                                                    configuration and scripting templates available..." -
        higher than non-member customers            By Grady Burkett, CFA – SeekingAlpha.com
                                                                                                            © F5 Networks, Inc.
5




    Challenges Driving Changes
DevCentral Challenges                            What’s Required?

•   More applications, modules, open             •   Faster, more frequent code pushes
    source, and more
                                                 •   Improved understanding of app and
•   More new internal customers                      infrastructure dependencies &
                                                     •   iRules
•   More globally distributed users
                                                     •   Application Flows

•   More security risks (Hacktivist reality)         •   Real vs. Expected Vulns

    •   Social application complexity, vectors
                                                 •   Better performance
    •   Open source framework
    •   Public + Security Vendor bulls-eye       •   Manageable security plan


                                                                                   © F5 Networks, Inc.
6




The Public Cloud Conundrum
• The “Big” Public Clouds
   • Too much “trust and push”
   • SLA and security doubts

• Traditional hosting vendors on path to cloud
   • Patchwork approach not really cloud
   • Cost basis too high to consider

• Enterprise-focused cloud providers
   • Built to be cloud
   • Understand enterprise reservations and needs

                                                    © F5 Networks, Inc.
7




Bluelock
Leadership | Established pure Cloud leader
Partner & Customer | BIG-IP experience
Reseller | F5 Cloud Licensing Program pioneer
Credible Tech | Technical credibility with F5 teams
Partner Reach | VMware leading partner
Secure | Security / standards compliant (SSAE-16, SAS-70 Type 2, PCI-DSS)
Compatible | VMware platform / F5 IT standard
Cost | Lower OpEx than existing environment



                                                                            © F5 Networks, Inc.
8




DevCentral Journey to the Cloud
• Performed a 14-day Bluelock Test Drive

• Vigorously mapped out operational plans
  and processes

• Determined application changes required

• Initiated 30-day build out
   • Design and infrastructure build out
   • Functional and scale/failure testing
   • Operational and process testing
   • Coordinate IT to cloud migration

                                            © F5 Networks, Inc.
9


DevCentral Cloud Architecture




                     We look like an enterprise architect’s mind thinks.
                                                                © F5 Networks, Inc.
10


DevCentral @ Bluelock: Ideal Enterprise Cloud
•   DevOps Agility Becomes a Reality
    •   Faster, more frequent pushes
    •   Reduced complexity + affordable environment consistency
    •   Closer integration across key workgroups for instant responsiveness

•   Enterprise Grade Security Brings Peace of Mind
    •   Great firewall protection, less management hassles with F5
    •   ASM Web app firewall protects app, strengthens dev process
    •   Help from Whitehat Sentinel – prepare to be humbled

•   TMOS in the Cloud Affords Great Control, Scale, and Ops
    •   vDatacenter looks like an enterprise architect thinks
    •   Access to iRules, iControl, iApp – the entire Swiss army knife
    •   Rapid TMOS updates – faster, better, more satisfying; opportunity to test new things
                                                                                               © F5 Networks, Inc.
11




Project Benefits
• For Community
  • Faster, more rapidly improving community experience
  • Insight into how we run in the cloud to help them understand the options

• For Partners
  • Opportunity to collaborate on enterprise cloud efforts
  • Showcase their capabilities for F5 customers

• For DevCentral
  • Improved DevOps to grow our business
  • Enterprise grade security for peace of mind
  • TMOS in the cloud = control and scale
  • Learning how we can help customers embrace the cloud                © F5 Networks, Inc.
F5 DevCentral to the Cloud

More Related Content

What's hot

Top-5 Best Practices for Virtual Desktop Success
Top-5 Best Practices for Virtual Desktop SuccessTop-5 Best Practices for Virtual Desktop Success
Top-5 Best Practices for Virtual Desktop Success
eG Innovations
 
Run Book Automation with PlateSpin Orchestrate
Run Book Automation with PlateSpin OrchestrateRun Book Automation with PlateSpin Orchestrate
Run Book Automation with PlateSpin Orchestrate
Novell
 
Open Stack China Trip Sz0922
Open Stack China Trip Sz0922Open Stack China Trip Sz0922
Open Stack China Trip Sz0922
OpenCity Community
 
VDI Best Practices
VDI Best PracticesVDI Best Practices
VDI Best Practices
eG Innovations
 
Secure Delivery Center, Eclipse Open Source
Secure Delivery Center, Eclipse Open SourceSecure Delivery Center, Eclipse Open Source
Secure Delivery Center, Eclipse Open Source
Genuitec, LLC
 
Desktop virtualization customer presentation
Desktop virtualization customer presentationDesktop virtualization customer presentation
Desktop virtualization customer presentation
Nuno Alves
 
Dev opscon survey summary 2013
Dev opscon survey summary 2013Dev opscon survey summary 2013
Dev opscon survey summary 2013
Alan Shimel
 
Managed services overview
Managed services overviewManaged services overview
Managed services overview
Jim Crocco
 
