Learn F5 Technologies, Get Answers & Share Community Solutions Join DevCentral

Filter by:
  • Solution
  • Technology

Articles

Sort results

You’re Getting Under My (e)-Skin

Imagine if the temporary tattoos that come in a box of Cracker Jack (if you’re lucky) had an electronic display logo that lights up when you put it on. Or a fitness tracker that you tape to yourself rather than wearing it around your wrist. Or a... Read more
0 Reviews

Meet the Sensors

I often write about the Internet of Things, or the soon-to-be-cliché IoT. You know, the smart-fridges, smart-cars, smart-thermostats, healthcare devices, wearables and any of those connected devices that have a sensor, gathers data and... Read more
0 Reviews

Managing Horizon Traffic across Multiple Data Centers with BIG-IP DNS

VMware Horizon virtual desktop clients typically use a fully qualified domain name (FQDN) when accessing desktop and application resources. More and more customers are distributing their Horizon application and desktop infrastucture to distribute... Read more
Average Rating: 4.9
4 Reviews

Blog Roll 2015

It’s that time of year when we gift and re-gift, just like this text from last year. And the perfect opportunity to re-post, re-purpose and re-use all my 2015 blog entries. If you missed any of the 89 attempts including 59 videos, here they are... Read more
0 Reviews

The Top 10, Top 10 Predictions for 2016

The time of year when crystal balls get a viewing and many pundits put out their annual predictions for the coming year. Rather than thinking up my own, I figured I’d regurgitate what many others are expecting to happen. 7 Future Predictions for... Read more
Average Rating: 3.8
3 Reviews

Wearables Head to Tail

Have you sent Santa your list of all the wearables you'll want under the tree this year? Maybe you've asked for a fitness tracker, a health monitor or that fancy new smart watch. But don't stop there! As we continue to integrate... Read more
0 Reviews

How the cloud can improve your security solutions?

The advantage of being in this industry for a while is that you get to see first hand how things change. Mostly for the better, and usually quite quickly, too. Some of these changes have a knock-on effect on other parts of the industry. One... Read more
1 Review

Load Balancing VMware's Workspace Portal/Identity Manager with F5 BIG-IP Local Traffic Manager (LTM)

You can find the updated load balancing guide for VMware Workspace Portal/Identity Manager here. Stay tuned for a future post on how to securely access Workspace Portal/Identity Manager using BIG-IP, which will include secure proxy access... Read more
Average Rating: 4.9
5 Reviews

Getting Around the Logon/Legal Banner Issues when using APM PCoIP Proxy and Horizon

If you're using APM's PCoIP Proxy and require a logon banner, you've probably figured out that the PCoIP Proxy integration stops working when you turn on the integrated logon banner from within the Horizon Administrator. Adding to the... Read more
Average Rating: 4.9
3 Reviews

On Cloud Nine: Lucky 7 questions you have about Singapore’s journey to becoming a Smart Nation

The Infocomm Development Authority (IDA) wants to make Singapore the world’s first Smart Nation, and this vision means connecting devices, things and people to provide better quality of life in an era of mobility, urban density, aging population... Read more
0 Reviews

The Inside Scoop on VMworld 2015...

It's that time of year again for VMworld in San Franciso! This year, F5 and VMware are partnering on a few fronts to show the strength and capabilities of our partnership. First, check out the F5 and VMware Hands-on-Lab for End User... Read more
0 Reviews

Deliver Resiliency and Scalability with Dell vWorkspace and F5's Local Traffic Manager

Recently, there's been some "buzz" around how to configure Dell vWorkspace components behind BIG-IP's Local Traffic Manager. A few months back, I had the opportunity to work with Stephen Yorke from the Dell vWorkspace team to put... Read more
0 Reviews

HOT OFF THE PRESSES – VMware and F5 Hands-On-Lab Now Available!

VMware and F5 are proud to announce the availability of one of the first partner-centric labs utilizing VMware’s global Hands-On-Lab infrastructure. In close collaboration with the VMware End User Computing Technical Enablement team, the VMware... Read more
2 Reviews

So, you want to use RSA SecurID with APM’s PCoIP Proxy Module…

Customers who leverage Access Policy Manager (APM) for remote access to VMware Horizon 6 (formerly known as VMware View) typically have some level of two-factor authentication (2FA) as an added layer of authentication. It’s especially important... Read more
1 Review

F5預測:生活、自由與寬頻權

Please find the English language post from which this was adapted here. 印度總理莫迪(Narendra Modi)上任時,政府即訂下明確的優先目標,其通訊部長表示:「如果瓦巴依(Atal Bihari... Read more
0 Reviews

Billionaires, Icons and Movie Stars – Why Geek Is Now Chic

Over the past few years we’ve seen the unstoppable rise of the geek. From popular culture to big business, the geeks have inherited the earth. They’re the billionaires, the modern day rock stars, and their many achievements have resulted in a... Read more
0 Reviews

Healthcare in the Crosshairs

Is Healthcare the new Target? Recently I've received a number of 'I am writing to inform you that we were the target of a sophisticated cyber attack and some of your personal information may have been accessed by the attackers..'... Read more
0 Reviews

Security is no longer just an IT concern, but is behaviour changing?

If - and it’s a big if - there is a positive to the recent spate of information security headlines, then it could well be that more people will take an interest in the protection of their data and devices. There seems to have been a never ending... Read more
0 Reviews

The Top 10, Top 10 Predictions for 2015

The time of year that crystal balls get a viewing and many pundits put out their annual predictions for the coming year. Rather than thinking up my own, I figured I’d regurgitate what many others are expecting to happen. IDC Reveals Worldwide... Read more
0 Reviews

Giving security more context

It’s that time of year again. As we head towards Christmas our minds drift towards what we’re going to be buying for our loved ones. This time of year is traditionally a big one for sales of gadgets: mobile phones, PCs, laptops and, more recently,... Read more
0 Reviews

Tinba Malware – New, Improved, Persistent

As investigated by Pavel Asinovsky, F5 SOC Malware Researcher, Tinba, also known as “Tinybanker”, “Zusy” and “HµNT€R$”, is a banking Trojan that was first seen in the wild around May 2012. Its source code was leaked in July 2014.... Read more
Average Rating: 4.9
3 Reviews

The Digital Dress Code

Coming to an office near you. If you thought the Bring Your Own Device (BYOD) craze was a headache, just wait until button cameras, smart watches, and spy glasses (already here) are a daily occurrence in the office. Workplace #wearables will be a... Read more
0 Reviews

The Internet of...(Drum Roll Please)...Band-Aids?!?

Last week I told you about my family's experience with an under the skin glucose sensor that tracks blood sugar levels. While this Internet of Things trend often takes the form of a thermostat, light bulb or coffee machine, the medical field... Read more
0 Reviews

My Sensored Family

The Important Things Lately I've been writing a bunch about the Internet of Things or IoT. You know, where everyday objects have software, chips, and sensors to capture data and report back. Household items like refrigerators, toilets and... Read more
0 Reviews