Learn F5 Technologies, Get Answers & Share Community Solutions Join DevCentral

Filter by:
  • Solution
  • Technology

Articles

Sort results

SPDY versus HTML5 WebSockets

#HTML5 #fasterapp #webperf #SPDY So much alike, yet so vastly a different impact on the data center … A recent post on the HTTP 2.0 War beginning garnered a very relevant question regarding WebSockets and where it fits in (what might shape up to... Read more
0 Reviews

Capacity in the Cloud: Concurrency versus Connections

#devops #cloud #ado Understanding the difference between concurrency and connections is an important step in capacity planning in public cloud environments Choosing the right size for an instance in the cloud is – by design – like choosing the... Read more
0 Reviews

Y U No Support SPDY Yet?

#fasterapp #ado #interop Mega-sites like Twitter and popular browsers are all moving to support SPDY – but there’s one small glitch in the game plan… SPDY is gaining momentum as “big” sites begin to enable support for the would-be HTTP 2.0... Read more
0 Reviews

The “All of the Above” Approach to Improving Application Performance

#ado #fasterapp #stirling Carnegie Mellon testing of ADO solutions answers age old question: less filling or tastes great? You probably recall years ago the old “Tastes Great vs Less Filling” advertisements. The ones that always concluded in... Read more
0 Reviews

Network versus Application Layer Prioritization

#fasterapp Why SPDY and similar techniques could succeed where coloring TOS bits failed Back in the day, before VoIP was common and we were all chatting over Skype, there was a very real concern about how to ensure the network could support it.... Read more
0 Reviews

20 Lines or Less #53: Security, Security & more Security

What could you do with your code in 20 Lines or Less? That's the question I ask (sometimes?) every week for the DevCentral community, and every week I go looking to find cool new examples that show just how flexible and powerful iRules can ... Read more
0 Reviews

20 Lines or Less #52: Handshakes, Dynamic IPs, and Destinations

What could you do with your code in 20 Lines or Less? That's the question I ask (sometimes?) every week for the DevCentral community, and every week I go looking to find cool new examples that show just how flexible and powerful iRules... Read more
0 Reviews

The Magic of Mobile Cloud

It’s like unicorns…and rainbows! #mobile Mark my words, the term “mobile” is the noun (or is it a verb? Depends on the context, doesn’t it?) that will replace “cloud” as the most used and abused and misapplied term in technology in the coming... Read more
0 Reviews

Infrastructure Architecture: Whitelisting with JSON and API Keys

Application delivery infrastructure can be a valuable partner in architecting solutions …. AJAX and JSON have changed the way in which we architect applications, especially with respect to their ascendancy to rule the realm of integration, i.e.... Read more
0 Reviews

F5 Friday: Zero-Day Apache Exploit? Zero-Problem

#infosec A recently discovered 0-day Apache exploit is no problem for BIG-IP. Here’s a couple of different options using F5 solutions to secure your site against it. It’s called “Apache Killer” and it’s yet another example of exploiting not a... Read more
0 Reviews

F5 Friday: If Only the Odds of a Security Breach were the Same as Being Hit by Lightning

#v11 AJAX, JSON and an ever increasing web application spread increase the odds of succumbing to a breach. BIG-IP ASM v11 reduces those odds, making it more likely you’ll win at the security table When we use analogy often enough it becomes... Read more
0 Reviews

WILS: Content (Application) Switching is like VLANs for HTTP

We focus a lot on encouraging developers to get more “ops” oriented, but seem to have forgotten networking pros also need to get more “apps” oriented. Most networking professionals know their relevant protocols, the ones they work with day in... Read more
0 Reviews

20 Lines or Less #49: SSL Renegotiation, Execution Halting and HTTP Rewriting

What could you do with your code in 20 Lines or Less? That's the question I ask (almost) every week for the devcentral community, and every week I go looking to find cool new examples that show just how flexible and powerful iRules can be... Read more
0 Reviews

F5 Friday: Expected Behavior is not Necessarily Acceptable Behavior

Sometimes vulnerabilities are simply the result of a protocol design decision, but that doesn’t make it any less a vulnerability An article discussing a new attack on social networking applications that effectively provides an opening through... Read more
0 Reviews

20 Lines or Less #45: FTP Proxying & Double HTTP Redirects

What could you do with your code in 20 Lines or Less? That's the question I ask (almost) every week for the devcentral community, and every week I go looking to find cool new examples that show just how flexible and powerful iRules can be... Read more
0 Reviews

iRules HTTP Event Order Update

I received an update to the HTTP Event Order diagram last night from the excellent F5er John Alam.  Here it is, in all its glory! Fire up the printer, the laminator, whatever, and get this on your cubicle wall pronto! For comparison, the... Read more
1 Review

20 Lines or Less #43 – Nesting, Rewriting Redirects and Auth

What could you do with your code in 20 Lines or Less? That's the question I ask (almost) every week for the devcentral community, and every week I go looking to find cool new examples that show just how flexible and powerful iRules can be... Read more
0 Reviews

Attacks Cannot Be Prevented

You can put into place technology to mitigate and defend against the effects, but you can’t stop the attack from happeningIn the wake of attacks that disrupted service to many popular sites in December the question on many folks’ minds was: how do... Read more
0 Reviews

How To Limit URI Length Without Recompiling Apache

Use network-side scripting, of course! While just about every developer and information security professional knows that a buffer-overflow exploit can result in the execution of malicious code not many truly grok the “why”. Fortunately, it’s not... Read more
0 Reviews

The Many Faces of DDoS: Variations on a Theme or Two

Many denial of service attacks boil down to the exploitation of how protocols work and are, in fact, very similar under the hood. Recognizing these themes is paramount to choosing the right solution to mitigate the attack. When you look across the... Read more
0 Reviews

20 Lines or Less # 42 – Secret list … OF DOOM

What could you do with your code in 20 Lines or Less? That's the question I ask (almost) every week for the devcentral community, and every week I go looking to find cool new examples that show just how flexible and powerful iRules can be... Read more
0 Reviews

HTTP Now Serving … Everything

You can’t assume anything about an application’s performance and delivery needs based on the fact that it rides on HTTP. I read an interesting article during my daily perusal of most of the Internet (I’ve had to cut back because the Internet... Read more
0 Reviews

20 Lines or Less #37 - Hex, HTTPS, and SNATing

What could you do with your code in 20 Lines or Less? That's the question I ask (almost) every week for the devcentral community, and every week I go looking to find cool new examples that show just how flexible and powerful iRules can be... Read more
0 Reviews

REST API Developers Between a Rock and a Hard Place

A recent blog on EBPML.ORG entitled “REST 2010 - Where are We?” very aggressively stated: “REST is just a "NO WS-*" movement.” The arguments presented are definitely interesting but the most compelling point made is in the way that RES... Read more
0 Reviews

20 Lines or Less #36 – Strip, parse, & change

What could you do with your code in 20 Lines or Less? That's the question I ask (almost) every week for the devcentral community, and every week I go looking to find cool new examples that show just how flexible and powerful iRules can be... Read more
0 Reviews