Magor Sunset Tele Collaboration Introduction 040611
Magor Sunset Tele Collaboration Introduction 040611Magor Sunset Tele Collaboration Introduction 040611
Magor Sunset Tele Collaboration Introduction 040611
jesunset8766
 
VDI Choices - Citrix XenDesktop, XenApp or VDI in a Box?
VDI Choices - Citrix XenDesktop, XenApp or VDI in a Box?VDI Choices - Citrix XenDesktop, XenApp or VDI in a Box?
VDI Choices - Citrix XenDesktop, XenApp or VDI in a Box?
eG Innovations
 
VDI Performance Assessment
VDI Performance AssessmentVDI Performance Assessment
VDI Performance Assessment
eG Innovations
 
VDI Performance Assurance With Monitoring and Testing
VDI Performance Assurance With Monitoring and TestingVDI Performance Assurance With Monitoring and Testing
VDI Performance Assurance With Monitoring and Testing
eG Innovations
 
Codecentric At Ajax World Conference San Jose
Codecentric At Ajax World Conference San JoseCodecentric At Ajax World Conference San Jose
Codecentric At Ajax World Conference San Jose
Fabian Lange
 
BackupExec 2012 Feedback
BackupExec 2012 FeedbackBackupExec 2012 Feedback
BackupExec 2012 FeedbackSymantec
 
Backup Exec 2012 Upgrade Feedback
Backup Exec 2012 Upgrade FeedbackBackup Exec 2012 Upgrade Feedback
Backup Exec 2012 Upgrade Feedback
Sean Regan
 
Jesse Robbins Keynote - Hacking Culture @ Cloud Expo Europe 2013
Jesse Robbins Keynote - Hacking Culture @ Cloud Expo Europe 2013Jesse Robbins Keynote - Hacking Culture @ Cloud Expo Europe 2013
Jesse Robbins Keynote - Hacking Culture @ Cloud Expo Europe 2013Jesse Robbins
 
Archiving and e-Discovery for Novell GroupWise
Archiving and e-Discovery for Novell GroupWiseArchiving and e-Discovery for Novell GroupWise
Archiving and e-Discovery for Novell GroupWise
Novell
 
Microsoft India - Whats New in Windows Server 2008 R2 Presentation
Microsoft India - Whats New in Windows Server 2008 R2 PresentationMicrosoft India - Whats New in Windows Server 2008 R2 Presentation
Microsoft India - Whats New in Windows Server 2008 R2 Presentation
Microsoft Private Cloud
 
Java DevOps at Enterprise Scale
Java DevOps at Enterprise ScaleJava DevOps at Enterprise Scale
Java DevOps at Enterprise Scale
Ryan McGuinness
 
Limewood Event - VMware
Limewood Event - VMware Limewood Event - VMware
Limewood Event - VMware
BlueChipICT
 

What's hot (20)

Top-5 Best Practices for Virtual Desktop Success
Top-5 Best Practices for Virtual Desktop SuccessTop-5 Best Practices for Virtual Desktop Success
Top-5 Best Practices for Virtual Desktop Success
 
Run Book Automation with PlateSpin Orchestrate
Run Book Automation with PlateSpin OrchestrateRun Book Automation with PlateSpin Orchestrate
Run Book Automation with PlateSpin Orchestrate
 
Open Stack China Trip Sz0922
Open Stack China Trip Sz0922Open Stack China Trip Sz0922
Open Stack China Trip Sz0922
 
VDI Best Practices
VDI Best PracticesVDI Best Practices
VDI Best Practices
 
Secure Delivery Center, Eclipse Open Source
Secure Delivery Center, Eclipse Open SourceSecure Delivery Center, Eclipse Open Source
Secure Delivery Center, Eclipse Open Source
 
Desktop virtualization customer presentation
Desktop virtualization customer presentationDesktop virtualization customer presentation
Desktop virtualization customer presentation
 
Dev opscon survey summary 2013
Dev opscon survey summary 2013Dev opscon survey summary 2013
Dev opscon survey summary 2013
 
Managed services overview
Managed services overviewManaged services overview
Managed services overview
 
Magor Sunset Tele Collaboration Introduction 040611
Magor Sunset Tele Collaboration Introduction 040611Magor Sunset Tele Collaboration Introduction 040611
Magor Sunset Tele Collaboration Introduction 040611
 
VDI Choices - Citrix XenDesktop, XenApp or VDI in a Box?
VDI Choices - Citrix XenDesktop, XenApp or VDI in a Box?VDI Choices - Citrix XenDesktop, XenApp or VDI in a Box?
VDI Choices - Citrix XenDesktop, XenApp or VDI in a Box?
 
