Learn F5 Technologies, Get Answers & Share Community Solutions Join DevCentral


Entries for 'Peter Silva'

articleaccesssecurityf5 April 15, 2014 by Peter Silva
This past weekend, like many of you, I started getting the blood curdling password resets from a bunch of OpenSSL affected sites. I also got a few emails from sites indicating that I had nothing to worry about. Bad news, good news. Probably the biggest security story thus far for 2014 is Heartbleed, the OpenSSL vulnerability which potentially allows attackers to extract 64 kilobyte batches of memory at random without being noticed and leaving no trace. Sounds like the perfect crime. It also got...
Hey DNS - Find Me that Thing! There's a new craze occurring in homes, highways, workplaces and everywhere imaginable - the Internet of Things or as I like to call it, The Internet of Nouns. Sensors, thermostats, kitchen appliances, toilets and almost every person, place or thing will have a chip capable of connecting to the internet. And if you want to identify and find those things with recognizable words instead of a 128-bit IP address, you're going to need DNS. DNS translates th...
All the outtakes, mistakes and behind the scenes during our Interop 2014 video shoot. Always fun. Enjoy! ps Related Interop 2014: Find F5 Pop Up Edition Interop 2014: F5 in the NOC (feat Bocchino & Wojcik) Interop 2014: F5 Synthesis Whiteboard (feat Wagner) Interop 2014: F5 Interop NOC Stats Interop 2014: That’s a Wrap F5 executive Sangeeta Anand on Cisco ACI F5 at Interop F5 YouTube Channel   Technorati Tags: f5,interop,video,bloopers,outtakes,fun,humor,silva Connect wi...
I wrap it up from Interop 2014. Special thanks to Ken Bocchino and Joe Wojcik for some Interop NOC goodness, thanks to Tim Wagner for some Synthesis love and thanks to Natasha, Greg, Paul and Jay for their camera work. And of course, thanks to you for watching. Reporting from Mandalay Bay Convention Center in Vegas.   ps Related Interop 2014: Find F5 Pop Up Edition Interop 2014: F5 in the NOC (feat Bocchino & Wojcik) Interop 2014: F5 Synthesis Whiteboard (feat Wagner) Interop 2014...
We visit with Ken Bocchino and Joe Wojcik of F5 Professional Services again to get some insight on the Interop.net network stats for the week. We talk DNS (15 million DNS lookups, half via BIG-IP recursion), SPDY and IPv6 along with a little insight on some of the overall traffic and the attack mitigation that occurred for the World’s Largest Temporary Network. ps Related Interop 2014: Find F5 Pop Up Edition Interop 2014: F5 in the NOC (feat Bocchino & Wojcik) Inter...
Synthesis in the Wild! Tim Wagner, Manager, Field Systems Engineering, shows how he whiteboards the F5 Synthesis story to help organizations understand the value of SDAS – Software Defined Application Services. He discusses SDN and how that works within a Layer 2/3 environment and the power of SDAS for Layers 4-7 with its ability to apply important services to the applications that need it…all on a single platform. Interesting discussion on how marketing visions translate into real customer solu...
Principal Services Architect, Ken Bocchino and F5 Consultant Joe Wojcik visit to show and tell us how F5 is integral to the Interop.net infrastructure – the world’s largest temporary network. Ken gives a brief whiteboard of the architecture, Joe talks about how we’ve enabled SPDY to help accelerate content to attendee’s browsers and we visit the equipment rack to hear the hum of the F5 2400s. ps Related Interop 2014: Find F5 Pop Up Edition F5 at Interop ...
In a little twist for April 1, I welcome you to Interop 2014 with a fun Pop Up version of how to find F5 Booth 2227. Reporting from Mandalay Bay in Vegas! ps Related F5 YouTube Channel F5 at Interop Technorati Tags: f5,Interop,vegas,synthesis,security,silva,video,findf5,pop-up   Connect with Peter: Connect with F5:         
A recent joint study from IDC and the National University of Singapore (NUS) predicts that companies around the globe will spend around $491 billion in 2014 for fixes and recovery from data breaches and malware. The sponsor, Microsoft, also noted that pirated software tweaked with intent is a common method of getting inside. Consumers will likely spend $25 billion as a result of those security threats. $491 billion is a lot of change and in the spirit of Mobile Threats Rise 261% in Perspective, ...
I see and read a lot of IT articles almost demanding that organizations must do certain things to ensure that some piece of their infrastructure is secure, highly available, fault tolerant, agile, flexible, scalable, recoverable, cloud'able, whatever the silo needs or face the dire circumstances. I'm guilty of it too over the years. Organizations must have a WAF for PCI compliance or Remote employees need to have an encrypted tunnels to the corporate network or any other command pertaining to th...
Page 1 of 56First   Previous   [1]  2  3  4  5  6  7  8  9  10  Next   Last