Learn F5 Technologies, Get Answers & Share Community Solutions Join DevCentral

DevOps 101 - Integration
article
In my previous articles on the history of DevOps, I’ve outlined the following pillars of the DevOps methodology Management Integration Communication and information sharing Collaboration Automation Measurement The Second Pillar The second pillar...
If you work in IT, and you haven’t been living under a rock, then you have likely heard of Amazon Web Services (AWS).  There has been a substantial increase in the maturity and stability...
In this edition of WhiteBoard Wednesday, John explores the space of BIG-IP Profiles. What are they? Why do you need them? Do you know? Watch the video and find out for yourself...then, by all means, get out there and start creating some custom profiles!
I’ve seen statistics that claim between 40% and 60% of all sites on the Internet use encryption to protect their web application traffic.  Regardless of the true number (which changes on a daily basis), it’s fair to say that encryption is a...
  Another day, another headline about government hacking of sensitive data. This time it’s allegations that Chinese authorities had hacked the Office of Personnel Management network, accessing information belonging to millions of US federal...
A recent report (June 2015) revealed a web browser's problem with a large favicon [1]: The browser crashes when the size of a favicon is larger than what it expects. A favicon is a small image, say 16 x 16 pixels, that is...
In recent weeks, the award bells have been ringing for F5 in Asia Pacific. We’ve bagged not one, but four awards, showing a clear testament to our continued market and technological leadership. F5 has always been committed to delivering a holistic...
Please find the English language post, by Lori MacVittie, from which this was adapted here. 本番環境へのアプリケーションの展開は最初のステップにすぎません。優れたユーザ...
Node.js is an open source runtime environment for server-side and network based applications.  At it's core, Node.js uses the Google V8 JavaScript engine to execute client code and a large portion of the core basic modules are written in...
One of the charter responsibilities of DevOps (because it's a charter responsibility of ops) is measuring and monitoring applications once they're in production. That means both performance and availability. Which means a lot more th...
The ability to create a class and then extend it is the basis for object-oriented programming.  Inheritance in object-oriented programming is when an object, or class, is derived from another object using the same core implementation.  ...
LTM Policy is the powerful and performant replacement to the HTTP Class, and first appeared in Big IP 11.4.0.   This is intended to be a short article showing some practical recipes using LTM Policy.  Please also check out another...
In a year of many firsts, I am particularly excited about this one. The release of the F5 Aplication Services Integration iApp on GitHub. For those unfamiliar with iApps, F5 has always been focussed on simplification. It should be easy to improve...
During the last couple of weeks, Nathan Jester, Elman Reyes, Julia Karpin and Pavel Asinovsky got together to investigate the new “Slave” banking Trojan. According to their research, the early version of the Slave performed IBAN swapping in two...
Jason dives into the life of a packet/flow through the BIG-IP in this latest installment of Whiteboard Wednesday. Drop any questions or comments below and we'll address or clarify as necessary.
#LTEWS #TCPOptimization Someone recently asked me about TCP optimization and what it really was and why it was important for today’s networks. I have previously written a blog post about how TCP optimization can improve the delivery of content to...
Please find the English language post from which this was adapted here. IoT 애플리케이션들이 다양한 형태와 크기로 생겨나고 있는 상황에서 고객과 비즈니스를 모두 지원하기 위한 가장 중요한 요소로 가용성이 손꼽히고 있다. 가장 기본적인 고가용성 아키텍처는 전형적인 3단형 디자인이다. 우선 네트워크 DMZ 내의 복수의 ADC 장비들이 서버의 즉각적인 연결을 차단한다. 이후 고객들의...
#LTEWS #Security I was at a roundtable discussion recently talking about security in the mobile carrier networks. During the discussion the recently announced SS7 signaling hack was introduced as an example. I would propose that this vulnerability...
iControl REST. It’s iControl SOAP’s baby brother, introduced back in TMOS version 11.4 as an early access feature but was released fully in version 11.5. Several articles on basic usage have been written on iControl REST (see the resources at the...
My daughter has been asking for a puppy for over a year. A Chow puppy. I've had Chow Chows my entire life and our current Chow, Max, is a big 72lb cinnamon boy. He's also the medical alert dog for our daughter. Max, a rescue, is about 5...
I recently wrote about the findings from our survey of the security community, conducted at Infosecurity. We revealed the changing challenges for IT and security teams and how they are prioritising innovation and threats. Alongside these results,...
To be fair, let me say that I’m a St Louis Cardinals baseball fan.  I grew up a Cardinals fan, and I always love to go see the Redbirds play.  Unfortunately, the Cardinals are now under federal investigation for an alleged computer...
Where you decide to shard for scalability impacts the complexity of the entire architecture. Sharding has become a popular means of achieving scalability in application architectures in which read/write data separation is not only possible, but...
Tuesday June 16th marked the first of a kind with representatives of both Cisco and F5 jointly participating in a Live Developer Q&A – how far we’ve come since the days of rivalry to now, working as closely aligned allies. [insert pic] ...
Slave is a financial malware written in visual basic. It was first seen around March 2015 and has undergone a significant evolution. Slave conducts its attack by hooking the Internet browser functions and manipulating their code for various...