Learn F5 Technologies, Get Answers & Share Community Solutions Join DevCentral

Filter by:
  • Solution
  • Technology

Articles

Sort results

Tuning the TCP Profile, Part One

How to get the most out of the TCP profile. Read more
Average Rating: 4.9
3 Reviews

Managing Horizon Traffic across Multiple Data Centers with BIG-IP DNS

VMware Horizon virtual desktop clients typically use a fully qualified domain name (FQDN) when accessing desktop and application resources. More and more customers are distributing their Horizon application and desktop infrastucture to distribute... Read more
Average Rating: 4.9
4 Reviews

My IT Predictions for 2016: They will be inaccurate, so stay agile.

It’s the season for predictions. What will 2016 bring in IT? Consulting firms, IT vendors (F5 included), and general web pundits will happily give you their predictions for business, consumers and the resulting IT trends they drive. Some of them... Read more
0 Reviews

Measuring Management and Orchestration

Early (very early, in fact) in the rise of SDN there were many discussions around scalability. Not of the data plane, but of the control (management) plane. Key to this discussion was the rate at which SDN-enabled network devices, via OpenFlow,... Read more
0 Reviews

The intrinsic asymmetric division of BIG-IQ

The intrinsic what? In cell division, when intrinsic asymmetric division occurs (a parent cell divides), the two new daughter cells are not equal and exhibit different properties. [https://en.wikipedia.org/wiki/Asymmetric_cell_division] So,... Read more
0 Reviews

F5預測:智慧應用網路趨勢 教育邁向個人化

This is a localised version of the original article here. 科技改變了所有產業,教育也不例外,教育課題從未像今天這樣受到關注。我相信大家都同意教育已歷經了重大的改變,學生和教師不再像以前那樣被局限在一間掛著黑板的教室。 現在,網際網路成為主要的促成機制,學生藉由它聚集在一起,傳播理念和發掘經濟機會。教育資源已成為一個熱門的主題,對學生的學習方式帶來改變。Johns Hopkins大學教育研究與改革中心教授Steven... Read more
0 Reviews

Full examples of iControlREST for device and application service deployment

Examples of the use of iControlREST for device and application service provisioning. In particular, we describe example workflows, and we dive into the management of iApp services and templates using iCR. Read more
Average Rating: 4.9
5 Reviews

“Bimodal IT” the hot topic @ Gartner 2015, Australia

Dateline Gold Coast, Australia, October 2015, at Australia’s largest IT event.   “This is a decisive moment. A digital wave is sweeping through every industry, organization and culture. There is no room to stand on the sidelines, no safe... Read more
0 Reviews

一般企業向けのF5 DDoSリファレンス アーキテクチャ

今回投稿されたブログは、F5ネットワークスのテクノロジー・エバンジェリストであるDavid Holmesのブログ投稿「The F5 DDoS Reference Architecture - Enterprise Edition」を元に、日本向けに再構成したものです。 DDoSによる攻撃は依然として続いており、現在でもDDoS攻撃に対する防御は重要課題であり続けています。すでにこのDevCentralでは、グローバル金融機関向けのDDoSリファレンス... Read more
0 Reviews

グローバル金融機関向けのF5 DDoSリファレンス アーキテクチャ

今回投稿したブログは、F5ネットワークスのテクノロジー・エバンジェリストであるDavid Holmesのブログ投稿「The F5 DDoS Reference Architecture - Global FSI Edition」を元に、日本向けに再構成したものです。以下は、David Holmesの個人的体験談に基づいています。  皆さんは、ジョージ・クルーニー主演の「マイレージ、マイライフ(原題:Up in the... Read more
0 Reviews

F5 + Nutanix: Invisible Infrastructure and SDAS Joining Forces

F5 and Nutanix partner to bring the power of invisible infrastructure and software-defined application servers to critical enterprise application. Joint customers benefit from improved availability, scalability, performance, and security enable... Read more
1 Review

A Catch From the Codeshare - Web UI Tweaks

On the side of the road in northern Missouri just north of Mark Twain’s stomping grounds, there is a slice of hillside removed just to the side of the highway. In Arkansas, there’s a nondescript field tucked away in a state park. Short of word of... Read more
0 Reviews

AWS re:Invent 2015 – Web Application Firewall in the Cloud (feat Haynes)

