Learn F5 Technologies, Get Answers & Share Community Solutions Join DevCentral

Filter by:
  • Solution
  • Technology
Clear all filters

Articles

Sort results

Identity Gone Wild! Cloud Edition

#IAM #cloud #infosec Identity lifecycle management is out of control in the cloud Remember the Liberty Alliance? Microsoft Passport? How about the spate of employee provisioning vendors snatched up by big names like Oracle, IBM, and CA? That... Read more
0 Reviews

F5 Friday: Secure Remote Access versus En Masse Migration to the Cloud

Being too quick to shout “cloud” when the solution may be found elsewhere can lead to unintended consequences. As with all technology caught up in the hype cycle, cloud computing is often attributed with being “the solution” to problems... Read more
0 Reviews

VMworld 2011: F5 BIG-IP v11 iApps for Citrix

The bonus VMworld2011 video - like the special features of a DVD! This was shot by our good friends at Dell and originally posted to the Dell TechCenter home page and Dell TechCenter YouTube channel. I interview F5 Solution Architect, Michael... Read more
0 Reviews

VMworld 2011: VDI Single Namespace

I chat with F5 Technical Marketing Manager Alan Murphy who whiteboards the VDI Single Namespace solution.  Instead of having to find your virtual desktop, have your virtual desktop follow you. <font... Read more
0 Reviews

Who In The World Are You?

Steven Wright has said, 'It's a small world, but I wouldn't want to paint it.' The world is getting smaller with today's 24/7 global marketplace. Businesses have offices and employees around the world to serve the needs of the... Read more
0 Reviews

F5 Friday: Join Robin “IT” Hood and Take Back Control of Your Applications

Mobile users. cloud computing . End-runs around IT security by developers. The trend has always existed, it’s just speeding up now. IT needs to take back control – and fast. But first IT needs the tools with which to do that… Let’s ignore the... Read more
0 Reviews

F5 Friday: The Dynamic VDI Security Game

Balancing security, speed, and scalability is easy if you have the right infrastructure. A dynamic infrastructure. All the talk about “reusing” and “sharing” resources in highly virtualized and cloud computing environments makes it sound... Read more
0 Reviews

WILS: The Importance of DTLS to Successful VDI

One of the universal truths about user adoption is that if performance degrades, they will kick and scream and ultimately destroy your project. Most VDI (Virtual Desktop Infrastructure) solutions today still make use of traditional... Read more
0 Reviews

F5 Friday: Beyond the VPN to VAN

Web 2.0 and cloud computing have naturally pushed all things toward application-centric views, why not the VPN? When SSL VPNs were first introduced they were a welcome alternative to the traditional IPSEC VPN because they reduced the... Read more
0 Reviews

Securing the Other Side of the Cloud

Why would miscreants bother with other routes when they can go straight to the source? People concerned with security of the cloud are generally worried about illegitimate access of the applications and data they may deploy in the cloud.... Read more
0 Reviews

The Virtual Public-Private Cloud Connection

Secure, optimized tunnels to a remote site, e.g. the cloud. Haven’t we been here before? In the continuing discussion around Business Intelligence in the cloud comes a more better (yes I did, in fact, say that) discussion of the reasons why... Read more
0 Reviews

Curing the Business-class Broadband Blues with Cloud Computing

One of the most affordable options for small and medium businesses in terms of Internet connectivity is business-class service from cable and telco providers like Time Warner Cable, Cox, Verizon, and AT&T. Unfortunately, the definition of... Read more
0 Reviews

OMG! A VPN can secure connections into cloud computing hosted services

SC Magazine reports that (1) cloud computing environments may not be very secure and (2) a VPN can improve the security of cloud computing environments. Countering cloud computing threats via SC Magazine Technology such as two-factor... Read more
0 Reviews
0 Reviews