SlideShare uma empresa Scribd logo
1 de 10
Quick Poll Research: HTTP/2
Survey Results
Conducted on behalf of F5 by IDG Research Services
September 2014
© F5 Networks, Inc 2
Most respondents have limited knowledge about HTTP/2;
just 20% feel they know a lot about HTTP/2 and its benefits
80%
20%
Familiarity with HTTP/2
I know a lot about HTTP/2
and the resulting benefits
Q1: How familiar are you with HTTP/2?
Base: 86 respondents
I feel like I know a bit
about it and some of
the benefits
© F5 Networks, Inc 3
One third (32%) of respondents have either implemented or piloted HTTP/2 while 9% have
decided to move forward within the next 6-12 months. Just under one third (31%) report having
no plans to implement, suggesting low awareness of the impending changes
Q2a: What is your organization’s timeframe for adoption of HTTP/2?
Base: 86 respondents
Timeframe for adoption of HTTP/2
0%
10%
2%
20%
3%
6%
8%
6%
31%
13%
We have implement HTTP/2 for all applications
We have implemented HTTP/2 for at least a few
application
We have implemented HTTP/2 for mobile
applications only
We are actively evaluating or piloting HTTP/2
6 months
12 months
1-2 years
2 or more years
We have no plans to implement HTTP/2
Don't know
© F5 Networks, Inc 4
Those at larger companies are more likely to have
immediate plans to adopt HTTP/2
Q2a: What is your organization’s timeframe for adoption of HTTP/2?
Base: 86 respondents
0%
11%
4%
20%
7%
9%
9%
4%
22%
15%
0%
10%
0%
20%
0%
3%
8%
8%
43%
10%
We have implemented HTTP 2.0 for all applications
We have implemented HTTP 2.0 for at least a few applications
We have implemented HTTP 2.0 for mobile applications only
We are actively evaluating or piloting HTTP 2.0
6 months
12 months
1 - 2 years
2 or more years
We have no plans to implement /HTTP 2.0
Don't know
500 employees or more
Less than 500 employees
Timeframe for adoption of HTTP/2 – By company size
© F5 Networks, Inc 5
One-third (33%) have implemented or are piloting SPDY while 7%
have decided to move forward to adopt SPDY within the next year
1%
7%
5%
20%
2%
5%
2%
6%
36%
16%
Yes, we have implemented SPDY for all applications
Yes, we have implemented SPDY for a few applications
Yes, we have implemented SPDY for mobile applications only
Not yet, but we are actively evaluating or piloting SPDY
6 months
12 months
1 - 2 years
2 or more years
No, we have no plans to implement SPDY
Don't know
Not yet, but we have
decided to move
forward to implement
SPDY within the next:
Q2b: Has your organization adopted SPDY?
Base: 86 respondents
Adoption of SPDY
© F5 Networks, Inc 6
Similar to HTTP/2 adoption, larger organizations are the first to
adopt SPDY
Q2b: Has your organization adopted SPDY?
Base: 86 respondents
Adoption of SPDY – By company size
0%
11%
7%
22%
4%
2%
2%
7%
26%
20%
3%
3%
3%
18%
0%
8%
3%
5%
48%
13%
Yes, we have implemented SPDY for all applications
Yes, we have implemented SPDY for a few applications
Yes, we have implemented SPDY for mobile applications only
Not yet, but we are actively evaluating or piloting SPDY
6 months
12 months
1 - 2 years
2 or more years
No, we have no plans to implement SPDY
Don't know
500 employees or more
Less than 500 employees
Not yet, but we have
decided to move
forward to implement
SPDY within the next:
© F5 Networks, Inc 7
Better browser/website performance and more efficient use of
network resources are the primary drivers of HTTP/2 adoption
67%
55%
43%
38%
2%
3%
6%
Better browser/website performance
More efficient use of network resources (reducing the
need for multiple TCP connections)
Forced security standards
Better mobile performance
Other
None
Don't know
Q3: Which of the following potential benefits did or would drive your organization to more aggressively adopt HTTP 2.0? (Please select all that apply.)
Base: 86 respondents
Potential Benefits that Did or Would Drive More Aggressive Adoption of
HTTP/2
© F5 Networks, Inc 8
Low availability of HTTP/2 services is the primary barrier slowing
adoption, followed by lack of familiarity with the technology and lack
of backward compatibility with earlier versions of HTTP
41%
31%
31%
29%
28%
19%
2%
7%
9%
Low availability of HTTP 2.0 services
Lack of familiarity with the technology
Lack of backward compatibility with HTTP 1.x
Lack of back-end support
Incompatibility with current security infrastructure
The requirement that all application traffic be
secured via TLS/SSL
Other
None
Don't know
Q4: Which of the following potential barriers did or would slow your organization’s adoption of HTTP/2? (Please select all that apply.)
Base: 86 respondents
Potential Barriers that Did or Would Slow Adoption of HTTP/2
© F5 Networks, Inc 9
Over half (57%) indicate it is critical/very important that their
organization support both HTTP 1.x and HTTP/2 simultaneously
23%
34%
26%
14%
3%
Critical
Very important
Somewhat
important
Not very important
Not at all important
Q5: How important is it for your organization to support both HTTP 1.x and HTTP 2.0 simultaneously?
Base: 86 respondents
Importance of Supporting Both HTTP 1.x and HTTP/2 Simultaneously
F5 Networks Quick Poll Research: HTTP/2Survey Results