VDI Performance Assessment
VDI Performance AssessmentVDI Performance Assessment
VDI Performance Assessment
 
VDI Performance Assurance With Monitoring and Testing
VDI Performance Assurance With Monitoring and TestingVDI Performance Assurance With Monitoring and Testing
VDI Performance Assurance With Monitoring and Testing
 
Codecentric At Ajax World Conference San Jose
Codecentric At Ajax World Conference San JoseCodecentric At Ajax World Conference San Jose
Codecentric At Ajax World Conference San Jose
 
BackupExec 2012 Feedback
BackupExec 2012 FeedbackBackupExec 2012 Feedback
BackupExec 2012 Feedback
 
Backup Exec 2012 Upgrade Feedback
Backup Exec 2012 Upgrade FeedbackBackup Exec 2012 Upgrade Feedback
Backup Exec 2012 Upgrade Feedback
 
Jesse Robbins Keynote - Hacking Culture @ Cloud Expo Europe 2013
Jesse Robbins Keynote - Hacking Culture @ Cloud Expo Europe 2013Jesse Robbins Keynote - Hacking Culture @ Cloud Expo Europe 2013
Jesse Robbins Keynote - Hacking Culture @ Cloud Expo Europe 2013
 
Archiving and e-Discovery for Novell GroupWise
Archiving and e-Discovery for Novell GroupWiseArchiving and e-Discovery for Novell GroupWise
Archiving and e-Discovery for Novell GroupWise
 
Microsoft India - Whats New in Windows Server 2008 R2 Presentation
Microsoft India - Whats New in Windows Server 2008 R2 PresentationMicrosoft India - Whats New in Windows Server 2008 R2 Presentation
Microsoft India - Whats New in Windows Server 2008 R2 Presentation
 
Java DevOps at Enterprise Scale
Java DevOps at Enterprise ScaleJava DevOps at Enterprise Scale
Java DevOps at Enterprise Scale
 
Limewood Event - VMware
Limewood Event - VMware Limewood Event - VMware
Limewood Event - VMware
 

Viewers also liked

F5 Networks - парадная дверь в облака
F5 Networks - парадная дверь в облакаF5 Networks - парадная дверь в облака
F5 Networks - парадная дверь в облака
BAKOTECH
 
Digital certificate & signature
Digital certificate & signatureDigital certificate & signature
Digital certificate & signatureNetri Chowdhary
 
Why HATEOAS
Why HATEOASWhy HATEOAS
Why HATEOAS
Lee Wayne
 
Infrastructure Saturday 2011 - Understanding PKI and Certificate Services
Infrastructure Saturday 2011 - Understanding PKI and Certificate ServicesInfrastructure Saturday 2011 - Understanding PKI and Certificate Services
Infrastructure Saturday 2011 - Understanding PKI and Certificate Services
kieranjacobsen
 
Presentation network design and security for your v mware view deployment w...
Presentation   network design and security for your v mware view deployment w...Presentation   network design and security for your v mware view deployment w...
Presentation network design and security for your v mware view deployment w...solarisyourep
 
F5 Networks: Introduction to Silverline WAF (web application firewall)
F5 Networks: Introduction to Silverline WAF (web application firewall)F5 Networks: Introduction to Silverline WAF (web application firewall)
F5 Networks: Introduction to Silverline WAF (web application firewall)
F5 Networks
 
F5 BIG-IP: Secure Application and Data Security Services
 F5 BIG-IP: Secure Application and Data Security Services F5 BIG-IP: Secure Application and Data Security Services
F5 BIG-IP: Secure Application and Data Security Services
Amazon Web Services
 
F5 TLS & SSL Practices
F5 TLS & SSL PracticesF5 TLS & SSL Practices
F5 TLS & SSL Practices
Brian A. McHenry
 
Using Docker container technology with F5 Networks products and services
Using Docker container technology with F5 Networks products and servicesUsing Docker container technology with F5 Networks products and services
Using Docker container technology with F5 Networks products and services
F5 Networks
 
Following and writing instructions
Following and writing instructionsFollowing and writing instructions
Following and writing instructions
Javier Cárdenas
 
Car insurance chicago
Car insurance chicagoCar insurance chicago
Car insurance chicago
atlantic39
 

Viewers also liked (11)

F5 Networks - парадная дверь в облака
F5 Networks - парадная дверь в облакаF5 Networks - парадная дверь в облака
F5 Networks - парадная дверь в облака
 
Digital certificate & signature
Digital certificate & signatureDigital certificate & signature
Digital certificate & signature
 
Why HATEOAS
Why HATEOASWhy HATEOAS
Why HATEOAS
 
Infrastructure Saturday 2011 - Understanding PKI and Certificate Services
Infrastructure Saturday 2011 - Understanding PKI and Certificate ServicesInfrastructure Saturday 2011 - Understanding PKI and Certificate Services
Infrastructure Saturday 2011 - Understanding PKI and Certificate Services
 
Presentation network design and security for your v mware view deployment w...
Presentation   network design and security for your v mware view deployment w...Presentation   network design and security for your v mware view deployment w...
Presentation network design and security for your v mware view deployment w...
 
