Learn F5 Technologies, Get Answers & Share Community Solutions Join DevCentral

Filter by:
  • Solution
  • Technology

Articles

Sort results

3 Billion Malware Attacks and Counting

Almost half the total population of this planet.  At this rate, we’ll all have our own personalized malware in the coming years, specifically tailored for our various behaviors.  I built this infection especially for you.  Symantec... Read more
0 Reviews

Our Digital Life Deciphered

comScore always has some very interesting statistics when measuring the digital world and these recent reports are no different.  The 2010 U.S. Digital Year in Review has great info both in understanding media trends and knowing what the end... Read more
0 Reviews

Where Do You Wear Your Malware?

The London Stock Exchange, Android phones and even the impenetrable Mac have all been malware targets recently.  If you’re connected to the internet, you are at risk.  It is no surprise that the crooks will go after whatever device... Read more
0 Reviews

RSA2011 - BIG-IP Edge Client on iPad

I meet with Andy Oehler, Product Manager for F5's Secure Access Solutions who demos the BIG-IP Edge Client for the Apple iPad. ps Resources: F5 YouTube Channel F5 Announces Two BIG-IP Apps Now Available at the App Store F5 BIG-IP... Read more
0 Reviews

RSA2011 F5 Partner Spotlight - PhoneFactor

I visit with Steve Dispensa, CTO of PhoneFactor for a demo of their token less multi-factor authentication to your phone. ps Resources: ... Read more
0 Reviews

The New Wallet: Is it Dumb to Carry a Smartphone?

When I was a teenager, I used to have one of those cool nylon surfer wallets with the Velcro close, you remember those don’t ya?  While pumping diesel (had a VW Rabbit) one day at an old Gulf station, I left the wallet on top of the car and... Read more
0 Reviews

iDo Declare: iPhone with BIG-IP

Who would have imagined back in 1973 when Martin Cooper/Motorola dialed the first portable cellular phone call, that one day we'd be booking airline tickets, paying bills, taking pictures, watching movies, getting directions, emailing and... Read more
1 Review

CloudFucius’ Money: Trickles to the Cloud

No, I’m not investing some seed money in a cool new company or technology but banks are certainly looking to take advantage of cloud computing services.  At least that’s the message from a recent survey by Bank Systems & Technology an... Read more
0 Reviews

CloudFucius Dials Up the Cloud

According to IDC, the worldwide mobile worker population is set to increase from 919.4 million in 2008, accounting for 29% of the worldwide workforce, to 1.19 billion in 2013, accounting for 34.9% of the workforce.  The United States has th... Read more
0 Reviews

Fast Application Access with Jonathan George - F5 at Interop

F5's Jonathan George presents Fast Application Access at Interop2010. Web access, Global delivery, cloud deployments, remote users are just some of the areas covered in this short presentation. Read more
0 Reviews

CloudFucius Wonders: Can Cloud, Confidentiality and The Constitution Coexist?

This question has been puzzling a few folks of late, not just CloudFucius.  The Judicial/legal side of the internet seems to have gotten some attention lately even though courts have been trying to make sense and catch up with technology fo... Read more
0 Reviews

F5 BIG-IP Edge Gateway Performance Demo

Watch how F5 has solved the security plus acceleration challenge for remote users.  Demo shows how BIG-IP Edge Gateway is twice as fast as the competition at downloading a 5MB Microsoft SharePoint file.  A powerful example of... Read more
0 Reviews
0 Reviews

Dan Kaminsky Interview Part I

Peter Silva of F5 sits down with IOActive's Dan Kaminsky. In this extremely informative and lively discussion, the Domain Name System is the topic. DNS infrastructure, DNS vulnerabilities including DNS Cache Poisoning, DNSSEC and what's... Read more
0 Reviews
0 Reviews

Consolidate and Dedicate to Eradicate

Whether it be due to cloud computing, last year’s economic mess, or just the general cyclical nature of the Tech Industry, Consolidation has been a huge focus of IT departments of late.  Data Center consolidation, hardware consolidation,... Read more
0 Reviews

The State of My Blog Address

Readers, distinguished bloggers, various feeds - A year ago this week, I crossed over into double-digit blog entries (a whopping 10 stories at the time but a relative blog newcomer) and was wondering what magical rant would make this Blog Go to... Read more
0 Reviews

Cybercrime, the Easy Way

The Dummies series is a great collection of ‘How to’ instructions on a wide array of topics and while they have not published a ‘Cybercrime for Dummies®’ booklet (and don’t think they will), DYI Cybercrime Kits are helping drive Internet... Read more
2 Reviews

New Decade, Same Threats?

Do I call it Twenty-Ten or Two Thousand Ten?  Just not Two Thousand and Ten since that pesky decimal takes us back 10 years.  Eh, either way, the new year and decade brings out all the predictions for the coming year with this one taking... Read more
0 Reviews

It all comes down to YOU - The User

One of my favorite Security writers, Bruce Schneier, had an interesting entry last week called Reacting to Security Vulnerabilities where he discusses the recent reports about the security flaw in the SSL protocol and how we as users should relax... Read more
0 Reviews

IPv6 and the End of the World

There’s always been a certain amount of conspiracy theories when security type events happen or instances where there is secrecy. There are those who don’t buy the ‘reported’ reason a security event (like a breach) occurred, those who claim to... Read more
0 Reviews

This time, it’s Personal

Nearly 80% of companies reported an increase in the number of employees wanting to bring their own devices into the workplace in the last 6-12 months according to ‘The Device Dilemma,’ a report by Vanson Bourne and Good Technology. In addition,... Read more
0 Reviews