Mais conteúdo relacionado

Mais procurados

Cisco's 2016 Annual Security report
Cisco's 2016 Annual Security reportCisco's 2016 Annual Security report
Cisco's 2016 Annual Security reportCisco Canada
 
Faster, simpler, more secure remote access to apps in aws
Faster, simpler, more secure remote access to apps in awsFaster, simpler, more secure remote access to apps in aws
Faster, simpler, more secure remote access to apps in awsZscaler
 
A Different Approach to Securing Your Cloud Journey
A Different Approach to Securing Your Cloud JourneyA Different Approach to Securing Your Cloud Journey
A Different Approach to Securing Your Cloud JourneyCloudflare
 
Facebook Outage Analysis: Using External Visibility to Fortify Availability
Facebook Outage Analysis: Using External Visibility to Fortify AvailabilityFacebook Outage Analysis: Using External Visibility to Fortify Availability
Facebook Outage Analysis: Using External Visibility to Fortify AvailabilityThousandEyes
 
How sdp delivers_zero_trust
How sdp delivers_zero_trustHow sdp delivers_zero_trust
How sdp delivers_zero_trustZscaler
 
Security Across the Cloud Native Continuum with ESG and Palo Alto Networks
Security Across the Cloud Native Continuum with ESG and Palo Alto NetworksSecurity Across the Cloud Native Continuum with ESG and Palo Alto Networks
Security Across the Cloud Native Continuum with ESG and Palo Alto NetworksDevOps.com
 
Three ways-zero-trust-security-redefines-partner-access-v8
Three ways-zero-trust-security-redefines-partner-access-v8Three ways-zero-trust-security-redefines-partner-access-v8
Three ways-zero-trust-security-redefines-partner-access-v8Zscaler
 
Migration to microsoft_azure_with_zscaler
Migration to microsoft_azure_with_zscalerMigration to microsoft_azure_with_zscaler
Migration to microsoft_azure_with_zscalerZscaler
 
Moving from appliances to cloud security with phoenix children's hospital
Moving from appliances to cloud security with phoenix children's hospitalMoving from appliances to cloud security with phoenix children's hospital
Moving from appliances to cloud security with phoenix children's hospitalZscaler
 
Three ways-zero-trust-security-redefines-partner-access-ch
Three ways-zero-trust-security-redefines-partner-access-chThree ways-zero-trust-security-redefines-partner-access-ch
Three ways-zero-trust-security-redefines-partner-access-chZscaler
 
Get an office 365 expereience your users will love v8.1
Get an office 365 expereience your users will love v8.1Get an office 365 expereience your users will love v8.1
Get an office 365 expereience your users will love v8.1Zscaler
 
Cisco connect winnipeg 2018 stealthwatch whiteboard session and cisco secur...
Cisco connect winnipeg 2018   stealthwatch whiteboard session and cisco secur...Cisco connect winnipeg 2018   stealthwatch whiteboard session and cisco secur...
Cisco connect winnipeg 2018 stealthwatch whiteboard session and cisco secur...Cisco Canada
 
F5's IP Intelligence Service
F5's IP Intelligence ServiceF5's IP Intelligence Service
F5's IP Intelligence ServiceF5 Networks
 
Cloud vs. On-Premises Security: Can you afford not to switch?
Cloud vs. On-Premises Security:  Can you afford not to switch?Cloud vs. On-Premises Security:  Can you afford not to switch?
Cloud vs. On-Premises Security: Can you afford not to switch?Zscaler
 
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...Cloudflare
 
2021 01-27 reducing risk of ransomware webinar
2021 01-27 reducing risk of ransomware webinar2021 01-27 reducing risk of ransomware webinar
2021 01-27 reducing risk of ransomware webinarAlgoSec
 
How Zero Trust Changes Identity & Access
How Zero Trust Changes Identity & AccessHow Zero Trust Changes Identity & Access
How Zero Trust Changes Identity & AccessIvan Dwyer
 
Fight bad bot on the internet
Fight bad bot on the internetFight bad bot on the internet
Fight bad bot on the internetCloudflare
 
Palo Alto Networks - Magnifier
Palo Alto Networks - MagnifierPalo Alto Networks - Magnifier
Palo Alto Networks - MagnifierJisc
 

Mais procurados (20)

Cisco's 2016 Annual Security report
Cisco's 2016 Annual Security reportCisco's 2016 Annual Security report
Cisco's 2016 Annual Security report
 
Faster, simpler, more secure remote access to apps in aws
Faster, simpler, more secure remote access to apps in awsFaster, simpler, more secure remote access to apps in aws
Faster, simpler, more secure remote access to apps in aws
 
A Different Approach to Securing Your Cloud Journey
A Different Approach to Securing Your Cloud JourneyA Different Approach to Securing Your Cloud Journey
A Different Approach to Securing Your Cloud Journey
 
