Learn F5 Technologies, Get Answers & Share Community Solutions Join DevCentral

Filter by:
  • Solution
  • Technology

Articles

Sort results

CloudFucius Combines: Security and Acceleration

CloudFucius has explored Cloud Security with AAA Important to the Cloud and Hosts in the Cloud along with wanting An Optimized Cloud.  Now he desires the sweet spot of Cloud Application Delivery combining Security and Acceleration.  Fe... Read more
0 Reviews

CloudFucius Inspects: Hosts in the Cloud

So much has been written about all the systems, infrastructure, applications, content and everything else IT related that’s making it’s way to the cloud yet I haven’t seen much discussion (or maybe I just missed it) about all the client... Read more
0 Reviews

Fast Application Access with Jonathan George - F5 at Interop

F5's Jonathan George presents Fast Application Access at Interop2010. Web access, Global delivery, cloud deployments, remote users are just some of the areas covered in this short presentation. Read more
0 Reviews

CloudFucius Ponders: High-Availability in the Cloud

According to Gartner, “By 2012, 20 percent of businesses will own no IT assets.”  While the need for hardware will not disappear completely, hardware ownership is going through a transition: Virtualization, total cost of ownership (TCO... Read more
0 Reviews

F5's BIG-IP with Oracle® Access Manager to enhance SSO and Access Control

Learn how F5's BIG-IP LTM/APM helps in conjunction with Oracle Access Manager centralizing web application authentication and authorization services, streamline access management, and reduce infrastructure costs Watch how BIG-IP APM can reduce... Read more
0 Reviews

CSRF Prevention with F5's BIG-IP ASM v10.2

Watch how BIG-IP ASM v10.2 can prevent Cross-site request forgery.  Shlomi Narkolayev demonstrates how to accomplish a CSRF attack and then shows how BIG-IP ASM stops it in it's tracks. The configuration of CSRF protection is literally... Read more
0 Reviews

Oracle Data Guard sync over the WAN with F5 BIG-IP

While at Interop 2010 this week, we shot some videos and in this one, learn how F5's WAN Optimization can enhance Oracle's Data Guard solution. I talk with Chris Akker, Solution Engineer, about the challenges of real-time database sync and... Read more
0 Reviews

CloudFucius Hollers: Read All About, F5’s On-Demand IT

Yesterday F5 announced a holistic approach to enable a common cloud architectural model—regardless of where IT resources actually reside.  Unifying Application Delivery, Access Control and Optimization to the cloud along with ongoing... Read more
0 Reviews

F5 at Interop - Ken Salchow talks about Recent Announcements

Peter Silva interviews Ken Salchow who talks about F5's recent announcements about BIG-IP LTM VE, F5's new hardware platforms, VMotion across data centers and cloud architecture. ps Read more
0 Reviews

The First American Corporation Case Study - F5 Networks

Watch how First American Corporation was able to consolidate and virtualize their infrastructure with BIG-IP LTM, GTM and FirePass SSL VPN providing them with the flexibility & speed to market their business required. From 750 machines to just... Read more
0 Reviews

F5 Long Distance VMotion Solution Demo

Watch how F5's WAN Optimization enables long distance VMotion migration between data centers over the WAN. This solution can be automated and orchestrated and preserves user sessions/active user connections allowing seamless migration. Erick... Read more
0 Reviews

CloudFucius Wonders: Can Cloud, Confidentiality and The Constitution Coexist?

This question has been puzzling a few folks of late, not just CloudFucius.  The Judicial/legal side of the internet seems to have gotten some attention lately even though courts have been trying to make sense and catch up with technology fo... Read more
0 Reviews

CloudFucius Says: AAA Important to the Cloud

While companies certainly see a business benefit to a pay-as-you-go model for computing resources, security concerns seem always to appear at the top of surveys regarding cloud computing. These concerns include authentication, authorization... Read more
0 Reviews

How Terms Have Changed over Time

Meanings and terms often change or get adjusted over time, especially with Information Technology.  While never walking 5 miles to school in two-feet of snow, I did live during an era of TV’s without remotes and vinyl record players.  ... Read more
0 Reviews

F5 BIG-IP Edge Gateway Performance Demo

Watch how F5 has solved the security plus acceleration challenge for remote users.  Demo shows how BIG-IP Edge Gateway is twice as fast as the competition at downloading a 5MB Microsoft SharePoint file.  A powerful example of... Read more
0 Reviews
0 Reviews

Catch some Zzzzzzzzzzzzz

It used to be the ‘stuck to our side’ pagers that go off at 3am telling you that a server crashed that would keep you up at night.  You’d drag yourself out of bed (or the chair at the data center that you fell asleep in), tippy-toe to th... Read more
0 Reviews

It all comes down to YOU - The User

One of my favorite Security writers, Bruce Schneier, had an interesting entry last week called Reacting to Security Vulnerabilities where he discusses the recent reports about the security flaw in the SSL protocol and how we as users should relax... Read more
0 Reviews

Virtualization is Real

I remember back-in-the-day when Virtual meant ‘almost,’ ‘simulated’ or ‘in essence’ as in, ‘I’m virtually there.’  Today, as it has made it’s way into computer terminology, it can mean actual or real things that are done over computers.&#160... Read more
0 Reviews

WARNING: Security Device Enclosed

If you aren’t using all the security tools at your disposal you’re doing it wrong. How many times have you seen an employee wave on by a customer when the “security device enclosed” in some item – be it DVD, CD, or clothing – sets off the alarm... Read more
0 Reviews

You’ve Taken That Out of Context

Hello and Welcome to the new hit Game Show: You’ve Taken that Out of Context!  Hilarity ensues in this action packed half-hour when contestants try to deliver the appropriate resources to end users depending on several factors and... Read more
0 Reviews

Vertical Scalability Cloud Computing Style

Vertical scalability used to require optimizations inside the application, at the code level. Cloud computing changes the nature of vertical scalability and, one hopes, will lead to a new model of scalability based on the capabilities of... Read more
0 Reviews

Location, Location, Location

Mobile devices may still be somewhat awkward in terms of supporting rich, web-based applications but they are leaps and bounds ahead of most infrastructure in their ability to figure out where you are. GeoLocation technologies used to be used by... Read more
0 Reviews

WILS: Network Load Balancing versus Application Load Balancing

Are you load balancing servers or applications? Network traffic or application requests? If your strategy to application availability is network-based you might need a change in direction (up the stack).   ... Read more
0 Reviews

Log Files Do Not Improve Security

Logs are for auditing, accountability, and tracking down offenders – not for providing real-time security A new law signed into effect in February 2009 requires that health care providers and organizations subject to HIPAA notify affected... Read more
0 Reviews