Learn F5 Technologies, Get Answers & Share Community Solutions Join DevCentral


Entries for January 2012

Every once in a while, as the number of people following me grows (thank you, each and every one), I like to revisit something that is fundamental to the high-tech industry but is often overlooked or not given the attention it deserves. This is one of those times, and the many-faceted nature of any application infrastructure is the topic. While much has changed since I last touched on this topic, much has not, leaving us in an odd inflection point. When referring to movies that involve a lot of ...
articlebig-ipnewstechtip January 31, 2012 by Colin Walker
Version 11 of BIG-IP brought with it many enhancements and new features ranging across the entire product. iRules improvements and features were among the cooler things changed, in the opinion of this avid iRuler. Between sideband connections, iFiles and improvements of already existing functionality, it's hard to imagine there is more yet to discuss in v11 iRules goodness, but there is. iStats were introduced in v11, and are worth talking about, as they can dramatically change the way you a...
articlesecurityus January 31, 2012 by Jason Rahm
It’s a crazy world out there. I ran (well, by “ran” I mean jogged slowly enough to pass the old ladies on the track) this morning at the YMCA, lifted weights for a little while, and then hit the elliptical for 20 minutes before heading home. My gym’s ellipticals have the Nike+ package where you can store your workouts on your iPhone/iPod, and without thinking I jacked in. Approximately 38 ms later (my internal meter is not calibrated)  I facepalmed and disconnected my iPhone in shame. Have I lea...
The longer an application remains vulnerable, the more likely it is to be compromised. Protecting web applications is an around-the-clock job. Almost anything that is connected to the Internet is a target these days, and organizations are scrambling to keep their web properties available and secure. The ramifications of a breach or downtime can be severe: brand reputation, the ability to meet regulatory requirements, and revenue are all on the line.  A 2011 survey conducted by Merrill Research ...
articlegermany January 31, 2012 by Claudia Kraus
Wir alle erhalten täglich neue Einladungen zu Veranstaltungen, Meetings und Events und es ist schwer zu entscheiden, wo man die benötigten Informationen erhält. Wo ist mein Return on Investment, wenn ich zur Veranstaltung „x“ gehe oder erhalte ich diese Information genauso im Internet? Viele Menschen möchten gar nicht auf Messen gehen und von Hostessen und engagierten Vertriebsmitarbeitern auf den Ständen überfallen werden und mit Informationen versorgt werden, die sie eigentlich gar nicht brau...
articlemicrosoftpartnergermany January 31, 2012 by Claudia Kraus
Hiermit lade ich Sie zu unserem monatlichen Webinar am Freitag, 24.02.2012 um 09:00 Uhr ein. In dem 30-minütigen Webinar erfahren Sie, wie Ihre Microsoft Exchange 2010 Umgebungen optimiert werden können. Microsoft empfiehlt für MS Exchange 2010 Hardware Load Balancer einzusetzen. In diesem Webinar werden Möglichkeiten aufgezeigt, wie mit F5 Lösungen mittels Advanced Application Delivery weit über klassisches Load Balancing hinaus Microsoft Exchange 2010 Umgebungen optimiert werden können. Sie...
#fasterapp #ccevent While web applications aren’t sensitive to jitter, business processes are. One of the benefits of web applications is that they are generally transported via TCP, which is a connection-oriented protocol designed to assure delivery. TCP has a variety of native mechanisms through which delivery issues can be addressed – from window sizes to selective acks to idle time specification to ramp up parameters. All these technical knobs and buttons serve as a way for operators and...
#adcfw #infosec F5 is changing the game on security by unifying it at the application and service delivery layer. Over the past few years we’ve seen firewalls fail repeatedly. We’ve seen business disrupted, security thwarted, and reputations damaged by the failure of the very devices meant to prevent such catastrophes from happening. These failures have been caused by a change in tactics from invaders who seek no longer to find away through or over the walls, but who simply batter it down inst...
By now, everyone even vaguely familiar with information security knows the military maxim of blitzkrieg – burst through the hardened defense at a single point and then rush pell-mell to the rear where the soft underbelly of any static army lies. It is a good military strategy, provided you have the resources to break through the defenses and follow up with a rapid advance into the rear areas. While there are variants of this plan, and a lot of discussion about how/when it is strategically worth ...
When I talk on the phone, I’ve always used my left ear to listen.  Listening in the right ear just doesn’t sound right.  This might be due to being right handed, doing the shoulder hold to take notes when needed.  As corded turned to cordless and mobile along with the hands-free ear-plugs, that plug went into the left ear whenever I was on the phone.  Recently, I’ve been listening to some music while walking the dog and have run into an issue.  The stereo ear plugs do not fit, sit or stay in my ...
Page 1 of 6First   Previous   [1]  2  3  4  5  6  Next   Last