Facebook Outage Analysis: Using External Visibility to Fortify Availability
Facebook Outage Analysis: Using External Visibility to Fortify AvailabilityFacebook Outage Analysis: Using External Visibility to Fortify Availability
Facebook Outage Analysis: Using External Visibility to Fortify Availability
 
How sdp delivers_zero_trust
How sdp delivers_zero_trustHow sdp delivers_zero_trust
How sdp delivers_zero_trust
 
Security Across the Cloud Native Continuum with ESG and Palo Alto Networks
Security Across the Cloud Native Continuum with ESG and Palo Alto NetworksSecurity Across the Cloud Native Continuum with ESG and Palo Alto Networks
Security Across the Cloud Native Continuum with ESG and Palo Alto Networks
 
F5 beyond load balancer (nov 2009)
F5 beyond load balancer (nov 2009)F5 beyond load balancer (nov 2009)
F5 beyond load balancer (nov 2009)
 
Three ways-zero-trust-security-redefines-partner-access-v8
Three ways-zero-trust-security-redefines-partner-access-v8Three ways-zero-trust-security-redefines-partner-access-v8
Three ways-zero-trust-security-redefines-partner-access-v8
 
Migration to microsoft_azure_with_zscaler
Migration to microsoft_azure_with_zscalerMigration to microsoft_azure_with_zscaler
Migration to microsoft_azure_with_zscaler
 
Moving from appliances to cloud security with phoenix children's hospital
Moving from appliances to cloud security with phoenix children's hospitalMoving from appliances to cloud security with phoenix children's hospital
Moving from appliances to cloud security with phoenix children's hospital
 
Three ways-zero-trust-security-redefines-partner-access-ch
Three ways-zero-trust-security-redefines-partner-access-chThree ways-zero-trust-security-redefines-partner-access-ch
Three ways-zero-trust-security-redefines-partner-access-ch
 
Get an office 365 expereience your users will love v8.1
Get an office 365 expereience your users will love v8.1Get an office 365 expereience your users will love v8.1
Get an office 365 expereience your users will love v8.1
 
Cisco connect winnipeg 2018 stealthwatch whiteboard session and cisco secur...
Cisco connect winnipeg 2018   stealthwatch whiteboard session and cisco secur...Cisco connect winnipeg 2018   stealthwatch whiteboard session and cisco secur...
Cisco connect winnipeg 2018 stealthwatch whiteboard session and cisco secur...
 
F5's IP Intelligence Service
F5's IP Intelligence ServiceF5's IP Intelligence Service
F5's IP Intelligence Service
 
Cloud vs. On-Premises Security: Can you afford not to switch?
Cloud vs. On-Premises Security:  Can you afford not to switch?Cloud vs. On-Premises Security:  Can you afford not to switch?
Cloud vs. On-Premises Security: Can you afford not to switch?
 
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
 
2021 01-27 reducing risk of ransomware webinar
2021 01-27 reducing risk of ransomware webinar2021 01-27 reducing risk of ransomware webinar
2021 01-27 reducing risk of ransomware webinar
 
How Zero Trust Changes Identity & Access
How Zero Trust Changes Identity & AccessHow Zero Trust Changes Identity & Access
How Zero Trust Changes Identity & Access
 
Fight bad bot on the internet
Fight bad bot on the internetFight bad bot on the internet
Fight bad bot on the internet
 
Palo Alto Networks - Magnifier
Palo Alto Networks - MagnifierPalo Alto Networks - Magnifier
Palo Alto Networks - Magnifier
 

Destaque

F5 Networks: Introduction to Silverline WAF (web application firewall)
F5 Networks: Introduction to Silverline WAF (web application firewall)F5 Networks: Introduction to Silverline WAF (web application firewall)
F5 Networks: Introduction to Silverline WAF (web application firewall)F5 Networks
 
Integrated SDN/NFV Framework for Transitioning to Application Delivery Model
Integrated SDN/NFV Framework for Transitioning to Application Delivery ModelIntegrated SDN/NFV Framework for Transitioning to Application Delivery Model
Integrated SDN/NFV Framework for Transitioning to Application Delivery ModelF5 Networks
 
Using Docker container technology with F5 Networks products and services
Using Docker container technology with F5 Networks products and servicesUsing Docker container technology with F5 Networks products and services
Using Docker container technology with F5 Networks products and servicesF5 Networks
 
F5 Networks Intelligent DNS Scale
F5 Networks Intelligent DNS ScaleF5 Networks Intelligent DNS Scale
F5 Networks Intelligent DNS ScaleF5 Networks
 
F5 Application Services Reference Architecture
F5 Application Services Reference ArchitectureF5 Application Services Reference Architecture
F5 Application Services Reference ArchitectureF5 Networks
 
F5 Certified! Program Overview and Update
F5 Certified! Program Overview and UpdateF5 Certified! Program Overview and Update
F5 Certified! Program Overview and UpdateF5 Networks
 
F5’s VMware Horizon View Reference Architecture
F5’s VMware Horizon View Reference ArchitectureF5’s VMware Horizon View Reference Architecture
F5’s VMware Horizon View Reference ArchitectureF5 Networks
 
