Learn F5 Technologies, Get Answers & Share Community Solutions Join DevCentral

Filter by:
  • Solution
  • Technology
Clear all filters

Articles

Sort results

Blog Roll 2015

It’s that time of year when we gift and re-gift, just like this text from last year. And the perfect opportunity to re-post, re-purpose and re-use all my 2015 blog entries. If you missed any of the 89 attempts including 59 videos, here they are... Read more
0 Reviews

The Power of the Proxy: Request Routing Memcached

There are three things today that an application needs to survive in today’s demanding world: scale, security, and performance. It is for both reasons of scale and performance that memcached has become such a popular solution in modern... Read more
Average Rating: 4.9
4 Reviews

F5預測:智慧應用網路趨勢 教育邁向個人化

This is a localised version of the original article here. 科技改變了所有產業,教育也不例外,教育課題從未像今天這樣受到關注。我相信大家都同意教育已歷經了重大的改變,學生和教師不再像以前那樣被局限在一間掛著黑板的教室。 現在,網際網路成為主要的促成機制,學生藉由它聚集在一起,傳播理念和發掘經濟機會。教育資源已成為一個熱門的主題,對學生的學習方式帶來改變。Johns Hopkins大學教育研究與改革中心教授Steven... Read more
0 Reviews

一般企業向けのF5 DDoSリファレンス アーキテクチャ

今回投稿されたブログは、F5ネットワークスのテクノロジー・エバンジェリストであるDavid Holmesのブログ投稿「The F5 DDoS Reference Architecture - Enterprise Edition」を元に、日本向けに再構成したものです。 DDoSによる攻撃は依然として続いており、現在でもDDoS攻撃に対する防御は重要課題であり続けています。すでにこのDevCentralでは、グローバル金融機関向けのDDoSリファレンス... Read more
0 Reviews

Up for thee but not for me. The struggle is real.

Why servers and stuff are never provisioned to 100% capacity It is an unwritten rule that web/app servers should never, ever pushed to 100% capacity.  Never. Ignoring this unwritten rule will invariably result in the phenomenon we’ll call... Read more
0 Reviews

F5 + Nutanix: Invisible Infrastructure and SDAS Joining Forces

F5 and Nutanix partner to bring the power of invisible infrastructure and software-defined application servers to critical enterprise application. Joint customers benefit from improved availability, scalability, performance, and security enable... Read more
1 Review

That’s a Wrap from AWS re:Invent 2015

I wrap it up from AWS re:Invent 2015 from the Venetian Sands. Thanks to you for watching this week and special thanks to our guests, Damir Vrankic, Thomas Stanley, Robert Haynes, Alex Applebaum and Brian Pickering along with Jeanette Geary fo... Read more
1 Review

Find F5 at AWS re:Invent 2015

I show you how to find F5 Booth 830 at AWS re:Invent. AWS re:Invent has grown tremendously over the last 4 years and F5 is here to help organizations ensure that their critical app services follow those applications to the cloud. Get a behind th... Read more
0 Reviews

The Impact of the Observer Effect on Microservices Architecture

Application availability is not just the measure of “being up”. Many apps can claim that status. Technically they are running and responding to requests, but at a rate which users would certainly interpret as being down. That’s because excessive... Read more
2 Reviews

F5 Predicts: Education gets personal

The topic of education is taking centre stage today like never before. I think we can all agree that education has come a long way from the days where students and teachers were confined to a classroom with a chalkboard. Technology now underpins... Read more
1 Review

On Cloud Nine: Lucky 7 questions you have about Singapore’s journey to becoming a Smart Nation

The Infocomm Development Authority (IDA) wants to make Singapore the world’s first Smart Nation, and this vision means connecting devices, things and people to provide better quality of life in an era of mobility, urban density, aging population... Read more
0 Reviews

Agility Australia set for success

With less than 24 hours to go before we officially kick-start Agility Australia in Melbourne, preparations are fast under way to ensure this year is its most successful year to date. Agility Australia is the local version of F5 Agility, which is... Read more
0 Reviews

IT安全性不能以一種方案「一體適用」

This is adapated from the original post by Matt Miller. 今天的安全局勢具有高度複雜化的傾向,原因大致上可以歸咎於日益複雜化的網路攻擊本質,特別是從管理者的觀點來看。例如,分散式拒絕服務攻擊(DDoS)現在已達到400Gbps速度,目標包括網路和應用層。很顯然的,攻擊者持續進化,開發其他方法來繞過包括防火牆等傳統安全防護。 對於面對應用層DDoS攻擊威脅的企業而言,必須克服的挑戰在於如何區分人類流量與魁儡(bot)流量。 ... Read more
0 Reviews

The Inside Scoop on VMworld 2015...

