Research Library

Powered by

All Research Sponsored By:NGINX

  • Deploying NGINX As An API Gateway

    Whether it’s an innovative startup or large enterprise, application development and delivery have become mission critical processes for organizations of all sizes. To address AppDev challenges, IT teams use load balancers and CDNs to fix issues, but there is a better way. Read on to find out more about it.

  • Taking Kubernetes From Test To Production

    Since its inception, Kubernetes has become one of the most widely used infrastructure management solutions. This growth also brought new concepts around networking and traffic management. Now, IT teams have quicker app development and delivery cycles. Read on to learn more about the importance of traffic during the test to production lifecycle.

  • Microservices and Kubernetes: A Gardening Guide to Software Ecosystems

    The word ecosystem is often used in technology for good reason. Software development requires knowledge of how different elements work together to create an ecosystem. To understand how containerization, microservices, and Kubernetes work together, this guide will walk you through it all, with a gardening ecosystem twist. Read on to learn more.

  • NGINX State Of App And API Delivery Report

    For organizations facing challenges with their application and API delivery projects, the issue may be the solution you’ve deployed. If your current solution does not offer robust security, scalability, and observability features, then you should learn about a solution that optimizes your processing capability and distribution. Read on to see more.

  • High-Performance Web Application Firewall Testing

    In just a few years, data, web, and application security have been forced to evolve as quickly as cybercriminals do. Now, monolithic architectures have been replaced for microservices and APIs running through optimized CI/CD pipelines. But which is the right solution for you? Here, you can compare solutions and find out. Read on to see more.

  • Microservices Up & Running A Step-By-Step Guide To Building A Microservices Architecture

    This O’Reilly e-book provides you and your organization with the most comprehensive guide for building microservices out there. Explore this invaluable e-book to learn about:How to design a microservices operating modelHow to implement the SEED(S) methodMicroservices vs. APIsHow to build your infrastructure pipelineAnd so much more!

  • The Benefits of an API-First Approach to Building Microservices

    Dive into this article to learn the benefits of an API-first approach, including:What exactly is API-first?5 ways an API-first approach boosts valueHow adopting a common API specification can helpAnd more!

  • Shifting Left For Application Security

    IT professionals at all levels make security a priority when it comes to application development. However, traditionally, DevOps and security would clash over security controls which could slow down both app releases and performance. But now there is a modern application security solution that integrates seamlessly. Read on to learn more about it.

  • Why Managing WAFs at Scale Requires Centralized Visibility and Configuration Management

    Most organizations manage anywhere between 200-1,000 apps, and that number is growing yearly. However, as cybercriminals evolve their tactics, securing those apps has become more difficult. To combat this, most organizations rely on a WAF to protect their web apps, but the more you have the harder it is to manage. Read on to see how to change that.

  • Managing Kubernetes Traffic With F5 NGINX

    Kubernetes is designed to simplify management of containerized apps, but it has its own complexities and a steep learning curve. This comprehensive, 4-chapter e-book covers everything you need to know about managing Kubernetes traffic with F5 NGINX’s Ingress Controller and Service Mesh and easing this process.

  • Prevent API Attacks with Essential Tools and Best Practices for API Security

    API sprawl creates a new set of security risks for enterprises. For example, in 2023, T-Mobile reported that an API breach had resulted in the theft of data for 37 million customers. So, how can you thwart today’s wave of API attacks? Browse this blog post for a breakdown of 3 tools necessary and 8 best practices.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other Research Library Copyright © 1998-2023 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.