Learn F5 Technologies, Get Answers & Share Community Solutions Join DevCentral

Filter by:
  • Solution
  • Technology

Articles

Sort results

Multiple Stream Protocols, eBooks, And You.

EBook readers are an astounding thing, if you really stop and think about it. Prior to their creation, how could you reasonably have hundreds or thousands of books in one place, all the notes you took and highlighting you wanted to do, and your... Read more
0 Reviews

The Magic of Mobile Cloud

It’s like unicorns…and rainbows! #mobile Mark my words, the term “mobile” is the noun (or is it a verb? Depends on the context, doesn’t it?) that will replace “cloud” as the most used and abused and misapplied term in technology in the coming... Read more
0 Reviews

Learning EMC server_stats for statistic collection

Once upon a time, not too long ago, the EMC's command line interface utilized a few known commands for gathering statistics. The commands I grew used to were called server_cifsstat and server_nfsstat but then one day when I called upon their... Read more
0 Reviews

File Virtualization Performance: Understanding CIFS Create ANDX

Once upon a time, files resided on a local disk and file access performance was measured by how fast the disk head accessed the platters, but today those platters may be miles away; creating, accessing and deleting files takes on a ne... Read more
0 Reviews

The IPv6 Application Integration Factor

#IPv6 Integration with partners, suppliers and cloud providers will make migration to IPv6 even more challenging than we might think… My father was in the construction business most of the time I was growing up. He used to joke with us when we... Read more
0 Reviews

The Many Faces of DDoS: Variations on a Theme or Two

Many denial of service attacks boil down to the exploitation of how protocols work and are, in fact, very similar under the hood. Recognizing these themes is paramount to choosing the right solution to mitigate the attack. When you look across the... Read more
0 Reviews

Google SPDY Protocol Would Require Mass Change in Infrastructure

Google’s desire to speed up the web via a new protocol is laudable, but the SPDY protocol would require massive changes across networks to support ArsTechnica had an interesting article on one of Google’s latest projects, a new web protocol... Read more
0 Reviews

The API Is the New CLI

Infrastructure 2.0, from a purely developmental standpoint, is about APIs. It’s about offering up the functionality and capabilities of a wide variety of infrastructure – network, storage, and application network – to be externally controll... Read more
0 Reviews

WILS: Application Acceleration versus Optimization

Why do application delivery vendors talk about both? Aren’t they the same thing? In general, acceleration implies that something will be done to the application: caching, compression, etc… The actual behavior of the application is changed such... Read more
0 Reviews

Two Different Sock(et)s

The importance of a full-proxy architecture to application delivery, security, cloud computing, and virtualization People often describe the act of changing focus from one related but distinct task to another as “wearing two different hats.”... Read more
0 Reviews

Use The Source, Luke!

Is ESB just an expensive integration hub or is there more to the story than we heard… In the beginning, the ESB (Enterprise Service Bus), was marketed as much more than an integration technology. While the core of an ESB is  certainly about... Read more
0 Reviews

We’re sorry. The IPv4 address you are trying to reach has been disconnected.

We know what the problem is. We know what the solution is. So why aren’t we doing something about it? Every year, around April Fools’ day, someone pulls out the old “Internet Spring Cleaning” gag. For those of us who are not technical neophytes... Read more
0 Reviews

Do you control your application network stack? You should.

Owning the stack is important to security, but it’s also integral to a lot of other application delivery functions. And in some cases, it’s downright necessary. Hoff rants with his usual finesse in a recent posting with which I could not agree... Read more
0 Reviews

The ironic truth about the ugly truth about web application acceleration

Lately I've been seeing quite a few links to a white paper popping up in my alerts and feed-reader. Regardless of who's linking to it, it generally reads as promising to reveal some grand secret about how web application acceleration is an... Read more
0 Reviews

Moore's law is a double-edged sword

In the good old days when I was in college I had a generic PC. That's the way we did it back then - we built our PCs out  of parts (obligatory "you kids don't know how good you have it these days" look). On that PC is... Read more
0 Reviews

New TCP vulnerability about trust, not technology

I read about a "new" TCP flaw that, according to C|Net News, Related Posts puts Web sites at risk. There is very little technical information available; the researchers who discovered th... Read more
0 Reviews

Dear Data Center Guy

You walked past me again today without stopping. I remember when you used to stop and admire my glowing red ball every day. But that was back when I was brand new and you thought I was the center of your data center. I heard you talking to some... Read more
0 Reviews

How Coding Standards Can Impair Application Performance

One of the "real world" lessons rarely taught in the university setting is that in the "real world" you're going to have to follow coding standards. Back in the day, when I was allowed to code, I often railed against some... Read more
0 Reviews

Horizontal and Vertical Security: Which do you need?

No one questions the need to secure applications today, we just argue over how we should do it. Let's take a break for a minute from that debate to ensure that we don't get so focused on layer 7 (application) that we forget about the rest... Read more
0 Reviews

HTTP: The de facto application transport protocol of the Web

When the OSI defined its model it included a transport layer which was supposed to handle end-to-end connections and address communication reliability. In the early days of the web HTTP sat at the application layer (layer 7) and rode atop TCP, its... Read more
0 Reviews