Welcome to DevCentral

 

Featured Articles

I trust Certificate Authorities, but I have no idea why

I’ve seen statistics that claim between 40% and 60% of all sites on the Internet use encryption to protect their web application traffic.  Regardless of the true number (which changes on a daily basis), it’s fair to say that encryption is a...

LTM Policy Recipes

LTM Policy is the powerful and performant replacement to the HTTP Class, and first appeared in Big IP 11.4.0.   This is intended to be a short article showing some practical recipes using LTM Policy.  Please also check out another...

Slave Malware Analysis

During the last couple of weeks, Nathan Jester, Elman Reyes, Julia Karpin and Pavel Asinovsky got together to investigate the new “Slave” banking Trojan. According to their research, the early version of the Slave performed IBAN swapping in two...

Demystifying iControl REST Part 2 - Understanding sub collections and how to use them

iControl REST. It’s iControl SOAP’s baby brother, introduced back in TMOS version 11.4 as an early access feature but was released fully in version 11.5. Several articles on basic usage have been written on iControl REST (see the resources at the...

Live Developer Q&A: Cisco ACI and F5 Synthesis – Under the Hood

Tuesday June 16th marked the first of a kind with representatives of both Cisco and F5 jointly participating in a Live Developer Q&A – how far we’ve come since the days of rivalry to now, working as closely aligned allies. [insert pic] ...

Recent Articles

I trust Certificate Authorities, but I have no idea why

I’ve seen statistics that claim between 40% and 60% of all sites on the Internet use encryption to protect their web application traffic.  Regardless of the true number (which changes on a daily basis), it’s fair to say that encryption is a huge issue for sites today, and it’s never a bad idea to understand a little bit more about it.  In order to protect web traffic, sites use the...

How data centre security can uphold online democracy

  Another day, another headline about government hacking of sensitive data. This time it’s allegations that Chinese authorities had hacked the Office of Personnel Management network, accessing information belonging to millions of US federal employees in what has to be seen as an act of cyber espionage. It is thought that the hackers gained access to, “all personnel data for every federal...

Mitigating the favicon bug through LineRate scripting

A recent report (June 2015) revealed a web browser's problem with a large favicon [1]: The browser crashes when the size of a favicon is larger than what it expects. A favicon is a small image, say 16 x 16 pixels, that is displayed next to a browser's address bar or in the bookmark [2]. Because it is downloaded automatically by the browser, users can't have...

Proud to win, Humbled to serve – F5 wins APAC Awards

In recent weeks, the award bells have been ringing for F5 in Asia Pacific. We’ve bagged not one, but four awards, showing a clear testament to our continued market and technological leadership. F5 has always been committed to delivering a holistic customer experience and we are humbled to be accredited by various industry experts and analysts for our work. These awards belong to every F...

ネットワークによりアプリケーションのパフォーマンスを大幅に向上させるための5つのヒント

Please find the English language post, by Lori MacVittie, from which this was adapted here. 本番環境へのアプリケーションの展開は最初のステップにすぎません。優れたユーザ...

Node.js ABC’s - J is for JavaScript

Node.js is an open source runtime environment for server-side and network based applications.  At it's core, Node.js uses the Google V8 JavaScript engine to execute client code and a large portion of the core basic modules are written in JavaScript.  Since, for all practical purposes, writing Node.js applications is writing JavaScript applications, it makes sense to try to...

Measuring and Monitoring: Apps and Stacks

One of the charter responsibilities of DevOps (because it's a charter responsibility of ops) is measuring and monitoring applications once they're in production. That means both performance and availability. Which means a lot more than folks might initially think because generally speaking what you measure and monitor is a bit different depending on whether you're looking ...

Node.js ABC’s - I is for Inheritance

The ability to create a class and then extend it is the basis for object-oriented programming.  Inheritance in object-oriented programming is when an object, or class, is derived from another object using the same core implementation.  Inheritance in JavaScript is a little different than other languages as there is no explicit class keyword and a mechanism for specify a derived...

LTM Policy Recipes

LTM Policy is the powerful and performant replacement to the HTTP Class, and first appeared in Big IP 11.4.0.   This is intended to be a short article showing some practical recipes using LTM Policy.  Please also check out another article with a more complete overview of LTM Policy. While there are iRules which can be used to address each of the following scenarios, LTM Policy...

F5 Programmability – now in new GitHub flavor!

In a year of many firsts I am particularly excited about this announcement. The release of the F5 Aplication Services Integration iApp on ... wait for it ... GitHub! What are iApps? For those unfamiliar with iApps, they are a means to vastly simplify the deployment of F5's application services. It should be easy to improve the performance, availability, and security of your...

Recent Questions and Answers