F5 Networks: Introduction to Silverline WAF (web application firewall)
F5 Networks: Introduction to Silverline WAF (web application firewall)F5 Networks: Introduction to Silverline WAF (web application firewall)
F5 Networks: Introduction to Silverline WAF (web application firewall)
 
F5 BIG-IP: Secure Application and Data Security Services
 F5 BIG-IP: Secure Application and Data Security Services F5 BIG-IP: Secure Application and Data Security Services
F5 BIG-IP: Secure Application and Data Security Services
 
F5 TLS & SSL Practices
F5 TLS & SSL PracticesF5 TLS & SSL Practices
F5 TLS & SSL Practices
 
Using Docker container technology with F5 Networks products and services
Using Docker container technology with F5 Networks products and servicesUsing Docker container technology with F5 Networks products and services
Using Docker container technology with F5 Networks products and services
 
Following and writing instructions
Following and writing instructionsFollowing and writing instructions
Following and writing instructions
 
Car insurance chicago
Car insurance chicagoCar insurance chicago
Car insurance chicago
 

Similar to F5 DevCentral to the Cloud

Top 10 Reasons Why F5 Makes Sense
Top 10 Reasons Why F5 Makes SenseTop 10 Reasons Why F5 Makes Sense
Top 10 Reasons Why F5 Makes Sense
F5 Networks
 
IT without Boundaries: A Blueprint for Success
IT without Boundaries: A Blueprint for SuccessIT without Boundaries: A Blueprint for Success
IT without Boundaries: A Blueprint for SuccessDell Cloud Services
 
Open stack powered_cloud_solution_interop
Open stack powered_cloud_solution_interopOpen stack powered_cloud_solution_interop
Open stack powered_cloud_solution_interop
Kamesh Pemmaraju
 
Does Hybrid Cloud Work? 5 Success Stories with VMware Hybrid Clouds
Does Hybrid Cloud Work? 5 Success Stories with VMware Hybrid CloudsDoes Hybrid Cloud Work? 5 Success Stories with VMware Hybrid Clouds
Does Hybrid Cloud Work? 5 Success Stories with VMware Hybrid Clouds
Bluelock
 
Developing Your Cloud Strategy
Developing Your Cloud StrategyDeveloping Your Cloud Strategy
Developing Your Cloud Strategy
Internap
 
Application Darwinism - Why Most Enterprise Apps Will Evolve to the Cloud
Application Darwinism - Why Most Enterprise Apps Will Evolve to the CloudApplication Darwinism - Why Most Enterprise Apps Will Evolve to the Cloud
Application Darwinism - Why Most Enterprise Apps Will Evolve to the Cloud
Skytap Cloud
 
Got Shadow IT? How to Win-Win with a Private Cloud.
Got Shadow IT? How to Win-Win with a Private Cloud.Got Shadow IT? How to Win-Win with a Private Cloud.
Got Shadow IT? How to Win-Win with a Private Cloud.
Platform9
 
Jumping from Continuous Integration to Continuous Delivery with Jenkins Enter...
Jumping from Continuous Integration to Continuous Delivery with Jenkins Enter...Jumping from Continuous Integration to Continuous Delivery with Jenkins Enter...
Jumping from Continuous Integration to Continuous Delivery with Jenkins Enter...
CloudBees
 
Application Darwinism: Why Most Enterprise Apps Will Move to the Cloud (SVC20...
Application Darwinism: Why Most Enterprise Apps Will Move to the Cloud (SVC20...Application Darwinism: Why Most Enterprise Apps Will Move to the Cloud (SVC20...
Application Darwinism: Why Most Enterprise Apps Will Move to the Cloud (SVC20...
Amazon Web Services
 
Infrastructure Consolidation and Virtualization
Infrastructure Consolidation and VirtualizationInfrastructure Consolidation and Virtualization
Infrastructure Consolidation and Virtualization
Bob Rhubart
 
Enabling Innovation & Integration to the Cloud
Enabling Innovation & Integration to the CloudEnabling Innovation & Integration to the Cloud
Enabling Innovation & Integration to the Cloud
InnoTech
 
Notes from the Field - Cloud Solutions with VMware vCloud Director
Notes from the Field - Cloud Solutions with VMware vCloud DirectorNotes from the Field - Cloud Solutions with VMware vCloud Director
Notes from the Field - Cloud Solutions with VMware vCloud Director
James Charter
 
Implementing DevOps – How it came to the fore, its key elements and example d...
Implementing DevOps – How it came to the fore, its key elements and example d...Implementing DevOps – How it came to the fore, its key elements and example d...
Implementing DevOps – How it came to the fore, its key elements and example d...
Barton George
 
Dell - The Incredible Shrinking Datacenter
Dell - The Incredible Shrinking DatacenterDell - The Incredible Shrinking Datacenter
Dell - The Incredible Shrinking Datacenter
NEXTtour
 
Eo navigating the cloud
Eo navigating the cloudEo navigating the cloud
Eo navigating the cloudeophiladelphia
 
Eo navigating the cloud v8
Eo navigating the cloud v8Eo navigating the cloud v8
Eo navigating the cloud v8
Nerve2012
 
Jelastic Hybrid Cloud on Google Cloud Platform
Jelastic Hybrid Cloud on Google Cloud Platform Jelastic Hybrid Cloud on Google Cloud Platform
Jelastic Hybrid Cloud on Google Cloud Platform
Ruslan Synytsky
 
