Learn F5 Technologies, Get Answers & Share Community Solutions Join DevCentral

Filter by:
  • Solution
  • Technology
Clear all filters

Articles

Sort results

F5預測:智慧應用網路趨勢 教育邁向個人化

This is a localised version of the original article here. 科技改變了所有產業,教育也不例外,教育課題從未像今天這樣受到關注。我相信大家都同意教育已歷經了重大的改變,學生和教師不再像以前那樣被局限在一間掛著黑板的教室。 現在,網際網路成為主要的促成機制,學生藉由它聚集在一起,傳播理念和發掘經濟機會。教育資源已成為一個熱門的主題,對學生的學習方式帶來改變。Johns Hopkins大學教育研究與改革中心教授Steven... Read more
0 Reviews

Connecting the Threads

What was first used to protect humans from the outside elements is now monitoring our body's inside environment. According to eMarketer.com, wearable usage will grow almost 60% in 2015 verses 2014. This year, almost 40 million U.S. adults will... Read more
0 Reviews

Full examples of iControlREST for device and application service deployment

Examples of the use of iControlREST for device and application service provisioning. In particular, we describe example workflows, and we dive into the management of iApp services and templates using iCR. Read more
Average Rating: 4.9
5 Reviews

“Bimodal IT” the hot topic @ Gartner 2015, Australia

Dateline Gold Coast, Australia, October 2015, at Australia’s largest IT event.   “This is a decisive moment. A digital wave is sweeping through every industry, organization and culture. There is no room to stand on the sidelines, no safe... Read more
0 Reviews

Ask the Expert – Why Identity and Access Management?

Michael Koyfman, Sr. Global Security Solution Architect, shares the access challenges organizations face when deploying SaaS cloud applications. Syncing data stores to the cloud can be risky so organizations need to utilize their local directorie... Read more
0 Reviews

Ask the Expert – Are WAFs Dead?

Brian McHenry, Sr. Security Solution Architect, addresses the notion that Web Application Firewalls are dead and talks about what organizations need to focus on today when protecting their data and applications across a diverse environment. H... Read more
0 Reviews

F5 + Nutanix: Invisible Infrastructure and SDAS Joining Forces

F5 and Nutanix partner to bring the power of invisible infrastructure and software-defined application servers to critical enterprise application. Joint customers benefit from improved availability, scalability, performance, and security enable... Read more
1 Review

Wearables Head to Tail

Have you sent Santa your list of all the wearables you'll want under the tree this year? Maybe you've asked for a fitness tracker, a health monitor or that fancy new smart watch. But don't stop there! As we continue to integrate... Read more
0 Reviews

F5 IoT Ready平台

This blog is adapted from the original post here.   “物聯網“的應用與支持物連網服的各項應用程式正在改變著我們的生活方式。研究顯示運動與健康相關產業部門到2017年有41%的年增長率,將增長到近170萬台設備,在未來幾年隨著越來越多的設備、服裝或感應器成為司空見慣的的事情,職場工作模式的變化將是一個巨大的挑戰。 ... Read more
0 Reviews

F5 + SimpliVity: Deploy and Simplify Application Deployments Together

F5 and SimpliVity partner to improve manageability, strengthen security, and ensure faster and more successful deployments. Joint customers benefit from the integration and interoperability that result from this close collaboration... Read more
1 Review

Is the app attack surface in the cloud really different than on-premises?

