"2021 Application Strategy Status" released, F5 continues to build aware, controllable, and on-demand applications

"2021 Application Strategy Status" released, F5 continues to build aware, controllable, and on-demand applications

[51CTO.com original article] In the past year, affected by factors such as the epidemic, enterprises have significantly accelerated the pace of digital transformation. As face-to-face communication is limited, applications and the digital experience they bring have become a symbol of the survival and development capabilities of enterprises. In a year of rapid development of digital transformation, what are the characteristics of the current status of enterprise application strategies? Several key indicators in the "2021 Application Strategy Status" recently released by F5 reveal this trend:

1. Promote continuous modernization of applications and architecture.
2. The acceleration of cloud and SaaS deployment has driven the popularity of multi-cloud approaches and SaaS security.
3. As the containerization trend expands, edge deployments are increasing.
4. The importance of telemetry in building applications that can adapt to change.

Chen Liang, technical director of F5 China's financial business unit and deputy general manager of the security business unit, gave an in-depth interpretation of this.

[[392107]]

Chen Liang, Technical Director of F5 China's Financial Division and Deputy General Manager of the Security Division

Drive continuous modernization of applications and architecture

With the rapid expansion of digital transformation, more technologies are needed to support business development, online business, and process reshaping. The growth of AI-assisted business has tripled. In last year's report, we can see that there are three stages in enterprise digital transformation: the automation of tasks, the expansion of digitalization, and the use of AI technology to assist business growth. The threefold growth shows that many customers have basically completed the first two stages and are entering the third stage. AI intelligent customer service, smart investment advisors, etc. are all using AI services to provide a richer range of business types.
At the same time, 77% of the respondents said that their companies have accelerated the transformation of application modernization. The survey also shows that in the process of building application modernization, content related to customer experience is the priority to be transformed. Because no matter how the application changes, the ultimate goal is to effectively ensure customer experience, which is also in line with the transformation of many companies today from product-centric to customer-centric.

Among the means and methods of supporting and implementing modern applications, customers are more inclined to choose simple and convenient ones, such as using APIs for business output and business calls. For customers, this allows them to output their service capabilities in the form of API interfaces, charge based on the number of API requests and the number of visits, and use it as a form of business output. At the same time, API interfaces can also be used as a way for enterprises to obtain more service capabilities from third parties. Of course, APIs also bring security vulnerabilities. While enjoying the convenience brought by APIs and modern applications, customers also pay more attention to security.

Multi-cloud, SaaS deployment, and accelerated development of edge computing

With the increasing number of modern applications, the complexity of architecture management has also increased. It is impossible for an enterprise to completely reconstruct the original traditional architecture. Instead, it has to operate and maintain the traditional architecture and modern application architecture at the same time to support the business. For customers, management costs, management risks, and security risks are also increasing. Therefore, enterprises will use multiple architectures in the process of accelerating cloudification. Some are based on public cloud deployment, some are based on SaaS, and some are hosted deployment and local deployment. How to ensure that applications can run quickly, safely, and stably with such complex and diverse IT architectures, and how to ensure customer access experience are issues that IT managers attach great importance to.

At the same time, edge computing has received more and more attention with the vigorous development of IoT and 5G, and more corporate customers in the medical, education, automotive, and manufacturing industries are using IoT technology to obtain or provide corresponding services. Therefore, respondents regard secure access service edge (SASE) as a key strategic trend, with 56% of respondents considering it as the primary trend.

The Importance of Telemetry

Today, enterprises have no shortage of data, but they lack insights. The methods of data collection and data analysis restrict customers' ability to extract and gain insights from data. Especially in the process of modernizing applications, calls between applications are becoming more and more frequent, and at the same time, a large amount of data is extracted from the edge, so customers are more concerned about using telemetry technology to improve their insight capabilities. The interviewed companies said that after traditional IT centers have more telemetry technology, they can help data centers transform from traditional operation and maintenance centers and cost centers to business measurement centers and assessment centers, and pay more attention to business development.

Application strategy status guides F5's development direction

This year's report shows that AI technology can assist business development and achieve automation. However, when faced with challenges, customers still hope to change the infrastructure as code. Code the devices of each data source in the data channel, and change the strategy through code and API interface automation. Only in this way can customers use AI to assist business to improve the level of automation. At the same time, when faced with challenges in tools and talents, customers hope to use multi-cloud architecture to reduce dependence on tools in different environments, as well as the gap in automation management caused by the complexity of different manufacturers or different types of products.

These current situations coincide with the general direction of F5's current promotion of perceptual, controllable, and on-demand applications. In F5's overall architecture, from the release and launch of a code to user requests, F5 provides a very rich range of application security and application delivery technologies. Whether the customer is in a traditional center or a virtualized platform, or in a container cloud, public cloud, or even a SaaS service or edge computing environment, F5's application security and application delivery technologies can provide customers with a unified security strategy, delivery level, service quality, and customer access experience.

Every year, the user strategy report will provide some guidance for F5's future development. This year's report advocates the use of APIs, the use of cloud native, the transformation of modern applications, security risks, and multi-cloud and edge computing, which are F5's focus for some time to come. At the same time, this year's overall report is very consistent with F5's current concept of perceived controllable and on-demand applications. F5 hopes to help customers deliver applications faster in the entire data channel through the overall concept, provide more insight, feel and perceive the customer's access experience and application risk threats, perceive the quality of application operation, and provide dynamic adjustment of strategies, ultimately helping customers go faster and more steadily on the road of digital transformation!

[51CTO original article, please indicate the original author and source as 51CTO.com when reprinting on partner sites]

<<:  5G + Internet of Things: Providing development opportunities for the popularization of smart lamp poles

>>:  Scan code payment is going to be eliminated! QR code is going to be eliminated from the stage of history

Blog    

Recommend

China's optical network system spending slowed down in Q3

[[181721]] Heidi Adams, senior research director ...

5G, AI and IoT: the dream team for modern manufacturing

Artificial Intelligence and the Internet of Thing...

Paving the way to a secure and automated multi-cloud with SD-WAN

Enterprises around the world are rapidly transfor...

What is edge computing and why is it important?

Edge computing is changing the way millions of de...

Six ways SD-WAN simplifies network management

For software-defined wide area networks (SD-WAN),...

Omdia’s view: 400G is ready as a carrier service

The latest report from market research firm Omdia...

Gcore (gcorelabs) Russian Khabarovsk VPS simple test

In the last article, I shared the simple test inf...

Explore how Gateway API works in Service Mesh

A few days ago, Gateway API announced that it wou...

Deep understanding of DNS tunnel communication in practical scenarios

Preface Recently, we conducted an in-depth analys...

Do you know how wireless networks developed?

MediaTek recently released its flagship 5G mobile...

What Every Developer Should Know About TCP

Why do you need to place servers geographically c...