It's that time of year again for VMworld in San Franciso! This year, F5 and VMware are partnering on a few fronts to show the strength and capabilities of our partnership. First, check out the F5 and VMware Hands-on-Lab for End User... Read more
0 Reviews

Load Balancing WebSockets

An introduction to WebSockets and how to load balance them. WebSockets creates a responsive experience for end-users by creating a bi-directional communication stream versus the one-way HTTP stream. Read more
1 Review

F5 Animated Whiteboards

F5 Animated Whiteboards offer a quick, visual story to some of today's technology challenges and how we can help solve those headaches. Our latest covers Next Generation IPS and how SSL encryption of applications is becoming the norm. SSL... Read more
0 Reviews

榮耀得獎 謙卑服務 - F5榮獲多項亞太獎賞

This bl;og post is adapted from the original post here.  最近,F5在亞太屢獲獎賞。四項大獎的獲得,明確證明了F5持續的市場與技術領導性。F5一直致力於提供全方位的客戶經驗,並且很榮幸的獲得許多業界專家與分析師對於我們的肯定。這些獎賞屬於亞太區每一位F5員工的榮耀。F5全心支持我們的夥伴成長,並且為客戶提供方案與服務,這些努力讓F5從平凡的廠商茁壯成為一個在企業混合環境為數千應用提供優化與安全的可信賴夥伴。 ... Read more
0 Reviews

Proud to win, Humbled to serve – F5 wins APAC Awards

In recent weeks, the award bells have been ringing for F5 in Asia Pacific. We’ve bagged not one, but four awards, showing a clear testament to our continued market and technological leadership. F5 has always been committed to delivering a holistic... Read more
0 Reviews

Measuring and Monitoring: Apps and Stacks

One of the charter responsibilities of DevOps (because it's a charter responsibility of ops) is measuring and monitoring applications once they're in production. That means both performance and availability. Which means a lot more th... Read more
0 Reviews

Implementing Client Subnet in DNS Requests

Using an iRule and edns-client-subnet (ECS) we can improve the accuracy of F5 GTM’s topology load balancing. Read more
Average Rating: 4.9
4 Reviews

The disappearance of e in e-Commerce

The day when the lower-case “e” was introduced to define the online nature of a transaction now ceases to have any meaning. In the era of application everything and the highly mobile generation, digital transactions are becoming the norm in most... Read more
0 Reviews

ネットワークインフラは、イミュータブルなものになれるのか?

イミュータブルインフラストラクチャ、私は使い捨て可能なインフラストラ チャと呼んだ方がふさわしいと思うのですが、この1年でDockerとコンテナ化技 術の成功によって再び注目を浴びました。また、DevOpsは、自動化と関連する 使い捨て可能なインフラストラクチャの概念と、取得から構成までのすべてを 自動化して、アプリケーションデータパスのあらゆるものを提供する「テンプ... Read more
0 Reviews

DNS based failover between AWS Availability Zones and Split DNS

Working in the AWS public cloud; one has to adapt to a world of guaranteed failure at unpredictable times. Utilizing a combination of LTM for HA within a single availability zone and GTM across availability zones and regions provides an architecture to survive the chaos monkeys. Read more
0 Reviews

Cloud bursting, the hybrid cloud, and why cloud-agnostic load balancers matter

Cloud Bursting and Hybrid Cloud When researching cloud bursting, there are many directions Google may take you. Perhaps you come across services for airplanes that attempt to turn cloudy wedding days into memorable events. Perhaps you'd... Read more
2 Reviews