No.   Still here? Okay then, let me explain further. This whole thing started because I was reading the Internet the other day and happened upon a claim that stated: “the attack surface for cloud applications is dramatically different than... Read more
1 Review

The Wave of Change at Tech Events

I attend a lot of technology trade shows throughout the year and still remember going to my first technology event for F5 back in 2004. Small, almost high school science fair type booths handing out glossy flyers of the latest product along with... Read more
0 Reviews

That’s a Wrap from AWS re:Invent 2015

I wrap it up from AWS re:Invent 2015 from the Venetian Sands. Thanks to you for watching this week and special thanks to our guests, Damir Vrankic, Thomas Stanley, Robert Haynes, Alex Applebaum and Brian Pickering along with Jeanette Geary fo... Read more
1 Review

AWS re:Invent 2015 – Web Application Firewall in the Cloud (feat Haynes)

WAFs are one an organization’s key line of defenses against web application attacks and Robert Haynes, Marketing Services Architect, shares some of the app security considerations organizations must face when deploying their critical application... Read more
0 Reviews

AWS re:Invent 2015 – SSL Everywhere…Including the Cloud (feat Stanley)

Thomas Stanley, Product Management Engineer, discusses the challenges organizations face when implementing a SSL Everywhere strategy even in the cloud. He gets into areas like SSL certificates, key management, multiple interfaces and the learnin... Read more
1 Review

AWS re:Invent 2015 - Value of App Services in the Cloud (feat Vrankic)

Damir Vrankic, Director – Product Management, explains how critical application services such as availability, security and performance play a critical role, especially when delivering applications from the cloud. He discusses the risks, like dat... Read more
0 Reviews

Find F5 at AWS re:Invent 2015

I show you how to find F5 Booth 830 at AWS re:Invent. AWS re:Invent has grown tremendously over the last 4 years and F5 is here to help organizations ensure that their critical app services follow those applications to the cloud. Get a behind th... Read more
0 Reviews

IoT: Tabs to be Read Later

I've been traveling a bit over the last month and my tabs-to-read-later pile is growing. We'll be at AWS re:Invent next week so I thought I'd unload some of the IoT stories that caught my eye recently, that I'm finally getting to... Read more
1 Review

Configuration Example: BIG-IP APM as SAML IdP for Amazon Web Services

Useful links Creating Temporary Security Credentials for SAML Federation - AWS Security Token Service Giving Console Access Using SAML - AWS Security Token Service AWS Metadata File   Two Attributes are required for the SAML Assertion Role... Read more
Average Rating: 4.8
12 Reviews

AWS re:Invent 2015 – The Preview Video

I preview AWS re:Invent, the Amazon Web Services annual user conference, happening next week October 6-9 at The Venetian Sands in Las Vegas. From Booth 830, F5 will show you how you can take your critical application services with you to th... Read more
0 Reviews

Jefe, would you say I have a plethora of agility 2015 labs?

The Three Amigos. I loved that movie when I was a kid. There’s one exchange between El Guapo & Jefe that just makes me laugh so hard every time I think about it: Jefe: I have put many beautiful pinatas in the storeroom, each of them filled... Read more
Average Rating: 4.9
5 Reviews

Load Balancing VMware's Workspace Portal/Identity Manager with F5 BIG-IP Local Traffic Manager (LTM)

You can find the updated load balancing guide for VMware Workspace Portal/Identity Manager here. Stay tuned for a future post on how to securely access Workspace Portal/Identity Manager using BIG-IP, which will include secure proxy access... Read more
Average Rating: 4.9
5 Reviews

Getting Around the Logon/Legal Banner Issues when using APM PCoIP Proxy and Horizon

If you're using APM's PCoIP Proxy and require a logon banner, you've probably figured out that the PCoIP Proxy integration stops working when you turn on the integrated logon banner from within the Horizon Administrator. Adding to the... Read more
Average Rating: 4.9
3 Reviews

F5 Predicts: Education gets personal

The topic of education is taking centre stage today like never before. I think we can all agree that education has come a long way from the days where students and teachers were confined to a classroom with a chalkboard. Technology now underpins... Read more
0 Reviews

Is Your DNS Vulnerable?

A recent report from The Infoblox DNS Threat Index (in conjunction with Internet Identity) shows that phishing attacks has raised the DNS threat level to a record high of 133 for second quarter of 2015, up 58% from the same time last year. The... Read more
0 Reviews