Sphere 3D presentation for Credit Suisse technology conference 2014
Sphere 3D presentation for Credit Suisse technology conference 2014Sphere 3D presentation for Credit Suisse technology conference 2014
Sphere 3D presentation for Credit Suisse technology conference 2014
Peter Bookman
 
So You Need To Build A Private Cloud. What Now? Best Practices For Building Y...
So You Need To Build A Private Cloud. What Now? Best Practices For Building Y...So You Need To Build A Private Cloud. What Now? Best Practices For Building Y...
So You Need To Build A Private Cloud. What Now? Best Practices For Building Y...
Dell World
 
Cloud Foundry May 1 2014
Cloud Foundry May 1 2014Cloud Foundry May 1 2014
Cloud Foundry May 1 2014
Christopher Ferris
 

Similar to F5 DevCentral to the Cloud (20)

Top 10 Reasons Why F5 Makes Sense
Top 10 Reasons Why F5 Makes SenseTop 10 Reasons Why F5 Makes Sense
Top 10 Reasons Why F5 Makes Sense
 
IT without Boundaries: A Blueprint for Success
IT without Boundaries: A Blueprint for SuccessIT without Boundaries: A Blueprint for Success
IT without Boundaries: A Blueprint for Success
 
Open stack powered_cloud_solution_interop
Open stack powered_cloud_solution_interopOpen stack powered_cloud_solution_interop
Open stack powered_cloud_solution_interop
 
Does Hybrid Cloud Work? 5 Success Stories with VMware Hybrid Clouds
Does Hybrid Cloud Work? 5 Success Stories with VMware Hybrid CloudsDoes Hybrid Cloud Work? 5 Success Stories with VMware Hybrid Clouds
Does Hybrid Cloud Work? 5 Success Stories with VMware Hybrid Clouds
 
Developing Your Cloud Strategy
Developing Your Cloud StrategyDeveloping Your Cloud Strategy
Developing Your Cloud Strategy
 
Application Darwinism - Why Most Enterprise Apps Will Evolve to the Cloud
Application Darwinism - Why Most Enterprise Apps Will Evolve to the CloudApplication Darwinism - Why Most Enterprise Apps Will Evolve to the Cloud
Application Darwinism - Why Most Enterprise Apps Will Evolve to the Cloud
 
Got Shadow IT? How to Win-Win with a Private Cloud.
Got Shadow IT? How to Win-Win with a Private Cloud.Got Shadow IT? How to Win-Win with a Private Cloud.
Got Shadow IT? How to Win-Win with a Private Cloud.
 
Jumping from Continuous Integration to Continuous Delivery with Jenkins Enter...
Jumping from Continuous Integration to Continuous Delivery with Jenkins Enter...Jumping from Continuous Integration to Continuous Delivery with Jenkins Enter...
Jumping from Continuous Integration to Continuous Delivery with Jenkins Enter...
 
Application Darwinism: Why Most Enterprise Apps Will Move to the Cloud (SVC20...
Application Darwinism: Why Most Enterprise Apps Will Move to the Cloud (SVC20...Application Darwinism: Why Most Enterprise Apps Will Move to the Cloud (SVC20...
Application Darwinism: Why Most Enterprise Apps Will Move to the Cloud (SVC20...
 
Infrastructure Consolidation and Virtualization
Infrastructure Consolidation and VirtualizationInfrastructure Consolidation and Virtualization
Infrastructure Consolidation and Virtualization
 
Enabling Innovation & Integration to the Cloud
Enabling Innovation & Integration to the CloudEnabling Innovation & Integration to the Cloud
Enabling Innovation & Integration to the Cloud
 
Notes from the Field - Cloud Solutions with VMware vCloud Director
Notes from the Field - Cloud Solutions with VMware vCloud DirectorNotes from the Field - Cloud Solutions with VMware vCloud Director
Notes from the Field - Cloud Solutions with VMware vCloud Director
 
Implementing DevOps – How it came to the fore, its key elements and example d...
Implementing DevOps – How it came to the fore, its key elements and example d...Implementing DevOps – How it came to the fore, its key elements and example d...
Implementing DevOps – How it came to the fore, its key elements and example d...
 
Dell - The Incredible Shrinking Datacenter
Dell - The Incredible Shrinking DatacenterDell - The Incredible Shrinking Datacenter
Dell - The Incredible Shrinking Datacenter
 
Eo navigating the cloud
Eo navigating the cloudEo navigating the cloud
Eo navigating the cloud
 
Eo navigating the cloud v8
Eo navigating the cloud v8Eo navigating the cloud v8
Eo navigating the cloud v8
 
Jelastic Hybrid Cloud on Google Cloud Platform
Jelastic Hybrid Cloud on Google Cloud Platform Jelastic Hybrid Cloud on Google Cloud Platform
Jelastic Hybrid Cloud on Google Cloud Platform
 
Sphere 3D presentation for Credit Suisse technology conference 2014
Sphere 3D presentation for Credit Suisse technology conference 2014Sphere 3D presentation for Credit Suisse technology conference 2014
Sphere 3D presentation for Credit Suisse technology conference 2014
 
So You Need To Build A Private Cloud. What Now? Best Practices For Building Y...
So You Need To Build A Private Cloud. What Now? Best Practices For Building Y...So You Need To Build A Private Cloud. What Now? Best Practices For Building Y...
So You Need To Build A Private Cloud. What Now? Best Practices For Building Y...
 
