Learn F5 Technologies, Get Answers & Share Community Solutions Join DevCentral

Dynamic network routing protocols, like BGP, allows Internet traffic to go from point A to B. Using iControl REST we can create our own dynamic protocol to route HTTP requests from point 1 to 2.
#chefconf #f5 Chef turns infrastructure into code. It also gives the casual blog writer a terrible temptation to descend into pun-filled drivel. Which would be a shame as the ability to automate and operationalize our infrastructure has never...
Scalability is only one of the factors that determine availability. Security and performance play a critical role in achieving the application availability demanded by business and customers alike. Whether the goal is to achieve higher levels or...
You’ve heard of the Internet of Things (or Internet of Everything) by now, I’m sure. It’s things like your fridge telling you when you’ve run out of eggs; your shoes telling you how far you’ve travelled; your car keeping you up to date on local...
Adapted from What’s new in 2015: consumer hyperawareness, public services going digital, and a shift in the way we view clouds. 雲端重心從促進採納轉向優化   這幾年來,IT產業積極將他們的技術轉移到雲端 - 取代或者複製既有的實體資料中心到雲端。然而,大家對於效率方面並沒有多大的重視,導致一些企業的營運成本甚至超過他們試圖免除的投資成本。 ...
I've been travelling recently. To places and fields that have limited to no mobile connectivity and this can be a challenge when a challenge arises. Immediately following Mobile World Congress in Barcelona earlier this month, my family...
Adapted from What’s new in 2015: consumer hyperawareness, public services going digital, and a shift in the way we view clouds. 公眾隱私門檻的降低,促成更完整的線上量身定製服務   人們似乎對於提供過多資訊給政府感到遲疑,然而社交網路的爆炸性成長已讓人們對於分享多樣化的個人資訊感到較為自在。 ...
Jason continues the series on Global Traffic Manager load balancing algorithms with a transition from static to dynamic load balancing algorithms. In this video, Jason covers the LDNS-based algorithms: hops, completion rate, and round trip time. ...
Managing Thousands of Apps
article
Managing Thousands of Apps As enterprises move toward both public and private cloud models, they dramatically shorten the time for an internal application owner to receive new infrastructure they request.  Typical enterprises often see...
So HTTP/2 is official. That means all the talking is (finally) done and after 16 years of waiting, we've got ourselves a new lingua franca of the web. Okay, maybe that's pushing it, but we do have a new standard to move to that offers...
Do you love security?  Are you simultaneously fascinated and petrified by the damage inflicted by a single DDoS attack?  Understandably, you want to learn more about DDoS defense solutions.  Well, you came to the right place! ...
Adapted from What’s new in 2015: consumer hyperawareness, public services going digital, and a shift in the way we view clouds. ...
One of the funny things about infrastructure moving toward a mix of hardware and software (virtual or traditional) is that the issues that plague software come with it. Oh, maybe not right away, but eventually they crawl out of the deep recesse...
Jason follows up John's transitional video from wideIP to pool load balancing with coverage on the static load balancing algorithms available at the pool level in F5 BIG-IP Global Traffic Manager. The algorithms covered are: Return to DNS, Drop Packet, None, Fallback IP, Static Persist
F5 Networks arbetar med den innovativa telekom- och internetleverantören Joors för att tillhandahålla nya affärsmodeller och tjänster på tillväxtmarknader. Joors har tillkännagett att de ingått ett...
F5 Networks arbetar med den innovativa telekom- och internetleverantören Joors för att tillhandahålla nya affärsmodeller och tjänster på tillväxtmarknader. Joors har tillkännagett att de ingått ett...
Barcelona is een geweldige stad, maar als er 100.000 mensen op het Mobile World Congress afkomen, wordt het een interessante plek voor criminelen. Een beetje ervaren reiziger is alert op zakenrollers of ander schorriemorrie, blijft weg uit...
Security is one the more prominent of the application service categories, likely due to its high profile impact. After all, if security fails, we all hear about it. The entire Internet. Forever. So when one conducts a survey on the state o...
Moving to the Cloud sounds simple enough, but as you start it becomes clear that this is a major change. There are many questions that must be answered. How will I move and orchestrate hundreds of applications? Which applications should go first?...
Adapted from Solving security and performance challenges of cloud and SaaS applications in 2015 and F5 Predictions 2015 Master Point 3 – Not all clouds are created equal. ...
Are you thinking of migrating to VMware Horizon from a competitive offering such as Citrix? Looking for ways to integrate your existing Citrix environment with VMware Horizon so everything appears in one easy place or with one simple interface?...
You deployed an app. Nothing has changed in three days, but it suddenly crashes. Why? Memory leak. You deployed an app. Nothing has changed in three weeks, but it suddenly stops working. Why? A database query came back empty and the web...
RSA is not just a public-key cryptosystem, it’s also the premier security conference in the world.  Let’s face it…Rivest, Shamir, and Adleman know how to take a great thing and expand it into a really great thing!  The RSA Conference ...
“Funny … but really, what are the names you’re going to market with?” “I’m not presenting these to my customer. They’re too simple.” And that’s when I knew we’d gotten it right. After all, the objective for licensing is to make it simple...
Toopher is a 2 Factor Authentication provider (https://www.toopher.com/) that can be configured to work with the F5 Access Policy Manager for authenticating users.  Please visit the Toopher website to find out more information about all the...