Learn F5 Technologies, Get Answers & Share Community Solutions Join DevCentral

Filter by:
  • Solution
  • Technology

Articles

Sort results

Ask the Expert – Are WAFs Dead?

Brian McHenry, Sr. Security Solution Architect, addresses the notion that Web Application Firewalls are dead and talks about what organizations need to focus on today when protecting their data and applications across a diverse environment. H... Read more
0 Reviews

The Breach of Things

Yet another retailer has confessed that their systems were breached and an untold number of victims join the growing list of those who have had their data was stolen. This one could be bigger than the infamous Target breach. I wonder if some day... Read more
0 Reviews

業界唯一のシャーシ型ADCであるViprionシリーズの最小モデル、C2200シャーシを提供開始

このたび、F5ネットワークスジャパン株式会社は、F5 Synthesisアーキテクチャモデルの恩恵を増大する新製品、Viprionシリーズの新モデル、2スロット式小型シャーシであるC2200を発表いたしました。C2200は、従来のミッドレンジであるC2400、上位モデルのC4480、フラッグシップのC4800に加え、小型で省スペース、お求めやすい価格設定で従来と変わらない機能をお届けします。 主なキーポイントは以下の通りです。 ... Read more
0 Reviews

業界唯一のシャーシ型ADCであるViprionシリーズの最小モデル、C2200シャーシを提供開始

このたび、F5ネットワークスジャパン株式会社は、F5 Synthesisアーキテクチャモデルの恩恵を増大する新製品、Viprionシリーズの新モデル、2スロット式小型シャーシであるC2200を発表いたしました。C2200は、従来のミッドレンジであるC2400、上位モデルのC4480、フラッグシップのC4800に加え、小型で省スペース、お求めやすい価格設定で従来と変わらない機能をお届けします。 主なキーポイントは以下の通りです。 ... Read more
0 Reviews

The BIG-IP Application Security Manager Part 10: Event Logging

This is the last article in a 10-part series on the BIG-IP Application Security Manager (ASM). The first nine articles in this series are: What is the BIG-IP ASM? Policy Building The Importance of File Types, Parameters, and URLs Attack... Read more
Average Rating: 4.7
11 Reviews

Privacy for a Price

A few weeks ago, I went to my usual haircut place and after the trim at the register I presented my loyalty card.  You know the heavy paper ones that either get stamped or hole-punched for each purchase.  After a certain number of paid... Read more
0 Reviews

You Got a Minute?

Like most of us, I try to read the entire internet on a daily basis but for some reason, these slipped through.  They both came out in 2011 and I am sure the numbers have changed in many cases.  For instance, the graphic shows 70 ... Read more
0 Reviews

The Database Tier is Not Elastic

It is the database tier and its unique characteristics that ultimate determine where an application will be deployed. cloud computing is mostly about “elasticity.” The extraction and contraction of resources based on demand. It is the... Read more
0 Reviews

JSON versus XML: Your Choice Matters More Than You Think

Should the enterprise standardize on JSON or XML as their lingua franca for Web 2.0 integration? Or should they use both as best fits the application?The decision impacts more than just integration – it resounds across the entire... Read more
0 Reviews

JSON versus XML: Your Choice Matters More Than You Think

Should the enterprise standardize on JSON or XML as their lingua franca for Web 2.0 integration? Or should they use both as best fits the application?The decision impacts more than just integration – it resounds across the entire... Read more
0 Reviews

Meh. It’s Just Data.

All the applause over Google’s Data Liberation Front announcement and blogs is making my head hurt. Or maybe that’s the lack of sleep. Either way, it’s disconcerting to me that so many bright people are choosing to make much of what is just a... Read more
0 Reviews

Duty Calls: Data Portability in The Cloud is an Application Integration Problem, Not a Cloud Problem

Spectacular “cloud” failures over the past few weeks have raised the hue and cry for portability and interoperability across clouds for data.The problem is that the cry is based on the false assumption that a “cloud service” is the same as an... Read more
0 Reviews

Mobile data - Where does it go?

I was excited to see our press release coverage today about F5 Networks and Bytemobile's ability to scale T-Mobile's 3G Network Capacity with our VIPRION product.  The article mentions the "explosive" growth of data  on... Read more
0 Reviews

Cloud Computing: Will data integration be its Achilles Heel?

Wesley:  Now, there may be problems once our app is in the cloud. Inigo:  I'll say.  How do I find the data?  Once I do, how do I integrate it with the other apps?  Once I integrate it, how do I replicate it?If... Read more
0 Reviews

3 steps to a fast, secure, and reliable application infrastructure

You have just been promoted to CTO of Widgets, Inc. (Congratulations, by the way!) In your new role, on which of the following will you focus the most attention (and budget): (a) the network (b) the applicat... Read more
0 Reviews

Cloudware and information privacy: TANSTAAFL

Ars Technica is reporting on a recent Pew study on cloud computing and privacy, specifically concerning remote data storage and the kind of data-mining performed on it by providers like Google, indicates that while consumers are con... Read more
0 Reviews