Learn F5 Technologies, Get Answers & Share Community Solutions Join DevCentral

Filter by:
  • Solution
  • Technology

Articles

Sort results

Collaborate in the Cloud

Employee collaboration and access to communication tools are essential for workplace productivity. Organizations are increasing their use of Microsoft Office 365, a subscription-based service that provides hosted versions of familiar Microsoft... Read more
0 Reviews

Microsoft Exchange Server

F5 works closely with Microsoft to ensure we are delivering the best possible technology and deployment guidance to support highly available and scalable Exchange Server deployments. F5 performs extensive internal engineering and testing to... Read more
Average Rating: 3.6
6 Reviews

“Apples to Apples” Comparing an APM Deployment to TMG

Okay, okay, I drank the Kool-aid.  I’m a big fan of Access Policy Manager, (APM) and, full disclosure, an F5 employee.  With that said, being a “Windows guy” and coming from a background of working with Threat Management Gateway, (TMG) I... Read more
1 Review

To Pre-authenticate or Not to Pre-authenticate

I’m bouncing around in the friendly skies, (turbulence sucks!) on my way back from the Microsoft Exchange conference and one question keeps rolling around in my head; how important is pre-authentication?  Granted, it may not be a very... Read more
0 Reviews

F5 Friday: Enhancing Microsoft Exchange 2013

#Microsoft #Exchange load balancing is just the beginning… Throughout the years, F5 BIG-IP has been a critical component supporting Microsoft Exchange to implement a variety of performance, security, and architectural requirements. During... Read more
0 Reviews

Big-IP and ADFS Part 4 – “What about Single Sign-Out?”

Why stop at 3 when you can go to 4? Over the past few posts on this ever-expanding topic, we’ve discussed using ADFS to provide single sign-on access to Office 365. But what about single sign-out? A customer turned me onto Tristan Watkins’ blog... Read more
Average Rating: 4.9
4 Reviews

F5 Friday: Lessons from (IT) Geese

Birds migrate in flocks, which means every individual has the support of others. IT often migrates alone – but it doesn’t have to. “Lessons from Geese” has been around a long time. It is often cited and referenced, particularly with respect... Read more
0 Reviews

Big-IP and ADFS Part 3 – “ADFS, APM, and the Office 365 Thick Clients”

Okay, so I never mentioned a part 3. But, the topic is just too much fun to let go. Besides, we have one more important section to cover. First, let’s recap parts one and two. In part one we discussed load balancing the ADFS and ADFS proxy farms... Read more
1 Review

Big-IP and ADFS Part 2 - APM: An Alternative to the ADFS Proxy

So let’s talk Application Delivery Controllers, (ADC).  In part one of this series we deployed both an internal ADFS farm as well as a perimeter ADFS proxy farm using the Big-IP’s exceptional load balancing capabilities to provide HA and... Read more
Average Rating: 4.4
5 Reviews

Big-IP and ADFS Part 1 – “Load balancing the ADFS Farm”

Just like the early settlers who migrated en masse across the country by wagon train along the Oregon Trail, enterprises are migrating up into the cloud. Well okay, maybe not exactly like the early settlers. But, although there may not be a mass... Read more
Average Rating: 4.9
5 Reviews

iApp – And the audience gasped!

#iApp #v11 Time for some customer evidence! Last week F5 hosted our International Sales Conference. The whole company is invited to the general session at which our senior execs talk about the year in review and our vision for the future. iApp... Read more
1 Review

Microsoft Exchange 2010 iRule Workflow Visualized

F5’s own John Alam sent over his latest Visio creation to share with the DevCentral community.  This diagram details the workflow of the comprehensive exchange services iRule described in the Microsoft Exchange 2010 Deployment Guide.... Read more
2 Reviews

Links, Sex, and Application Fluency

I ran across an interesting site containing an algorithm that predicts your sex based on browser history. This algorithm uses demographics from popular sites, determines which popular sites you have visited by digging through your browser history,... Read more
0 Reviews