Cloud Foundry May 1 2014
Cloud Foundry May 1 2014Cloud Foundry May 1 2014
Cloud Foundry May 1 2014
 

More from F5 Networks

F5 Networks Quick Poll Research: HTTP/2 Survey Results
F5 Networks Quick Poll Research: HTTP/2Survey ResultsF5 Networks Quick Poll Research: HTTP/2Survey Results
F5 Networks Quick Poll Research: HTTP/2 Survey Results
F5 Networks
 
Integrated SDN/NFV Framework for Transitioning to Application Delivery Model
Integrated SDN/NFV Framework for Transitioning to Application Delivery ModelIntegrated SDN/NFV Framework for Transitioning to Application Delivery Model
Integrated SDN/NFV Framework for Transitioning to Application Delivery Model
F5 Networks
 
F5 networks the_expectation_of_ssl_everywhere
F5 networks the_expectation_of_ssl_everywhereF5 networks the_expectation_of_ssl_everywhere
F5 networks the_expectation_of_ssl_everywhere
F5 Networks
 
Intrinsic Security—The Key to Effective Hybrid DDoS Protection
Intrinsic Security—The Key to Effective Hybrid DDoS ProtectionIntrinsic Security—The Key to Effective Hybrid DDoS Protection
Intrinsic Security—The Key to Effective Hybrid DDoS Protection
F5 Networks
 
Ensure Application Availability Between Hybrid Data Centers
Ensure Application Availability Between Hybrid Data CentersEnsure Application Availability Between Hybrid Data Centers
Ensure Application Availability Between Hybrid Data Centers
F5 Networks
 
F5 Networks: The Internet of Things - Ready Infrastructure
F5 Networks: The Internet of Things - Ready InfrastructureF5 Networks: The Internet of Things - Ready Infrastructure
F5 Networks: The Internet of Things - Ready Infrastructure
F5 Networks
 
F5 Networks Threat Analysis: Madness
F5 Networks Threat Analysis: MadnessF5 Networks Threat Analysis: Madness
F5 Networks Threat Analysis: Madness
F5 Networks
 
Company Profile: F5 Networks’ Traffix Signaling Delivery Controller and BIG-I...
Company Profile: F5 Networks’ Traffix Signaling Delivery Controller and BIG-I...Company Profile: F5 Networks’ Traffix Signaling Delivery Controller and BIG-I...
Company Profile: F5 Networks’ Traffix Signaling Delivery Controller and BIG-I...
F5 Networks
 
Scaling Mobile Network Security for LTE: A Multi-Layer Approach
Scaling Mobile Network Security for LTE: A Multi-Layer ApproachScaling Mobile Network Security for LTE: A Multi-Layer Approach
Scaling Mobile Network Security for LTE: A Multi-Layer Approach
F5 Networks
 
F5 Certified! Program Overview and Update
F5 Certified! Program Overview and UpdateF5 Certified! Program Overview and Update
F5 Certified! Program Overview and Update
F5 Networks
 
Key Findings from the State of Application Delivery 2015
Key Findings from the State of Application Delivery 2015Key Findings from the State of Application Delivery 2015
Key Findings from the State of Application Delivery 2015
F5 Networks
 
F5 Application Services Reference Architecture (Audio)
F5 Application Services Reference Architecture (Audio)F5 Application Services Reference Architecture (Audio)
F5 Application Services Reference Architecture (Audio)
F5 Networks
 
F5 Application Services Reference Architecture
F5 Application Services Reference ArchitectureF5 Application Services Reference Architecture
F5 Application Services Reference Architecture
F5 Networks
 
The F5 Networks Application Services Reference Architecture (White Paper)
The F5 Networks Application Services Reference Architecture (White Paper)The F5 Networks Application Services Reference Architecture (White Paper)
The F5 Networks Application Services Reference Architecture (White Paper)
F5 Networks
 
An Evolving Threat Needs an Evolved Defense (F5 Networks Infographic)
An Evolving Threat Needs an Evolved Defense (F5 Networks Infographic)An Evolving Threat Needs an Evolved Defense (F5 Networks Infographic)
An Evolving Threat Needs an Evolved Defense (F5 Networks Infographic)
F5 Networks
 
The F5 DDoS Protection Reference Architecture (Technical White Paper)
The F5 DDoS Protection Reference Architecture (Technical White Paper)The F5 DDoS Protection Reference Architecture (Technical White Paper)
The F5 DDoS Protection Reference Architecture (Technical White Paper)
F5 Networks
 
F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...
F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...
F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...
F5 Networks
 