F5 Application Services Reference Architecture (Audio)
F5 Application Services Reference Architecture (Audio)F5 Application Services Reference Architecture (Audio)
F5 Application Services Reference Architecture (Audio)F5 Networks
 
F5 - BigIP ASM introduction
F5 - BigIP ASM introductionF5 - BigIP ASM introduction
F5 - BigIP ASM introductionJimmy Saigon
 
Company Profile: F5 Networks’ Traffix Signaling Delivery Controller and BIG-I...
Company Profile: F5 Networks’ Traffix Signaling Delivery Controller and BIG-I...Company Profile: F5 Networks’ Traffix Signaling Delivery Controller and BIG-I...
Company Profile: F5 Networks’ Traffix Signaling Delivery Controller and BIG-I...F5 Networks
 
Key Findings from the State of Application Delivery 2015
Key Findings from the State of Application Delivery 2015Key Findings from the State of Application Delivery 2015
Key Findings from the State of Application Delivery 2015F5 Networks
 
F5’s VMware Horizon View Reference Architecture
F5’s VMware Horizon View Reference ArchitectureF5’s VMware Horizon View Reference Architecture
F5’s VMware Horizon View Reference ArchitectureF5 Networks
 
F5 Intelligent DNS Scale
F5 Intelligent DNS ScaleF5 Intelligent DNS Scale
F5 Intelligent DNS ScaleF5 Networks
 
F5 networks the_expectation_of_ssl_everywhere
F5 networks the_expectation_of_ssl_everywhereF5 networks the_expectation_of_ssl_everywhere
F5 networks the_expectation_of_ssl_everywhereF5 Networks
 
The DNS of Things
The DNS of ThingsThe DNS of Things
The DNS of ThingsF5 Networks
 
5 Ways to use Node in the Network
5 Ways to use Node in the Network5 Ways to use Node in the Network
5 Ways to use Node in the NetworkF5 Networks
 
Ensure Application Availability Between Hybrid Data Centers
Ensure Application Availability Between Hybrid Data CentersEnsure Application Availability Between Hybrid Data Centers
Ensure Application Availability Between Hybrid Data CentersF5 Networks
 
BIG-IP ADCs and ADF
BIG-IP ADCs and ADFBIG-IP ADCs and ADF
BIG-IP ADCs and ADFF5 Networks
 
BIG-IP Policy Enforcement Manager
BIG-IP Policy Enforcement ManagerBIG-IP Policy Enforcement Manager
BIG-IP Policy Enforcement ManagerF5 Networks
 

Destaque (20)

F5 Networks: Introduction to Silverline WAF (web application firewall)
F5 Networks: Introduction to Silverline WAF (web application firewall)F5 Networks: Introduction to Silverline WAF (web application firewall)
F5 Networks: Introduction to Silverline WAF (web application firewall)
 
Integrated SDN/NFV Framework for Transitioning to Application Delivery Model
Integrated SDN/NFV Framework for Transitioning to Application Delivery ModelIntegrated SDN/NFV Framework for Transitioning to Application Delivery Model
Integrated SDN/NFV Framework for Transitioning to Application Delivery Model
 
Using Docker container technology with F5 Networks products and services
Using Docker container technology with F5 Networks products and servicesUsing Docker container technology with F5 Networks products and services
Using Docker container technology with F5 Networks products and services
 
F5 Networks Intelligent DNS Scale
F5 Networks Intelligent DNS ScaleF5 Networks Intelligent DNS Scale
F5 Networks Intelligent DNS Scale
 
F5 Application Services Reference Architecture
F5 Application Services Reference ArchitectureF5 Application Services Reference Architecture
F5 Application Services Reference Architecture
 
F5 Certified! Program Overview and Update
F5 Certified! Program Overview and UpdateF5 Certified! Program Overview and Update
F5 Certified! Program Overview and Update
 
F5’s VMware Horizon View Reference Architecture
F5’s VMware Horizon View Reference ArchitectureF5’s VMware Horizon View Reference Architecture
F5’s VMware Horizon View Reference Architecture
 
F5 Application Services Reference Architecture (Audio)
F5 Application Services Reference Architecture (Audio)F5 Application Services Reference Architecture (Audio)
F5 Application Services Reference Architecture (Audio)
 
F5 - BigIP ASM introduction
F5 - BigIP ASM introductionF5 - BigIP ASM introduction
F5 - BigIP ASM introduction
 
Company Profile: F5 Networks’ Traffix Signaling Delivery Controller and BIG-I...
Company Profile: F5 Networks’ Traffix Signaling Delivery Controller and BIG-I...Company Profile: F5 Networks’ Traffix Signaling Delivery Controller and BIG-I...
Company Profile: F5 Networks’ Traffix Signaling Delivery Controller and BIG-I...
 
