Learn F5 Technologies, Get Answers & Share Community Solutions Join DevCentral

Filter by:
  • Solution
  • Technology

Articles

Sort results

BYOD Policies – More than an IT Issue Part 5: Trust Model

#BYOD or Bring Your Own Device has moved from trend to an permanent fixture in today's corporate IT infrastructure. It is not strictly an IT issue however. Many groups within an organization need to be involved as they grapple with the risk of... Read more
0 Reviews

BYOD Policies – More than an IT Issue Part 3: Economics

#BYOD or Bring Your Own Device has moved from trend to an permanent fixture in today's corporate IT infrastructure. It is not strictly an IT issue however. Many groups within an organization need to be involved as they grapple with the risk of... Read more
0 Reviews

BYOD Policies – More than an IT Issue Part 1: Liability

#BYOD or Bring Your Own Device has moved from trend to an permanent fixture in today's corporate IT infrastructure. It is not strictly an IT issue however. Many groups within an organization need to be involved as they grapple with the risk of... Read more
0 Reviews

Bait Phone

You may be familiar with the truTV program Bait Car, where the police place a vehicle equipped with hidden cameras and radio trackers in various areas to catch a would be car thief in the act.  It’s kinda fun to watch people ‘check out’ the... Read more
0 Reviews

Dreaming of Work

Say What?!?  Instead of counting sheep, I can count how many emails I need to answer in the morning?  Sure can…at least according to a recent Good Technology survey that indicates that we are working more – an average of 7 hours more per... Read more
0 Reviews

What’s in Your Smartphone?

Typical smartphone owners have an average of 41 apps per device, 9 more than they had last year according to the recent Nielsen report, State of the Appnation – A Year of Change and Growth in U.S. Smartphones.  Also last year, less than 40%... Read more
0 Reviews

Where Do You Wear Your Malware?

The London Stock Exchange, Android phones and even the impenetrable Mac have all been malware targets recently.  If you’re connected to the internet, you are at risk.  It is no surprise that the crooks will go after whatever device... Read more
0 Reviews

CloudFucius Wonders: Can Cloud, Confidentiality and The Constitution Coexist?

This question has been puzzling a few folks of late, not just CloudFucius.  The Judicial/legal side of the internet seems to have gotten some attention lately even though courts have been trying to make sense and catch up with technology fo... Read more
0 Reviews