WAFs are one an organization’s key line of defenses against web application attacks and Robert Haynes, Marketing Services Architect, shares some of the app security considerations organizations must face when deploying their critical application... Read more
0 Reviews

AWS re:Invent 2015 - Value of App Services in the Cloud (feat Vrankic)

Damir Vrankic, Director – Product Management, explains how critical application services such as availability, security and performance play a critical role, especially when delivering applications from the cloud. He discusses the risks, like dat... Read more
0 Reviews

Easter Egg: BIG-IP Advisory Banner

Let's take a minute and step away from the technical stuff and look at something a little more entertaining. In 11.6 a GUI enhancement was added to display an Advisory Bar at the top and bottom panes of the GUI. Now I am not talking about... Read more
Average Rating: 4.9
5 Reviews

Jefe, would you say I have a plethora of agility 2015 labs?

The Three Amigos. I loved that movie when I was a kid. There’s one exchange between El Guapo & Jefe that just makes me laugh so hard every time I think about it: Jefe: I have put many beautiful pinatas in the storeroom, each of them filled... Read more
Average Rating: 4.9
5 Reviews

Operational expense has an enemy: orchestration!

Orchestration is key to achieving reduced time-to-value. What is this "time to value"? In technology speak, its the measurement of time for a system or resource to be made available to its intended audience. This system might generate... Read more
1 Review

Getting Around the Logon/Legal Banner Issues when using APM PCoIP Proxy and Horizon

If you're using APM's PCoIP Proxy and require a logon banner, you've probably figured out that the PCoIP Proxy integration stops working when you turn on the integrated logon banner from within the Horizon Administrator. Adding to the... Read more
Average Rating: 4.9
3 Reviews

F5 in AWS Part 4 - Orchestrating BIG-IP Application Services with Open-Source tools

So far we have talked above AWS networking basics, how to run BIG-IP in a VPC, and highly-available deployment footprints. In this post, we’ll move on to my favorite topic, orchestration.   By this point, you probably have several VMs... Read more
Average Rating: 4.9
5 Reviews

F5 Predicts: Education gets personal

The topic of education is taking centre stage today like never before. I think we can all agree that education has come a long way from the days where students and teachers were confined to a classroom with a chalkboard. Technology now underpins... Read more
0 Reviews

F5 + Blue Medora: Gain Control of Your Applications with vRealize

Together with F5 and Blue Medora, extend the view of the VMware vRealize Operations management platform with a BIG-IP Plug-in Management Pack directly available from VMware Solution Exchange. This allows customers to monitor the critica... Read more
0 Reviews

DevOps 101 - Collaboration

In my previous articles on the history of DevOps, I outlined the following pillars of the DevOps methodology Management Integration Communication and information sharing Collaboration Automation Measurement The Fourth Pillar The fourth pillar... Read more
0 Reviews

雲端安全顧慮:無端的猜疑?

This blog is adapted from the original post here.  企業組織採納雲端技術可以帶來許多不可否認的效益,包括成本節省、商務敏捷性、以及讓使用多種運算裝置的員工們達到更好的生產力。根據IDC所做的第五個年度終端使用者調查,亞太區資訊長(CIO)在2013年增加50%的雲端服務與技術支出,達到75億美元。再者,他們對於要使用何種類型的雲端模式以及要在雲端之上執行何種工作負荷,也都有必較特定的選擇。IDC在最近的Vendor... Read more
0 Reviews

IT安全性不能以一種方案「一體適用」

This is adapated from the original post by Matt Miller. 今天的安全局勢具有高度複雜化的傾向,原因大致上可以歸咎於日益複雜化的網路攻擊本質,特別是從管理者的觀點來看。例如,分散式拒絕服務攻擊(DDoS)現在已達到400Gbps速度,目標包括網路和應用層。很顯然的,攻擊者持續進化,開發其他方法來繞過包括防火牆等傳統安全防護。 對於面對應用層DDoS攻擊威脅的企業而言,必須克服的挑戰在於如何區分人類流量與魁儡(bot)流量。 ... Read more
0 Reviews

DevOps 101 - Communication

In my previous article on the history of DevOps, I outlined the following pillars of the DevOps methodology Management Integration Communication and information sharing Collaboration Automation Measurement The Third Pillar The third pillar in the... Read more
0 Reviews