Key Findings from the State of Application Delivery 2015
Key Findings from the State of Application Delivery 2015Key Findings from the State of Application Delivery 2015
Key Findings from the State of Application Delivery 2015
 
F5’s VMware Horizon View Reference Architecture
F5’s VMware Horizon View Reference ArchitectureF5’s VMware Horizon View Reference Architecture
F5’s VMware Horizon View Reference Architecture
 
F5 Intelligent DNS Scale
F5 Intelligent DNS ScaleF5 Intelligent DNS Scale
F5 Intelligent DNS Scale
 
F5 networks the_expectation_of_ssl_everywhere
F5 networks the_expectation_of_ssl_everywhereF5 networks the_expectation_of_ssl_everywhere
F5 networks the_expectation_of_ssl_everywhere
 
The DNS of Things
The DNS of ThingsThe DNS of Things
The DNS of Things
 
5 Ways to use Node in the Network
5 Ways to use Node in the Network5 Ways to use Node in the Network
5 Ways to use Node in the Network
 
Ensure Application Availability Between Hybrid Data Centers
Ensure Application Availability Between Hybrid Data CentersEnsure Application Availability Between Hybrid Data Centers
Ensure Application Availability Between Hybrid Data Centers
 
BIG-IP ADCs and ADF
BIG-IP ADCs and ADFBIG-IP ADCs and ADF
BIG-IP ADCs and ADF
 
BIG-IP Policy Enforcement Manager
BIG-IP Policy Enforcement ManagerBIG-IP Policy Enforcement Manager
BIG-IP Policy Enforcement Manager
 
Configuration F5 BIG IP ASM v12
Configuration F5 BIG IP ASM v12Configuration F5 BIG IP ASM v12
Configuration F5 BIG IP ASM v12
 

Semelhante a F5 Networks Quick Poll Research: HTTP/2 Survey Results

Netop VPN survey final report
Netop VPN survey final reportNetop VPN survey final report
Netop VPN survey final reportNetop
 
Idge dell server convergence2014 qp #1
Idge dell server convergence2014 qp #1Idge dell server convergence2014 qp #1
Idge dell server convergence2014 qp #1jmariani14
 
Best Practices for Intelligent Compliance
Best Practices for Intelligent ComplianceBest Practices for Intelligent Compliance
Best Practices for Intelligent ComplianceBMC Software
 
IBM Power Migration without the Risk and Downtime
IBM Power Migration without the Risk and DowntimeIBM Power Migration without the Risk and Downtime
IBM Power Migration without the Risk and DowntimePrecisely
 
Qaanalytics customerstory-forpublishing-150412120638-conversion-gate01
Qaanalytics customerstory-forpublishing-150412120638-conversion-gate01Qaanalytics customerstory-forpublishing-150412120638-conversion-gate01
Qaanalytics customerstory-forpublishing-150412120638-conversion-gate01Nandini Narayanan
 
Questioning Strategies Part 1 Questioning StrategiesSocial .docx
Questioning Strategies Part 1 Questioning StrategiesSocial .docxQuestioning Strategies Part 1 Questioning StrategiesSocial .docx
Questioning Strategies Part 1 Questioning StrategiesSocial .docxaudeleypearl
 
BUSINESS CASE CAPSTONE2BUSINESS CASE CAPSTONE3.docx
BUSINESS CASE CAPSTONE2BUSINESS CASE CAPSTONE3.docxBUSINESS CASE CAPSTONE2BUSINESS CASE CAPSTONE3.docx
BUSINESS CASE CAPSTONE2BUSINESS CASE CAPSTONE3.docxjasoninnes20
 
TV Platforms 2014 Report: an S3 Group Survey of Pay-TV Service Delivery
TV Platforms 2014 Report: an S3 Group Survey of Pay-TV Service DeliveryTV Platforms 2014 Report: an S3 Group Survey of Pay-TV Service Delivery
TV Platforms 2014 Report: an S3 Group Survey of Pay-TV Service DeliveryS3 Group | TV Technology
 
SolarWinds Application Performance End User Survey (Singapore)
SolarWinds Application Performance End User Survey (Singapore)SolarWinds Application Performance End User Survey (Singapore)
SolarWinds Application Performance End User Survey (Singapore)SolarWinds
 
IRJET- Data Mining and Cluster based Machine Learning in Mobile Online Social...
IRJET- Data Mining and Cluster based Machine Learning in Mobile Online Social...IRJET- Data Mining and Cluster based Machine Learning in Mobile Online Social...
IRJET- Data Mining and Cluster based Machine Learning in Mobile Online Social...IRJET Journal
 
Qa focus 2015 2020
Qa focus 2015 2020Qa focus 2015 2020
Qa focus 2015 2020anuvip
 
Survey: Application Use & Challenges in Government IT Infrastructures
Survey: Application Use & Challenges in Government IT InfrastructuresSurvey: Application Use & Challenges in Government IT Infrastructures
Survey: Application Use & Challenges in Government IT InfrastructuresSolarWinds
 
Future of IIoT Predictive Maintenance Study
Future of IIoT Predictive Maintenance StudyFuture of IIoT Predictive Maintenance Study
Future of IIoT Predictive Maintenance StudyPresenso
 
SolarWinds Application Performance End User Survey (North America)
SolarWinds Application Performance End User Survey (North America)SolarWinds Application Performance End User Survey (North America)
SolarWinds Application Performance End User Survey (North America)SolarWinds
 
