Learn F5 Technologies, Get Answers & Share Community Solutions Join DevCentral

Guest blog post by Misbah Mahmoodi, Senior Product Marketing Manager, F5 Networks As a mobile operator, you’ve spent or are about to spend a considerable amount of time and money on upgrading your network to 4G LTE and building out cell towers to...
There's a common movie and television trope (known as the Third Wheel) that revolves around a guy, his girlfriend and either his or her "bestie". You know it - it's the bestie hates girlfriend or boyfriend trope, and it's a...
When Indian Prime Minister Narendra Modi took office, his government made its priorities clear: ““If Atal Bihari Vajpayee government was known for national highways, Narendra Modi government will be known for broadband highway,” his Communications...
One of the key success criteria for NFV will be the Orchestration/Management component.  While ETSI/NFV-ISG standards group has published clear guidelines/requirements specification on Management and Orchestration (MANO) for NFV, there is no...
Probably the biggest IT security threat to F5 Networks is typing this blog, and probably the biggest threat to your organization is reading it. OK, I don’t mean me or you, as such. We are, after all, IT professionals and wouldn’t dream of clicking...
The recent announcements that web browsers will be removing plugin support means that customers will no longer be able to provide Network Access resources to their end users via the APM web top.  Instead customers will require their end users...
This blog post was written by Peter Nas, Senior Solution Architect, F5  In a discussion around the added-value of a Diameter Routing Agent (DRA) in a VoLTE deployment, I was asked the following questions and would like to share my response: ...
Madness. It's an aptly named bot, as it's likely to evoke just that reaction in those who find it lurking in their systems or at whom its sets it sights. A disturbing trend illustrated by the focus of our latest threat analysis is the...
이 글은 아시아태평양지역에서의 클라우드에 대하여 살펴보는 시리즈의 두 번째 글이다. 이 글에서는 지역 내 클라우드의 현주소, 클라우드가 어떻게 사용되고 있는지, 무엇이 클라우드가 더 확산되는 것을 막고 있는지, 그리고 클라우드가 어떻게 혁신을 위해 사용될 수 있는지에 대해 알아볼 것이며, 또한 FSI (금융 및 증권업계) 에서의 클라우드에 대해서도 점검해 보겠다. 시리즈의 첫 번째 글에서는 아시아태평양지역 내 클라우드의 현주소와 확산...
In this episode of Whiteboard Wednesday, John recaps round robin and ratio and then discusses the global availability load balancing algorithms. Resources About Global Server Load Balancing (Manual) GTM Global Availability Load Balancing to Down...
The articles on DevCentral have been absolutely fantastic as of late.  Understandably, readers can expect to find great F5-related technical content here at DevCentral, but several industry-relevant pieces are also found in this...
As most of the readers may know, NFV is slowly but surely happening!   While there are a handful of carriers who actually have deployed NFV commercially, most are conducting Proof of Concept (POC) trials – some are validating NFV with limited...
Please find the English language post from which this was adapted here. Fokuslah ke Applikasi, Bukan ke Perangkatnya! Kini, perangkat mobile seperti smartphone dan tablet sudah dapat membantu karyawan perusahaan untuk bekerja. Dengan modal...
I give a preview of Mobile World Congress 2015. #MWC15 is next week, March 2-5 in Barcelona, Spain at the Fira Gran Via. We got some fun stuff for next week, including a very special guest, and some of the topics we’re covering include IoT, NFV,...
Fusker thwarting using the LineRate Node.js datapath scripting engine Fuskering is so fun to say, I couldn't resisting writing article about it. But, aside from just raising eyebrows when you use the term, fuskering is a real problem fo...
Dr. Mallik Tatipamula, VP, Service Provider and Cloud Solutions, F5 introduces one of the main themes that F5 will be talking about on 2-5 march at Mobile World Congress 2015. Addressing Security Challenges with LTE from F5 Networks You’ve...
​Ahead of tomorrow's IDC CIO summit in Dubai, F5 Networks has released new survey findings highlighting UAE IT decision-makers' views on DDoS attacks. Out of 102 respondents from companies with at least 500 employees, 55% said they...
Is the Security Skills Shortage Real?
article
I think the Security Shortage is real. It's not just my opinion, it's shared by nearly every CISO I've ever talked with. But the young guys can't find a job. How do we bridge this gap? Some suggestions to move forward.
Immutable infrastructure, which I think is more appropriately called disposable infrastructure, has been enjoying a reinvigorated life with the success of Dockers and containerization over the past year. Too, DevOps has played a role in...
There's a lot of things people know about F5 BIG-IP and a lot of things people think they know about BIG-IP and some things people don't know at all about BIG-IP*. So I thought it'd be a good idea to talk about some of the things yo...
In some cases, your LineRate script needs to gather necessary information before processing any incoming HTTP request. It could be user profiles such as flags representing customer categories (e.g., paid vs. free, or test vs. live), GeoIP...
DNS will become even more important as additional sensors, monitors, actuators and other 'things' connect to the internet. It helps those devices like refrigerators and automobiles get their updates and helps us people find those things in...
Pada tahun 2014 ini telah terjadi banyak hal menarik yang terjadi di dunia, khususnya dari sisi IT. Contohnya, kita telah melihat beberapa transisi dari suatu hal yang baru menjadi hal yang mainstream; seperti contoh big data yang awalnya masih...
At F5 Networks we have seen a good deal of confusion over these two CVEs ever since they appeared late last year. As this is ongoing, we felt it needs to be addressed. The confusion is totally understandable; hopefully this will help. There are...
At the end of the year, WhiteHat Security posted an interesting blog titled, "The Parabola of Reported WebAppSec Vulnerabilities" in which a downward trend in web application vulnerabilities (as collected by the folks at Risk Base...