Learn F5 Technologies, Get Answers & Share Community Solutions Join DevCentral

Filter by:
  • Solution
  • Technology

Articles

Sort results

VMworld2012: VMware View Single Namespace

I catch up with F5 SE Scott Friedman to whiteboard and discuss F5's Single Namespace solution for VMware View.  Only 1 URL to remember and let BIG-IP make the decisions. ps Read more
0 Reviews

The Changing Security Threat Landscape Infographic

In conjunction with a new video and a security white paper, this F5 infographic validates the need for organizations to rethink security practices.  The global security threat landscape is rapidly evolving and has changed dramatically in ways... Read more
0 Reviews

What’s in Your Smartphone?

Typical smartphone owners have an average of 41 apps per device, 9 more than they had last year according to the recent Nielsen report, State of the Appnation – A Year of Change and Growth in U.S. Smartphones.  Also last year, less than 40%... Read more
0 Reviews

Cloud Security With FedRAMP

Want to provide Cloud services to the federal government?  Then you’ll have to adhere to almost 170 security controls under the recently announced Federal Risk and Authorization Management Program.  The program, set to go live in June,... Read more
0 Reviews

The Top 10, Top Predictions for 2012

Around this time of year, almost everyone and their brother put out their annual predictions for the coming year.  So instead of coming up with my own, I figured I’d simply regurgitate what many others are expecting to happen.  ... Read more
0 Reviews

The New Wallet: Is it Dumb to Carry a Smartphone?

When I was a teenager, I used to have one of those cool nylon surfer wallets with the Velcro close, you remember those don’t ya?  While pumping diesel (had a VW Rabbit) one day at an old Gulf station, I left the wallet on top of the car and... Read more
0 Reviews

CloudFucius’ Money: Trickles to the Cloud

No, I’m not investing some seed money in a cool new company or technology but banks are certainly looking to take advantage of cloud computing services.  At least that’s the message from a recent survey by Bank Systems & Technology an... Read more
0 Reviews

CloudFucius Wonders: Can Cloud, Confidentiality and The Constitution Coexist?

This question has been puzzling a few folks of late, not just CloudFucius.  The Judicial/legal side of the internet seems to have gotten some attention lately even though courts have been trying to make sense and catch up with technology fo... Read more
0 Reviews

F5 BIG-IP Edge Gateway Performance Demo

Watch how F5 has solved the security plus acceleration challenge for remote users.  Demo shows how BIG-IP Edge Gateway is twice as fast as the competition at downloading a 5MB Microsoft SharePoint file.  A powerful example of... Read more
0 Reviews

Dan Kaminsky Interview Part I

Peter Silva of F5 sits down with IOActive's Dan Kaminsky. In this extremely informative and lively discussion, the Domain Name System is the topic. DNS infrastructure, DNS vulnerabilities including DNS Cache Poisoning, DNSSEC and what's... Read more
0 Reviews
0 Reviews

The State of My Blog Address

Readers, distinguished bloggers, various feeds - A year ago this week, I crossed over into double-digit blog entries (a whopping 10 stories at the time but a relative blog newcomer) and was wondering what magical rant would make this Blog Go to... Read more
0 Reviews

Cybercrime, the Easy Way

The Dummies series is a great collection of ‘How to’ instructions on a wide array of topics and while they have not published a ‘Cybercrime for Dummies®’ booklet (and don’t think they will), DYI Cybercrime Kits are helping drive Internet... Read more
2 Reviews

New Decade, Same Threats?

Do I call it Twenty-Ten or Two Thousand Ten?  Just not Two Thousand and Ten since that pesky decimal takes us back 10 years.  Eh, either way, the new year and decade brings out all the predictions for the coming year with this one taking... Read more
0 Reviews

IPv6 and the End of the World

There’s always been a certain amount of conspiracy theories when security type events happen or instances where there is secrecy. There are those who don’t buy the ‘reported’ reason a security event (like a breach) occurred, those who claim to... Read more
0 Reviews