IBM Relay 2015: Cloud is All About the Customer
IBM Relay 2015: Cloud is All About the Customer IBM Relay 2015: Cloud is All About the Customer
IBM Relay 2015: Cloud is All About the Customer IBM
 
The rise of Made in India digital content
The rise of Made in India digital contentThe rise of Made in India digital content
The rise of Made in India digital contentRedSeer
 
The Accelerate State of DevOps Report
The Accelerate State of DevOps ReportThe Accelerate State of DevOps Report
The Accelerate State of DevOps ReportXebiaLabs
 
U08784 part 2 presentation
U08784 part 2 presentationU08784 part 2 presentation
U08784 part 2 presentationxero42
 
Solar winds appstack public sector
Solar winds appstack public sectorSolar winds appstack public sector
Solar winds appstack public sectorSolarWinds
 
SolarWinds Application Performance End User Survey (Public Sector Results)
SolarWinds Application Performance End User Survey (Public Sector Results)SolarWinds Application Performance End User Survey (Public Sector Results)
SolarWinds Application Performance End User Survey (Public Sector Results)SolarWinds
 

Semelhante a F5 Networks Quick Poll Research: HTTP/2 Survey Results (20)

Netop VPN survey final report
Netop VPN survey final reportNetop VPN survey final report
Netop VPN survey final report
 
Idge dell server convergence2014 qp #1
Idge dell server convergence2014 qp #1Idge dell server convergence2014 qp #1
Idge dell server convergence2014 qp #1
 
Best Practices for Intelligent Compliance
Best Practices for Intelligent ComplianceBest Practices for Intelligent Compliance
Best Practices for Intelligent Compliance
 
IBM Power Migration without the Risk and Downtime
IBM Power Migration without the Risk and DowntimeIBM Power Migration without the Risk and Downtime
IBM Power Migration without the Risk and Downtime
 
Qaanalytics customerstory-forpublishing-150412120638-conversion-gate01
Qaanalytics customerstory-forpublishing-150412120638-conversion-gate01Qaanalytics customerstory-forpublishing-150412120638-conversion-gate01
Qaanalytics customerstory-forpublishing-150412120638-conversion-gate01
 
Questioning Strategies Part 1 Questioning StrategiesSocial .docx
Questioning Strategies Part 1 Questioning StrategiesSocial .docxQuestioning Strategies Part 1 Questioning StrategiesSocial .docx
Questioning Strategies Part 1 Questioning StrategiesSocial .docx
 
BUSINESS CASE CAPSTONE2BUSINESS CASE CAPSTONE3.docx
BUSINESS CASE CAPSTONE2BUSINESS CASE CAPSTONE3.docxBUSINESS CASE CAPSTONE2BUSINESS CASE CAPSTONE3.docx
BUSINESS CASE CAPSTONE2BUSINESS CASE CAPSTONE3.docx
 
TV Platforms 2014 Report: an S3 Group Survey of Pay-TV Service Delivery
TV Platforms 2014 Report: an S3 Group Survey of Pay-TV Service DeliveryTV Platforms 2014 Report: an S3 Group Survey of Pay-TV Service Delivery
TV Platforms 2014 Report: an S3 Group Survey of Pay-TV Service Delivery
 
SolarWinds Application Performance End User Survey (Singapore)
SolarWinds Application Performance End User Survey (Singapore)SolarWinds Application Performance End User Survey (Singapore)
SolarWinds Application Performance End User Survey (Singapore)
 
IRJET- Data Mining and Cluster based Machine Learning in Mobile Online Social...
IRJET- Data Mining and Cluster based Machine Learning in Mobile Online Social...IRJET- Data Mining and Cluster based Machine Learning in Mobile Online Social...
IRJET- Data Mining and Cluster based Machine Learning in Mobile Online Social...
 
Qa focus 2015 2020
Qa focus 2015 2020Qa focus 2015 2020
Qa focus 2015 2020
 
Survey: Application Use & Challenges in Government IT Infrastructures
Survey: Application Use & Challenges in Government IT InfrastructuresSurvey: Application Use & Challenges in Government IT Infrastructures
Survey: Application Use & Challenges in Government IT Infrastructures
 
Future of IIoT Predictive Maintenance Study
Future of IIoT Predictive Maintenance StudyFuture of IIoT Predictive Maintenance Study
Future of IIoT Predictive Maintenance Study
 
SolarWinds Application Performance End User Survey (North America)
SolarWinds Application Performance End User Survey (North America)SolarWinds Application Performance End User Survey (North America)
SolarWinds Application Performance End User Survey (North America)
 
IBM Relay 2015: Cloud is All About the Customer
IBM Relay 2015: Cloud is All About the Customer IBM Relay 2015: Cloud is All About the Customer
IBM Relay 2015: Cloud is All About the Customer
 
The rise of Made in India digital content
The rise of Made in India digital contentThe rise of Made in India digital content
The rise of Made in India digital content
 