F5 Networks Intelligent DNS Scale
F5 Networks Intelligent DNS ScaleF5 Networks Intelligent DNS Scale
F5 Networks Intelligent DNS Scale
F5 Networks
 
DNS: Challenges in a Changing Landscape (Infographic)
DNS: Challenges in a Changing Landscape (Infographic)DNS: Challenges in a Changing Landscape (Infographic)
DNS: Challenges in a Changing Landscape (Infographic)
F5 Networks
 
Operationalize all the Network Things
Operationalize all the Network ThingsOperationalize all the Network Things
Operationalize all the Network Things
F5 Networks
 

More from F5 Networks (20)

F5 Networks Quick Poll Research: HTTP/2 Survey Results
F5 Networks Quick Poll Research: HTTP/2Survey ResultsF5 Networks Quick Poll Research: HTTP/2Survey Results
F5 Networks Quick Poll Research: HTTP/2 Survey Results
 
Integrated SDN/NFV Framework for Transitioning to Application Delivery Model
Integrated SDN/NFV Framework for Transitioning to Application Delivery ModelIntegrated SDN/NFV Framework for Transitioning to Application Delivery Model
Integrated SDN/NFV Framework for Transitioning to Application Delivery Model
 
F5 networks the_expectation_of_ssl_everywhere
F5 networks the_expectation_of_ssl_everywhereF5 networks the_expectation_of_ssl_everywhere
F5 networks the_expectation_of_ssl_everywhere
 
Intrinsic Security—The Key to Effective Hybrid DDoS Protection
Intrinsic Security—The Key to Effective Hybrid DDoS ProtectionIntrinsic Security—The Key to Effective Hybrid DDoS Protection
Intrinsic Security—The Key to Effective Hybrid DDoS Protection
 
Ensure Application Availability Between Hybrid Data Centers
Ensure Application Availability Between Hybrid Data CentersEnsure Application Availability Between Hybrid Data Centers
Ensure Application Availability Between Hybrid Data Centers
 
F5 Networks: The Internet of Things - Ready Infrastructure
F5 Networks: The Internet of Things - Ready InfrastructureF5 Networks: The Internet of Things - Ready Infrastructure
F5 Networks: The Internet of Things - Ready Infrastructure
 
F5 Networks Threat Analysis: Madness
F5 Networks Threat Analysis: MadnessF5 Networks Threat Analysis: Madness
F5 Networks Threat Analysis: Madness
 
Company Profile: F5 Networks’ Traffix Signaling Delivery Controller and BIG-I...
Company Profile: F5 Networks’ Traffix Signaling Delivery Controller and BIG-I...Company Profile: F5 Networks’ Traffix Signaling Delivery Controller and BIG-I...
Company Profile: F5 Networks’ Traffix Signaling Delivery Controller and BIG-I...
 
Scaling Mobile Network Security for LTE: A Multi-Layer Approach
Scaling Mobile Network Security for LTE: A Multi-Layer ApproachScaling Mobile Network Security for LTE: A Multi-Layer Approach
Scaling Mobile Network Security for LTE: A Multi-Layer Approach
 
F5 Certified! Program Overview and Update
F5 Certified! Program Overview and UpdateF5 Certified! Program Overview and Update
F5 Certified! Program Overview and Update
 
Key Findings from the State of Application Delivery 2015
Key Findings from the State of Application Delivery 2015Key Findings from the State of Application Delivery 2015
Key Findings from the State of Application Delivery 2015
 
F5 Application Services Reference Architecture (Audio)
F5 Application Services Reference Architecture (Audio)F5 Application Services Reference Architecture (Audio)
F5 Application Services Reference Architecture (Audio)
 
F5 Application Services Reference Architecture
F5 Application Services Reference ArchitectureF5 Application Services Reference Architecture
F5 Application Services Reference Architecture
 
The F5 Networks Application Services Reference Architecture (White Paper)
The F5 Networks Application Services Reference Architecture (White Paper)The F5 Networks Application Services Reference Architecture (White Paper)
The F5 Networks Application Services Reference Architecture (White Paper)
 
An Evolving Threat Needs an Evolved Defense (F5 Networks Infographic)
An Evolving Threat Needs an Evolved Defense (F5 Networks Infographic)An Evolving Threat Needs an Evolved Defense (F5 Networks Infographic)
An Evolving Threat Needs an Evolved Defense (F5 Networks Infographic)
 
The F5 DDoS Protection Reference Architecture (Technical White Paper)
The F5 DDoS Protection Reference Architecture (Technical White Paper)The F5 DDoS Protection Reference Architecture (Technical White Paper)
The F5 DDoS Protection Reference Architecture (Technical White Paper)
 
F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...
F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...
F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...
 
