Learn F5 Technologies, Get Answers & Share Community Solutions Join DevCentral

Filter by:
  • Solution
  • Technology

Articles

Sort results

Back to Basics: The Theory of (Performance) Relativity

#webperf #ado Choice of load balancing algorithms is critical to ensuring consistent and acceptable performance   One of the primary reasons folks use a Load balancer is scalability with a secondary driver of maintaining performance. We... Read more
0 Reviews

“Apples to Apples” Comparing an APM Deployment to TMG

Okay, okay, I drank the Kool-aid.  I’m a big fan of Access Policy Manager, (APM) and, full disclosure, an F5 employee.  With that said, being a “Windows guy” and coming from a background of working with Threat Management Gateway, (TMG) I... Read more
1 Review

To Pre-authenticate or Not to Pre-authenticate

I’m bouncing around in the friendly skies, (turbulence sucks!) on my way back from the Microsoft Exchange conference and one question keeps rolling around in my head; how important is pre-authentication?  Granted, it may not be a very... Read more
0 Reviews

Big-IP and ADFS Part 4 – “What about Single Sign-Out?”

Why stop at 3 when you can go to 4? Over the past few posts on this ever-expanding topic, we’ve discussed using ADFS to provide single sign-on access to Office 365. But what about single sign-out? A customer turned me onto Tristan Watkins’ blog... Read more
Average Rating: 4.9
4 Reviews

Migrating from Exchange 2007 to 2010 with Access Policy Manager

When it comes to upgrades, implementations, migrations, etc., you can plan for months. You can test, test, and then test some more. You can cross every “i” and dot every “t”. But at the end of the day, it all comes down to the end-user... Read more
1 Review

Big-IP and ADFS Part 3 – “ADFS, APM, and the Office 365 Thick Clients”

Okay, so I never mentioned a part 3. But, the topic is just too much fun to let go. Besides, we have one more important section to cover. First, let’s recap parts one and two. In part one we discussed load balancing the ADFS and ADFS proxy farms... Read more
1 Review

Big-IP and ADFS Part 2 - APM: An Alternative to the ADFS Proxy

So let’s talk Application Delivery Controllers, (ADC).  In part one of this series we deployed both an internal ADFS farm as well as a perimeter ADFS proxy farm using the Big-IP’s exceptional load balancing capabilities to provide HA and... Read more
Average Rating: 4.4
5 Reviews

Big-IP and ADFS Part 1 – “Load balancing the ADFS Farm”

Just like the early settlers who migrated en masse across the country by wagon train along the Oregon Trail, enterprises are migrating up into the cloud. Well okay, maybe not exactly like the early settlers. But, although there may not be a mass... Read more
Average Rating: 4.9
5 Reviews

Dire (Load Balancing) Straits: I Want My Client IP

load balancing fu for developers to avoid losing what is vital business data I want my client IP Now read the manuals that's the way you do it Give the IP to the SLB That ain't workin' that’s the way to do it Set... Read more
0 Reviews

Nobody Puts Baby in a Corner

In this case “baby” is load balancing and the corner is cloud computing. SocialCloudNow recently wrote up a pretty darn accurate (which is hard to find these days) description of “cloud computing” by walking through the components required. The... Read more
0 Reviews

Scaling AJAX Applications is More About Architecture than Apache

Scaling applications that include AJAX and non-AJAX components may require more than just tuning your web server  A common problem after deploying a Web 2.0 AJAX-based application shows itself through poor performance or lower capacity on... Read more
0 Reviews

How To Use CoralCDN On-Demand to Keep Your Site Available. For Free.

Cloud computing and content delivery networks (CDN) are both good ways to assist in improving capacity in the face of sudden, high demand for specific content but require preparation and incur operational and often capital expenditures. How about... Read more
0 Reviews

It’s 2am: Do You Know What Algorithm Your Load Balancer is Using?

The wrong load balancing algorithm can be detrimental to the performance and scalability of your web applications. When you’re mixing and matching virtual or physical servers you need to take care with how you configure your Load balancer – and... Read more
1 Review

No Shirt, No Shoes, No HTTP Service

Using Anonymous Human Authentication to prevent illegitimate access to sites, services, and applications. In the “real world” there are generally accepted standards set for access to a business and its services. One of the most common standards... Read more
0 Reviews

WILS: Client IP or Not Client IP, SNAT is the Question

Ever wonder why requests coming through proxy-based solutions, particularly load balancers, end up with an IP address other than the real client? It’s not just a network administrator having fun at your expense. SNAT is the question – and the... Read more
0 Reviews

WILS: Why Does Load Balancing Improve Application Performance?

WILS: The Concise Guide to *-Load Balancing WILS: Network Load Balancing versus Application Load Balancing WILS: InfoSec Needs to Focus on Access not Protection WILS: Applications Should Be Like Sith Lords WILS: Cloud Changes ... Read more
0 Reviews

Dynamic Infrastructure Makes Static Connection Limitations Obsolete

One of the benefits of Infrastructure 2.0 is connectedness: the ability to collect and share pertinent data regarding the health and performance of applications and infrastructure services. Based on that data a dynamic infrastructure can adapt... Read more
0 Reviews

WILS: Network Load Balancing versus Application Load Balancing

Are you load balancing servers or applications? Network traffic or application requests? If your strategy to application availability is network-based you might need a change in direction (up the stack).   ... Read more
0 Reviews

Impact of Load Balancing on SOAPy and RESTful Applications

A load balancing algorithm can make or break your application’s performance and availability It is a (wrong) belief that “users” of cloud computing and before that “users” of corporate data center infrastructure didn’t need to understand any of... Read more
1 Review

If Your Users See an HTTP Error Code You’re Doing It Wrong

There is no reason in a modern web application for users to see a white error page Sightings of the Twitter “fail whale” are, these days, fewer and far between. That’s a good thing. What’s interesting is that when it does show up, users are... Read more
0 Reviews

Cloud Changes Cost of Attacks

For some companies there’s never been a quantifiable financial impact from attacks. Cloud may change that. One of the frustrations with information security is that it’s always difficult – if not impossible – to quantify risk. Without the... Read more
0 Reviews

Cloud Computing Makes Servers Obsolete

The concept of a server needs to go the way of the dodo One of the reasons I enjoy Twitter is that quite frequently – if you’re following the right people – you’ll see a tweet that is absolutely profound despite its simplicity and the... Read more
0 Reviews

The End of 3-Teared Architectures

No, that isn’t a homophonic mistake. Dan directed my attention to an interesting article recently, “Are 3-tier web architecture models too rigid?” in which the author postulates that “maybe it is time to finally break out of  the old... Read more
0 Reviews

Your load balancer wants to take a level of fighter and wizard

If you’ve ever played Dungeons & Dragons for an extended period of time (a campaign, in the vernacular) you know that of all the classes available the cleric is the least likely to be chosen willingly. The cleric class is much like the ... Read more
0 Reviews

Virtual Reality

You can’t afford not to invest in technologies that leverage virtualization to improve data center efficiency There’s an old adage that says you have to spend money to make money. In the data center these days this is more true than ever. You... Read more
0 Reviews