Skip to content
WWT LogoWWT Logo Text
The ATC
Search...
Ctrl K
Top page results
See all search results
Featured Solutions
What's trending
Help Center
Log In
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalSustainabilityImplementation ServicesLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Featured today
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Featured learning path
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
WWT in the news
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
Partner spotlight
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalSustainabilityImplementation ServicesLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
The ATC
Overview
Explore
Services
Experts

Select a tab

What's popular

How to Clone Objects in C# .NET Core

There are numerous ways to clone an object in C# .NET Core. This article explores some of the approaches you can use to make a deep copy of an object and the pros and cons of each method.
Article
•May 25, 2023

How and Why to Create Safety Within Your Teams

Every person in every organization creates a psychological zone around them. This zone influences how those around them think and feel. Those that can increase feelings of safety can also significantly strengthen their team's performance.
Article
•Nov 9, 2020

Sink or Soar: Turn AI into ROI with a CX Full-Stack Approach

WWT's approach to full-stack excellence provides CX leaders with a framework for unlocking efficiency, growth and fresh digital experiences for their customers.
Article
•Aug 12, 2024

Democratizing Data to Reach New Levels of Productivity with Freeport-McMoRan

Global mining firm Freeport-McMoRan partnered with WWT to better harness big data and unlock hidden productivity.
Case Study

DevOps Workshop

Our interactive workshop teaches customers about DevOps principles, practices and tools that can be leveraged to successfully deliver applications and services with a focus on throughput, stability and availability.
Workshop

What's new

Codeium for the Casual Developer

After a year with Codeium on my personal projects, I've seen the good, the bad and the unexpected. As a former pro software engineer who's no longer in the thick of it day-to-day, I'll share what works, what doesn't, and how AI coding assistance has helped me do more with less.
Blog
•Mar 28, 2025

Testing Evolved: AI and Humans, Better Together

Artificial Intelligence (AI) is transforming industries by streamlining tasks and extracting insights, enhancing efficiency and innovation. In software testing, it boosts accuracy while enabling human testers to focus on strategic and creative aspects. This blog explores how AI and human testers can collaborate effectively to achieve the best results in software testing.
Blog
•Mar 24, 2025

F5 BIG-IP Next Application Migration

F5 BIG-IP Next is the next generation of BIG-IP software built to reduce operational complexity, improve performance, strengthen security, and enhance observability, carrying forward the comprehensive suite of advanced BIG-IP TMOS functionality developed over the past 20 years. BIG-IP Next introduces a centralized, API-centric, and automation-friendly framework, making it faster and easier for DevOps, NetOps, and SecOps teams to deploy and manage critical application services. This lab is built with the latest technology in learning platform delivery.
Advanced Configuration Lab
•74 launches

Unlocking the Future of Edge Computing with WWT's Edge Enablement Platform

Discover how WWT's Edge Enablement Platform (EEP) revolutionizes real-time data processing and analytics by bringing high-performance computing and AI-driven insights directly to the edge. Built on AWS services and leveraging NVIDIA Jetson, EEP empowers businesses across industries to enhance operational efficiency and drive innovation. Learn more about this scalable, secure platform.
Blog
•Sep 10, 2024

Shift Left to Protect APIs with F5 | Partner Spotlight

APIs have become the backbone of modern digital interactions, connecting everything from morning coffee purchases to streaming services. But the rise of API-centric architectures has drastically expanded the attack surface -- over 90 percent of web-based cyberattacks are now targeting API endpoints, exploiting new vulnerabilities often overlooked by security teams – and rendered traditional security measures are no longer sufficient. Join F5 Field CTO Chuck Herrin and WWT's Head of Global Cyber Strategy Traci Byrne as they talk about the urgent need for more dynamic and comprehensive defense strategies to prevent breaches. Chuck and Traci detail how security teams can "shift left" to better address API risks and vulnerabilities and outline practical steps security leaders can take to bolster their defenses.
Webinar
•Aug 22, 2024 • 9am

Shift Left to Protect APIs with F5 | Partner Spotlight

APIs have become the backbone of modern digital interactions, connecting everything from morning coffee purchases to streaming services. But the rise of API-centric architectures has drastically expanded the attack surface -- over 90 percent of web-based cyberattacks are now targeting API endpoints, exploiting new vulnerabilities often overlooked by security teams – and rendered traditional security measures are no longer sufficient. Join F5 Field CTO Chuck Herrin and WWT's Head of Global Cyber Strategy Traci Byrne as they talk about the urgent need for more dynamic and comprehensive defense strategies to prevent breaches. Chuck and Traci detail how security teams can "shift left" to better address API risks and vulnerabilities and outline practical steps security leaders can take to bolster their defenses.
Video
•0:39
•Aug 21, 2024

Sink or Soar: Turn AI into ROI with a CX Full-Stack Approach

WWT's approach to full-stack excellence provides CX leaders with a framework for unlocking efficiency, growth and fresh digital experiences for their customers.
Article
•Aug 12, 2024

