Learn F5 Technologies, Get Answers & Share Community Solutions Join DevCentral

In recent weeks, the award bells have been ringing for F5 in Asia Pacific. We’ve bagged not one, but four awards, showing a clear testament to our continued market and technological leadership. F5 has always been committed to delivering a holistic...
Please find the English language post, by Lori MacVittie, from which this was adapted here. 本番環境へのアプリケーションの展開は最初のステップにすぎません。優れたユーザ...
Node.js is an open source runtime environment for server-side and network based applications.  At it's core, Node.js uses the Google V8 JavaScript engine to execute client code and a large portion of the core basic modules are written in...
One of the charter responsibilities of DevOps (because it's a charter responsibility of ops) is measuring and monitoring applications once they're in production. That means both performance and availability. Which means a lot more th...
The ability to create a class and then extend it is the basis for object-oriented programming.  Inheritance in object-oriented programming is when an object, or class, is derived from another object using the same core implementation.  ...
LTM Policy is the powerful and performant replacement to the HTTP Class, and first appeared in Big IP 11.4.0.   This is intended to be a short article showing some practical recipes using LTM Policy.  Please also check out another...
In a year of many firsts, I am particularly excited about this one. The release of the F5 Aplication Services Integration iApp on GitHub. For those unfamiliar with iApps, F5 has always been focussed on simplification. It should be easy to improve...
During the last couple of weeks, Nathan Jester, Elman Reyes, Julia Karpin and Pavel Asinovsky got together to investigate the new “Slave” banking Trojan. According to their research, the early version of the Slave performed IBAN swapping in two...
Jason dives into the life of a packet/flow through the BIG-IP in this latest installment of Whiteboard Wednesday. Drop any questions or comments below and we'll address or clarify as necessary.
#LTEWS #TCPOptimization Someone recently asked me about TCP optimization and what it really was and why it was important for today’s networks. I have previously written a blog post about how TCP optimization can improve the delivery of content to...
Please find the English language post from which this was adapted here. IoT 애플리케이션들이 다양한 형태와 크기로 생겨나고 있는 상황에서 고객과 비즈니스를 모두 지원하기 위한 가장 중요한 요소로 가용성이 손꼽히고 있다. 가장 기본적인 고가용성 아키텍처는 전형적인 3단형 디자인이다. 우선 네트워크 DMZ 내의 복수의 ADC 장비들이 서버의 즉각적인 연결을 차단한다. 이후 고객들의...
#LTEWS #Security I was at a roundtable discussion recently talking about security in the mobile carrier networks. During the discussion the recently announced SS7 signaling hack was introduced as an example. I would propose that this vulnerability...
iControl REST. It’s iControl SOAP’s baby brother, introduced back in TMOS version 11.4 as an early access feature but was released fully in version 11.5. Several articles on basic usage have been written on iControl REST (see the resources at the...
My daughter has been asking for a puppy for over a year. A Chow puppy. I've had Chow Chows my entire life and our current Chow, Max, is a big 72lb cinnamon boy. He's also the medical alert dog for our daughter. Max, a rescue, is about 5...
I recently wrote about the findings from our survey of the security community, conducted at Infosecurity. We revealed the changing challenges for IT and security teams and how they are prioritising innovation and threats. Alongside these results,...
To be fair, let me say that I’m a St Louis Cardinals baseball fan.  I grew up a Cardinals fan, and I always love to go see the Redbirds play.  Unfortunately, the Cardinals are now under federal investigation for an alleged computer...
Where you decide to shard for scalability impacts the complexity of the entire architecture. Sharding has become a popular means of achieving scalability in application architectures in which read/write data separation is not only possible, but...
Tuesday June 16th marked the first of a kind with representatives of both Cisco and F5 jointly participating in a Live Developer Q&A – how far we’ve come since the days of rivalry to now, working as closely aligned allies. [insert pic] ...
Slave is a financial malware written in visual basic. It was first seen around March 2015 and has undergone a significant evolution. Slave conducts its attack by hooking the Internet browser functions and manipulating their code for various...
モノの数が増え続けるにつれて、モノとアプリの間の通信の目的を理解し、その目的に基づいて機能することがより重要になります。 マイクロサービスの優れた点の1つが、機能的なアクションを拡張性のあるドメインにセグメント化できるという点です。 ログイン、ブラウジング、および決済処理は、それぞれ要求に応じて拡張できる独立した機能ドメインです。決済処理が同様に要求されると思っていても、ブラウジングほど利用される可能性は高くないため、クラウドが出現したことで、利用されていない計算リソースで多くの金額を無...
iControl REST. It’s iControl SOAP’s baby brother, introduced back in TMOS version 11.4 as an early access feature but was released fully in version 11.5.  Several articles on basic usage have been written on iControl REST (see the resources...
Over the last couple months, in between some video coverage for events, I've been writing a series of IoT stories. From the basic What are These "Things”? and IoT Influence on Society to the descriptive IoT Effect on Applications and the...
Using an iRule and edns-client-subnet (ECS) we can improve the accuracy of F5 GTM’s topology load balancing.
The day when the lower-case “e” was introduced to define the online nature of a transaction now ceases to have any meaning. In the era of application everything and the highly mobile generation, digital transactions are becoming the norm in most...
Last week we announced the findings of a survey we conducted at Infosecurity in London at the start of June. The results revealed that the security community is running the risk of not protecting itself effectively against DDoS threats and would...