The Accelerate State of DevOps Report
The Accelerate State of DevOps ReportThe Accelerate State of DevOps Report
The Accelerate State of DevOps Report
 
U08784 part 2 presentation
U08784 part 2 presentationU08784 part 2 presentation
U08784 part 2 presentation
 
Solar winds appstack public sector
Solar winds appstack public sectorSolar winds appstack public sector
Solar winds appstack public sector
 
SolarWinds Application Performance End User Survey (Public Sector Results)
SolarWinds Application Performance End User Survey (Public Sector Results)SolarWinds Application Performance End User Survey (Public Sector Results)
SolarWinds Application Performance End User Survey (Public Sector Results)
 

Mais de F5 Networks

F5 Networks: The Internet of Things - Ready Infrastructure
F5 Networks: The Internet of Things - Ready InfrastructureF5 Networks: The Internet of Things - Ready Infrastructure
F5 Networks: The Internet of Things - Ready InfrastructureF5 Networks
 
F5 Networks Threat Analysis: Madness
F5 Networks Threat Analysis: MadnessF5 Networks Threat Analysis: Madness
F5 Networks Threat Analysis: MadnessF5 Networks
 
Scaling Mobile Network Security for LTE: A Multi-Layer Approach
Scaling Mobile Network Security for LTE: A Multi-Layer ApproachScaling Mobile Network Security for LTE: A Multi-Layer Approach
Scaling Mobile Network Security for LTE: A Multi-Layer ApproachF5 Networks
 
The F5 Networks Application Services Reference Architecture (White Paper)
The F5 Networks Application Services Reference Architecture (White Paper)The F5 Networks Application Services Reference Architecture (White Paper)
The F5 Networks Application Services Reference Architecture (White Paper)F5 Networks
 
An Evolving Threat Needs an Evolved Defense (F5 Networks Infographic)
An Evolving Threat Needs an Evolved Defense (F5 Networks Infographic)An Evolving Threat Needs an Evolved Defense (F5 Networks Infographic)
An Evolving Threat Needs an Evolved Defense (F5 Networks Infographic)F5 Networks
 
The F5 DDoS Protection Reference Architecture (Technical White Paper)
The F5 DDoS Protection Reference Architecture (Technical White Paper)The F5 DDoS Protection Reference Architecture (Technical White Paper)
The F5 DDoS Protection Reference Architecture (Technical White Paper)F5 Networks
 
F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...
F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...
F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...F5 Networks
 
DNS: Challenges in a Changing Landscape (Infographic)
DNS: Challenges in a Changing Landscape (Infographic)DNS: Challenges in a Changing Landscape (Infographic)
DNS: Challenges in a Changing Landscape (Infographic)F5 Networks
 
BIG-IP 4200v Hardware Platform
BIG-IP 4200v Hardware PlatformBIG-IP 4200v Hardware Platform
BIG-IP 4200v Hardware PlatformF5 Networks
 

Mais de F5 Networks (9)

F5 Networks: The Internet of Things - Ready Infrastructure
F5 Networks: The Internet of Things - Ready InfrastructureF5 Networks: The Internet of Things - Ready Infrastructure
F5 Networks: The Internet of Things - Ready Infrastructure
 
F5 Networks Threat Analysis: Madness
F5 Networks Threat Analysis: MadnessF5 Networks Threat Analysis: Madness
F5 Networks Threat Analysis: Madness
 
Scaling Mobile Network Security for LTE: A Multi-Layer Approach
Scaling Mobile Network Security for LTE: A Multi-Layer ApproachScaling Mobile Network Security for LTE: A Multi-Layer Approach
Scaling Mobile Network Security for LTE: A Multi-Layer Approach
 
The F5 Networks Application Services Reference Architecture (White Paper)
The F5 Networks Application Services Reference Architecture (White Paper)The F5 Networks Application Services Reference Architecture (White Paper)
The F5 Networks Application Services Reference Architecture (White Paper)
 
An Evolving Threat Needs an Evolved Defense (F5 Networks Infographic)
An Evolving Threat Needs an Evolved Defense (F5 Networks Infographic)An Evolving Threat Needs an Evolved Defense (F5 Networks Infographic)
An Evolving Threat Needs an Evolved Defense (F5 Networks Infographic)
 
The F5 DDoS Protection Reference Architecture (Technical White Paper)
The F5 DDoS Protection Reference Architecture (Technical White Paper)The F5 DDoS Protection Reference Architecture (Technical White Paper)
The F5 DDoS Protection Reference Architecture (Technical White Paper)
 
F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...
F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...
F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...
 