F5 BIG-IP Next Instance Install from Central Manager

Description F5 BIG-IP Next is the next generation of BIG-IP software built to reduce operational complexity, improve performance, strengthen security, and enhance observability, carrying forward the comprehensive suite of advanced BIG-IP TMOS functionality developed over the past 20 years. BIG-IP Next introduces a centralized, API-centric, and automation-friendly framework, making it faster and easier for DevOps, NetOps, and SecOps teams to deploy and manage critical application services. This lab is built with the latest technology in learning platform delivery.
Advanced Configuration Lab
•81 launches

F5 BIG-IP Next Instance Install on VMware

F5 BIG-IP Next is the next generation of BIG-IP software built to reduce operational complexity, improve performance, strengthen security, and enhance observability, carrying forward the comprehensive suite of advanced BIG-IP TMOS functionality developed over the past 20 years. BIG-IP Next introduces a centralized, API-centric, and automation-friendly framework, making it faster and easier for DevOps, NetOps, and SecOps teams to deploy and manage critical application services. This lab is built with the latest technology in learning platform delivery.
Advanced Configuration Lab
•143 launches

F5 BIG-IP Next Central Manager installing and configuring on vSphere

BIG-IP Next Central Manager (CM) represents the next-generation management suite for the new BIG-IP OS across hardware and software instances. It provides simplified lifecycle and configuration management across F5 BIG-IP Next fleets, a concept not covered in this lab. Two primary methods for managing BIG-IP Next instances via Central Manager software are through a web browser-based portal or via API-based templates. This lab will use the UI.
Advanced Configuration Lab
•175 launches

Blending AI and Human Insight: The Collaborative Future of Technical Writing

Technical writing, a profession critical to bridging the gap between complex technology and end-users, is one such field where AI's capabilities are being closely scrutinized.
Blog
•Jun 14, 2024

Exploratory Testing: Uncovering Software Secrets through Dynamic Exploration

Exploratory testing is a valuable approach that complements other testing practices. It involves designing and executing tests using insights gleaned from previous experiments, focusing on exploring the software's capabilities and limitations rather than just checking expected behaviors.
Blog
•Jun 13, 2024

Unlocking the Power of Apple CarPlay

In an era where our smartphones have become an integral part of our daily lives, Apple CarPlay emerges as a seamless integration of technology with our driving experiences. Here, we'll delve into the intricacies of Apple CarPlay, exploring its features, benefits and how developers can harness its capabilities with code examples.
Blog
•Mar 12, 2024

Android Appium Automated Tests with BrowserMob MITM proxy

Mobile automation is generally done in mobile application testing to improve the efficiency of our testing process. Many times, the application deals with back-end-based data, which tends to change with each request or over time, and we can't afford to go and update tests on each data change. Here, we are going a step further by using the MITM concept to trap, manipulate and stub our data.
Blog
•Jan 14, 2024

Health Solutions Company Expands Capabilities of F5 Network

A self-service application delivery controller utility provides IT networks and operations teams with a robust solution to meet demand at scale.
Case Study

OWASP API Top Ten 2023 - All Your API Vulnerabilities Are Belong to Us

The OWASP just released their API Top Ten API Security Risks for 2023. Here's the rundown with some inside industry perspective.
Blog
•Sep 21, 2023

Test Automation for a Major Pharmaceutical Company to Maintain Federal Compliance

WWT and a global pharmaceutical company worked together to create a suite of tests that drove compliance with FDA Part 11 in its digital signing processes.
Case Study

Beyond the Cyber Basics: A Recap From Black Hat USA 2023

I recently attended Black Hat USA 2023 in Las Vegas, where the lights shined on AI, applications, API, cloud, data and software supply chain security. Reflecting on this well-attended event, I bring to you some perspective on the state of the industry.
Blog
•Aug 29, 2023

Threat Detection Platform for Any Security Need

WWT's Mobile Field Kit (MFK) is a unique operations control and threat monitoring system that can assist those responsible for public safety at public events, places of interest and entertainment venues to secure the perimeter.
Article
•Aug 15, 2023

Mercy Virtual Creates Anytime Healthcare

Mercy Virtual partnered with WWT and Cisco to create a Virtual Care Center, reaching more patients in more places to provide care the moment it's needed.
Case Study

Application Services

Creating software that uses an agile and outcomes-based approach delivers value early and often.

183 Followers

At a glance

92Total
40Case Studies
34Blogs
10Articles
4Labs
2Workshops
1Event
1Video
What's related
  • Digital
  • Software Development
  • Blog
  • Automation
  • DevOps
  • Cloud
  • Applied Research
  • What we do
  • AI & Data
  • Consulting Services
  • Customer Experience
  • Security
  • Healthcare
  • Application & API Security
  • ATC
  • F5
  • AI Solutions
  • Cloud Strategy and Adoption
  • F5 Application Delivery Contollers
  • Cloud Migration and Modernization

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2025 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Cookies