Learn F5 Technologies, Get Answers & Share Community Solutions Join DevCentral


Entries for January 2009

articleus January 30, 2009 by Peter Silva
Woo-hoo, I made it to double digits on the leader board! Can you see the confetti and marching band going by ?  Sure, Lori may do close to 11 a week but I’m starting to contribute a lot more.  Back when I entered my first blog, I was ripe with excitement and ready to school the world with insightful, topical, and comment-able entries.  I launched my blogging tool and stared as the cursor kept blinking waiting for that magical inspiration.  If you do any amount of writing, no matter what the vehi...
articleus January 30, 2009 by Don MacVittie
The following is an actual IM conversation with a friend. The name has been changed to protect the guilty, but this person had many, many original printed works on his computer. [12:44] friend: GGGGGGGGUAAAAAAAAAAHHHHHHHHHHHAGHAGHAGHHHHHHAAAAAAAAAAGH[12:45] dmacvittie1: Feel better? Crappy day, so if it works, I'll try it ;-).[12:46] friend: HARD[12:46] friend: DRIVE[12:46] friend: ON[12:46] friend: FIRE[12:46] friend: FIRE DON[12:46] friend: FIRE[12:46] friend: FLAMES[12:46] friend: BURNING MY...
What could you do with your code in 20 Lines or Less? That's the question I ask (almost) every week, and every week I go looking to find cool new examples that show just how flexible and powerful iRules can be without getting in over your head. For this week's 20 Lines or Less I thought I might bring you some iRules that are fresh off the presses. I've been digging through the iRules forums today, trying to keep up with this outstanding community and their many innovations, concepts and questio...
The components that make up the BIG-IP Global Traffic Manager can be divided into two categories: logical and physical components.  Logical Components are abstractions of network resources, such as virtual servers.  Physical components, on the other hand, have a direct correlation with one or more physical entities on the network.  In this article, I will disucss Data Centers (one of the physical network components in the Global Traffic Manager) and illustrate how to programmatica...
articleus January 29, 2009 by Don MacVittie
So we have a pretty good relationship with Gartner overall, thanks to the efforts of Mel, our wonderful AR person. But just as when I was in the enterprise, they sometimes make me shake my head in wonder. Yesterday they pronounced that multi-core was outstripping the ability of software to keep up, and developers were going to great lengths to try and keep up. Huh. Wonder where we've heard that before... My issue isn't that we came to the same conclusions and they're months behind me, not a prob...
articleus January 29, 2009 by Dan Matte
We came in at #12 on the list.  It's the first time that F5 has made an appearance on this list so that's pretty neat. While I was surfing around the Forbes site, I also came across a funny thing that they track - a list of the wealthiest fictional characters called the Forbes Fictional 15. [Update] And here's the article on F5 that goes along with the list.
Yesterday I was privileged to co-host a webinar with WhiteHat Security's Jeremiah Grossman on preventing SQL injection and Cross-Site scripting using a technique called "virtual patching". While I was familiar with F5's partnership with WhiteHat and our integrated solution, I wasn't familiar with the term. Virtual patching should put an end to the endless religious warring that goes on between the secure coding and web application firewall camps whenever the topic of web application security is ...
articleus January 29, 2009 by Peter Silva
Will 2009 be the year where 'Encryption Everywhere' is a necessity? If you noticed, many of the recent breaches, like TJX and Heartland, have happened on the internal, private network. Scammers were able to get to the private network and watch as sensitive info flew by in clear text. Certainly, there are many technologies that should help in keeping those undesirables off the internal network, if configured properly. But if they do make it in, one easy way to thwart that front-row seat is to enc...
We've been talking a lot about the benefits of Infrastructure 2.0, or Dynamic Infrastructure, a lot about why it's necessary, and what's required to make it all work. But we've never really laid out what it is, and that's beginning to lead to some misconceptions. As Daryl Plummer of Gartner pointed out recently, the definition of cloud computing is still, well, cloudy. Multiple experts can't agree on the definition, and the same is quickly becoming true of dynamic infrastructure. That's no sur...
articlenewstechtip January 27, 2009 by Jason Rahm
Previously, we covered the Extended Congestion Notification and Limited Transmit Recovery options in the LTM TCP profile.  This week, we'll conclude the series with a look at several of the remaining options. Introduction The LTM TCP profile has over thirty settings that can be manipulated to enhance the experience between client and server.  Because the TCP profile is applied to the virtual server, the flexibility exists to customize the stack (in both client & server direct...
Page 1 of 8First   Previous   [1]  2  3  4  5  6  7  8  Next   Last