DNS: Challenges in a Changing Landscape (Infographic)
DNS: Challenges in a Changing Landscape (Infographic)DNS: Challenges in a Changing Landscape (Infographic)
DNS: Challenges in a Changing Landscape (Infographic)
 
BIG-IP 4200v Hardware Platform
BIG-IP 4200v Hardware PlatformBIG-IP 4200v Hardware Platform
BIG-IP 4200v Hardware Platform
 

Último

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 

Último (20)

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

F5 Networks Quick Poll Research: HTTP/2 Survey Results

  • 1. Quick Poll Research: HTTP/2 Survey Results Conducted on behalf of F5 by IDG Research Services September 2014
  • 2. © F5 Networks, Inc 2 Most respondents have limited knowledge about HTTP/2; just 20% feel they know a lot about HTTP/2 and its benefits 80% 20% Familiarity with HTTP/2 I know a lot about HTTP/2 and the resulting benefits Q1: How familiar are you with HTTP/2? Base: 86 respondents I feel like I know a bit about it and some of the benefits
  • 3. © F5 Networks, Inc 3 One third (32%) of respondents have either implemented or piloted HTTP/2 while 9% have decided to move forward within the next 6-12 months. Just under one third (31%) report having no plans to implement, suggesting low awareness of the impending changes Q2a: What is your organization’s timeframe for adoption of HTTP/2? Base: 86 respondents Timeframe for adoption of HTTP/2 0% 10% 2% 20% 3% 6% 8% 6% 31% 13% We have implement HTTP/2 for all applications We have implemented HTTP/2 for at least a few application We have implemented HTTP/2 for mobile applications only We are actively evaluating or piloting HTTP/2 6 months 12 months 1-2 years 2 or more years We have no plans to implement HTTP/2 Don't know
  • 4. © F5 Networks, Inc 4 Those at larger companies are more likely to have immediate plans to adopt HTTP/2 Q2a: What is your organization’s timeframe for adoption of HTTP/2? Base: 86 respondents 0% 11% 4% 20% 7% 9% 9% 4% 22% 15% 0% 10% 0% 20% 0% 3% 8% 8% 43% 10% We have implemented HTTP 2.0 for all applications We have implemented HTTP 2.0 for at least a few applications We have implemented HTTP 2.0 for mobile applications only We are actively evaluating or piloting HTTP 2.0 6 months 12 months 1 - 2 years 2 or more years We have no plans to implement /HTTP 2.0 Don't know 500 employees or more Less than 500 employees Timeframe for adoption of HTTP/2 – By company size
  • 5. © F5 Networks, Inc 5 One-third (33%) have implemented or are piloting SPDY while 7% have decided to move forward to adopt SPDY within the next year 1% 7% 5% 20% 2% 5% 2% 6% 36% 16% Yes, we have implemented SPDY for all applications Yes, we have implemented SPDY for a few applications Yes, we have implemented SPDY for mobile applications only Not yet, but we are actively evaluating or piloting SPDY 6 months 12 months 1 - 2 years 2 or more years No, we have no plans to implement SPDY Don't know Not yet, but we have decided to move forward to implement SPDY within the next: Q2b: Has your organization adopted SPDY? Base: 86 respondents Adoption of SPDY
  • 6. © F5 Networks, Inc 6 Similar to HTTP/2 adoption, larger organizations are the first to adopt SPDY Q2b: Has your organization adopted SPDY? Base: 86 respondents Adoption of SPDY – By company size 0% 11% 7% 22% 4% 2% 2% 7% 26% 20% 3% 3% 3% 18% 0% 8% 3% 5% 48% 13% Yes, we have implemented SPDY for all applications Yes, we have implemented SPDY for a few applications Yes, we have implemented SPDY for mobile applications only Not yet, but we are actively evaluating or piloting SPDY 6 months 12 months 1 - 2 years 2 or more years No, we have no plans to implement SPDY Don't know 500 employees or more Less than 500 employees Not yet, but we have decided to move forward to implement SPDY within the next:
  • 7. © F5 Networks, Inc 7 Better browser/website performance and more efficient use of network resources are the primary drivers of HTTP/2 adoption 67% 55% 43% 38% 2% 3% 6% Better browser/website performance More efficient use of network resources (reducing the need for multiple TCP connections) Forced security standards Better mobile performance Other None Don't know Q3: Which of the following potential benefits did or would drive your organization to more aggressively adopt HTTP 2.0? (Please select all that apply.) Base: 86 respondents Potential Benefits that Did or Would Drive More Aggressive Adoption of HTTP/2
  • 8. © F5 Networks, Inc 8 Low availability of HTTP/2 services is the primary barrier slowing adoption, followed by lack of familiarity with the technology and lack of backward compatibility with earlier versions of HTTP 41% 31% 31% 29% 28% 19% 2% 7% 9% Low availability of HTTP 2.0 services Lack of familiarity with the technology Lack of backward compatibility with HTTP 1.x Lack of back-end support Incompatibility with current security infrastructure The requirement that all application traffic be secured via TLS/SSL Other None Don't know Q4: Which of the following potential barriers did or would slow your organization’s adoption of HTTP/2? (Please select all that apply.) Base: 86 respondents Potential Barriers that Did or Would Slow Adoption of HTTP/2
  • 9. © F5 Networks, Inc 9 Over half (57%) indicate it is critical/very important that their organization support both HTTP 1.x and HTTP/2 simultaneously 23% 34% 26% 14% 3% Critical Very important Somewhat important Not very important Not at all important Q5: How important is it for your organization to support both HTTP 1.x and HTTP 2.0 simultaneously? Base: 86 respondents Importance of Supporting Both HTTP 1.x and HTTP/2 Simultaneously