Learn F5 Technologies, Get Answers & Share Community Solutions Join DevCentral


Entries for April 2012

#virtualization load balancing in a virtualized world is the same as it ever was, but different. The introduction of virtualization and cloud computing to data centers has been heralded as “transformational” and “disruptive” and “game changing.” From an operational IT perspective, that’s absolutely true. But like transformational innovation in other industries, such disruption is often not in how the core solution is leveraged or used, but how it impacts operations and the broader ecosyst...
#cloud #microsoft #iam “An application is only as reliable as its least reliable component” It’s unlikely there’s anyone in IT today that doesn’t understand the role of load balancing to scale. Whether cloud or not, load balancing is the key mechanism through which load is distributed to ensure horizontal scale of applications. It’s also unlikely there’s anyone in IT that doesn’t understand the relationship between load balancing and high-availability (reliability). High-Availability (HA) ar...
articleirulesdevgermany April 26, 2012 by Claudia Kraus
Hiermit lade ich Sie zu unserem monatlichen Webinar am Freitag, 25.05.2012 um 09:00 Uhr ein. In diesem Webinar zeigen wir Ihnen die technischen Finessen wichtiger neuer Funktionen auf Basis hochflexibler Regelwerke mittels iRules. Eines der stärksten Tools, die F5 im TMOS integriert hat, ist die flexibel einsetzbare Scriptsprache iRules. Für die meisten Legacy Anwendungen lassen sich natürlich in die GUI integrierte Templates und Wizards verwenden, aber individuelle Problemstellungen können auc...
articleaccessbyodgermany April 26, 2012 by max
BYOD – Ein Begriff mit vielen Namen: „Bring Your Own Danger“, „Bring Your Own Disaster“ oder wie es die meisten nennen „Bring Your Own Device“, aber egal wie es genannt wird, das Thema scheint in aller Munde zu sein. Früher war es undenkbar, seine eigenen mobilen Geräte innerhalb des Firmennetzes zu nutzen – heute ist es einer der heißesten Trends oder zumindest ein in der IT-Branche heiß diskutiertes Thema. Der Gedanke, sein persönliches Smartphone auch für die Arbeit zu verwenden, kam wahrsche...
According to the PCI SSC, there are 12 PCI DSS requirements that satisfy a variety of security goals.  Areas of focus include building and maintaining a secure network, protecting stored cardholder data, maintaining a vulnerability management program, implementing strong access control measures, regularly monitoring and testing networks, and maintaining information security policies.  The essential framework of the PCI DSS encompasses assessment, remediation, and reporting.  We’re exploring how ...
#ado #fasterapp #stirling Carnegie Mellon testing of ADO solutions answers age old question: less filling or tastes great? You probably recall years ago the old “Tastes Great vs Less Filling” advertisements. The ones that always concluded in the end that the beer in question was not one or the other, but both. Whenever there are two ostensibly competing technologies attempting to solve the same problem, we run into the same old style argument. This time, in the SPDY versus Web Acceleration...
For my regular readers: Sorry about the long break, thought I’d start back with a hard look at a seemingly minor infrastructure elements, and the history of repeating history in IT. In the history of all things, technological and methodological improvements seem to dramatically change the rules, only in the fullness of time to fall back into the old set of rules with some adjustment for the new aspects. Military history has more of this type of “accommodation” than it has &ld...
According to the PCI SSC, there are 12 PCI DSS requirements that satisfy a variety of security goals.  Areas of focus include building and maintaining a secure network, protecting stored cardholder data, maintaining a vulnerability management program, implementing strong access control measures, regularly monitoring and testing networks, and maintaining information security policies.  The essential framework of the PCI DSS encompasses assessment, remediation, and reporting.  We’re exploring how ...
Der Trend und Boom zu immer leistungsfähigeren und universell einsetzbaren mobilen Geräten wie Smartphones und Tablets ist ungebrochen und weiterhin einer der stärksten Wachstumsmärkte. Viele Unternehmen sehen sich auch der Tatsache ausgesetzt, dass Mitarbeiter, Partner und Kunden Anwendungen nicht nur auf Standardgeräten wie PC und Laptop, sondern eben auch auf mobilen Endgeräten nutzen wollen. Teilweise geht der Trend in die Richtung es den Mitarbeitern freizustellen, welches Endgerät sie nutz...
According to the PCI SSC, there are 12 PCI DSS requirements that satisfy a variety of security goals.  Areas of focus include building and maintaining a secure network, protecting stored cardholder data, maintaining a vulnerability management program, implementing strong access control measures, regularly monitoring and testing networks, and maintaining information security policies.  The essential framework of the PCI DSS encompasses assessment, remediation, and reporting.  We’re exploring how ...
Page 1 of 5First   Previous   [1]  2  3  4  5  Next   Last