F5 Networks Intelligent DNS Scale
F5 Networks Intelligent DNS ScaleF5 Networks Intelligent DNS Scale
F5 Networks Intelligent DNS Scale
 
DNS: Challenges in a Changing Landscape (Infographic)
DNS: Challenges in a Changing Landscape (Infographic)DNS: Challenges in a Changing Landscape (Infographic)
DNS: Challenges in a Changing Landscape (Infographic)
 
Operationalize all the Network Things
Operationalize all the Network ThingsOperationalize all the Network Things
Operationalize all the Network Things
 

Recently uploaded

State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 

Recently uploaded (20)

State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 

F5 DevCentral to the Cloud

  • 1. June 13th News: F5’s DevCentral Moves to the Cloud
  • 2. 2 Summary of F5 DevCentral Announcement • DevCentral runs F5’s cloud-enabled ADN solution in multiple Bluelock Virtual Datacenters hosted in the public cloud • Allows DevCentral to adhere to IT best practices for scale, control, and security. • DevOps Agility Becomes a Reality • Enterprise grade security brings peace of mind • TMOS in the Cloud Affords Great Control, Scale, and Ops © F5 Networks, Inc.
  • 3. 3 With F5, Bluelock is able to provide a more advanced set of solutions to our customers without the need for costly infrastructure or long term commitments. Pat O’Day Chief Technology Officer © F5 Networks, Inc.
  • 4. 4 F5 DevCentral F5’s Global Technical Community • Over 100,000 members worldwide • 55% of visits originate outside U.S. • Over 60,000 Forum Posts All Time “F5 Networks has set the gold standard for • iRules, iControl, Advanced all scripting environments combined with a community site with its TCL based iRules Design/Config, ISV solutions, and more! and DevCentral community.” - Zeus Kerravala, ZK Research, 2012 “F5 has developed a large community of committed • Critical platform for our customers and users [DevCentral] that fuels the use of iRules to partners to build skills and connect with solve unique data center application challenges, creating an increasingly loyal and peers engaged user base.” - Gartner – Magic Quadrant for “…DevCentral creates2010 ADCs, a modest network effect for • Members express high product satisfaction F5 and it would be difficult for a competitor to • Member NPS scores world class; over 2x replicate the large and growing library of custom configuration and scripting templates available..." - higher than non-member customers By Grady Burkett, CFA – SeekingAlpha.com © F5 Networks, Inc.
  • 5. 5 Challenges Driving Changes DevCentral Challenges What’s Required? • More applications, modules, open • Faster, more frequent code pushes source, and more • Improved understanding of app and • More new internal customers infrastructure dependencies & • iRules • More globally distributed users • Application Flows • More security risks (Hacktivist reality) • Real vs. Expected Vulns • Social application complexity, vectors • Better performance • Open source framework • Public + Security Vendor bulls-eye • Manageable security plan © F5 Networks, Inc.
  • 6. 6 The Public Cloud Conundrum • The “Big” Public Clouds • Too much “trust and push” • SLA and security doubts • Traditional hosting vendors on path to cloud • Patchwork approach not really cloud • Cost basis too high to consider • Enterprise-focused cloud providers • Built to be cloud • Understand enterprise reservations and needs © F5 Networks, Inc.
  • 7. 7 Bluelock Leadership | Established pure Cloud leader Partner & Customer | BIG-IP experience Reseller | F5 Cloud Licensing Program pioneer Credible Tech | Technical credibility with F5 teams Partner Reach | VMware leading partner Secure | Security / standards compliant (SSAE-16, SAS-70 Type 2, PCI-DSS) Compatible | VMware platform / F5 IT standard Cost | Lower OpEx than existing environment © F5 Networks, Inc.
  • 8. 8 DevCentral Journey to the Cloud • Performed a 14-day Bluelock Test Drive • Vigorously mapped out operational plans and processes • Determined application changes required • Initiated 30-day build out • Design and infrastructure build out • Functional and scale/failure testing • Operational and process testing • Coordinate IT to cloud migration © F5 Networks, Inc.
  • 9. 9 DevCentral Cloud Architecture We look like an enterprise architect’s mind thinks. © F5 Networks, Inc.
  • 10. 10 DevCentral @ Bluelock: Ideal Enterprise Cloud • DevOps Agility Becomes a Reality • Faster, more frequent pushes • Reduced complexity + affordable environment consistency • Closer integration across key workgroups for instant responsiveness • Enterprise Grade Security Brings Peace of Mind • Great firewall protection, less management hassles with F5 • ASM Web app firewall protects app, strengthens dev process • Help from Whitehat Sentinel – prepare to be humbled • TMOS in the Cloud Affords Great Control, Scale, and Ops • vDatacenter looks like an enterprise architect thinks • Access to iRules, iControl, iApp – the entire Swiss army knife • Rapid TMOS updates – faster, better, more satisfying; opportunity to test new things © F5 Networks, Inc.
  • 11. 11 Project Benefits • For Community • Faster, more rapidly improving community experience • Insight into how we run in the cloud to help them understand the options • For Partners • Opportunity to collaborate on enterprise cloud efforts • Showcase their capabilities for F5 customers • For DevCentral • Improved DevOps to grow our business • Enterprise grade security for peace of mind • TMOS in the cloud = control and scale • Learning how we can help customers embrace the cloud © F5 Networks, Inc.