Learn F5 Technologies, Get Answers & Share Community Solutions Join DevCentral

Filter by:
  • Solution
  • Technology

Articles

Sort results

The Top Ten Hardcore F5 Security Features in BIG-IP 12.0

It's time once again for another edition The Top Ten Hardcore Security Features! This time we're looking at Version 12 and all its juicy juiciness. Read more
Average Rating: 4.8
7 Reviews

Managing Horizon Traffic across Multiple Data Centers with BIG-IP DNS

VMware Horizon virtual desktop clients typically use a fully qualified domain name (FQDN) when accessing desktop and application resources. More and more customers are distributing their Horizon application and desktop infrastucture to distribute... Read more
Average Rating: 4.9
4 Reviews

Blog Roll 2015

It’s that time of year when we gift and re-gift, just like this text from last year. And the perfect opportunity to re-post, re-purpose and re-use all my 2015 blog entries. If you missed any of the 89 attempts including 59 videos, here they are... Read more
0 Reviews

F5 SOC webinject Analysis

Recently several e-banking Trojans (Dyre, Cridex, and Tinba, for instance) have used script injection techniques to modify the original web page. The modification may enable the attacker to perform money transactions using victims’ credentials.... Read more
1 Review

How the cloud can improve your security solutions?

The advantage of being in this industry for a while is that you get to see first hand how things change. Mostly for the better, and usually quite quickly, too. Some of these changes have a knock-on effect on other parts of the industry. One... Read more
1 Review

How is SDN disrupting the way businesses develop technology?

While many businesses acknowledge that the benefits of SDN are too big to ignore, there are challenges to overcome, particularly with the cultural changes that it brings. Read more
1 Review

Getting Around the Logon/Legal Banner Issues when using APM PCoIP Proxy and Horizon

If you're using APM's PCoIP Proxy and require a logon banner, you've probably figured out that the PCoIP Proxy integration stops working when you turn on the integrated logon banner from within the Horizon Administrator. Adding to the... Read more
Average Rating: 4.9
3 Reviews

On Cloud Nine: Lucky 7 questions you have about Singapore’s journey to becoming a Smart Nation

The Infocomm Development Authority (IDA) wants to make Singapore the world’s first Smart Nation, and this vision means connecting devices, things and people to provide better quality of life in an era of mobility, urban density, aging population... Read more
0 Reviews

The Inside Scoop on VMworld 2015...

It's that time of year again for VMworld in San Franciso! This year, F5 and VMware are partnering on a few fronts to show the strength and capabilities of our partnership. First, check out the F5 and VMware Hands-on-Lab for End User... Read more
0 Reviews

The disappearance of e in e-Commerce

The day when the lower-case “e” was introduced to define the online nature of a transaction now ceases to have any meaning. In the era of application everything and the highly mobile generation, digital transactions are becoming the norm in most... Read more
0 Reviews

Deliver Resiliency and Scalability with Dell vWorkspace and F5's Local Traffic Manager

Recently, there's been some "buzz" around how to configure Dell vWorkspace components behind BIG-IP's Local Traffic Manager. A few months back, I had the opportunity to work with Stephen Yorke from the Dell vWorkspace team to put... Read more
0 Reviews

HOT OFF THE PRESSES – VMware and F5 Hands-On-Lab Now Available!

VMware and F5 are proud to announce the availability of one of the first partner-centric labs utilizing VMware’s global Hands-On-Lab infrastructure. In close collaboration with the VMware End User Computing Technical Enablement team, the VMware... Read more
2 Reviews

So, you want to use RSA SecurID with APM’s PCoIP Proxy Module…

Customers who leverage Access Policy Manager (APM) for remote access to VMware Horizon 6 (formerly known as VMware View) typically have some level of two-factor authentication (2FA) as an added layer of authentication. It’s especially important... Read more
1 Review

F5 Predicts: Identity theft going viral in Southeast Asia

According to a Symantec report, in Singapore alone, cybercrime cost the average victim S$1,448 (US$1,056) in 2013, three-and-a-half times the global average of US$298. By 2020, the overall impact of cyberattacks on the global economy is estimated... Read more
0 Reviews

2015년도 IT 업계의 새로운 물결 : 소비자 인식의 증대, 공공서비스의 디지털화 및 클라우드에 대한 인식의 변화

Please find the English language post from which this was adapted here. IT 업계 종사자들 대부분이 그렇듯이 나 역시 신기술을 사랑한다. 또한 이런 기술들이 많은 사람들을 위해 기회를 창출하고, 인류의 지식을 발전시키며, 사람과 사람을 연결시켜주는 것과 같이 사실상 우리 삶의 모든 면을 바꾸어 나가는 것을 좋아한다. 작년 한 해 동안만 하더라도 새로운 기술이라고 인식되던 웨어러블... Read more
0 Reviews

RSA2015 – The InfoSec Landscape with Jeremiah Grossman

In a fascinating and fun conversation, InfoSec luminary, web application expert, TEDx speaker and WhiteHat Security Founder, Jeremiah Grossman explains some of the change occurring within information security. Have the never ending breaches... Read more
0 Reviews

Billionaires, Icons and Movie Stars – Why Geek Is Now Chic

Over the past few years we’ve seen the unstoppable rise of the geek. From popular culture to big business, the geeks have inherited the earth. They’re the billionaires, the modern day rock stars, and their many achievements have resulted in a... Read more
0 Reviews

F5 2015 網路世界預測之三 : 雲端並非生而平等

Adapted from What’s new in 2015: consumer hyperawareness, public services going digital, and a shift in the way we view clouds. 雲端重心從促進採納轉向優化   這幾年來,IT產業積極將他們的技術轉移到雲端 - 取代或者複製既有的實體資料中心到雲端。然而,大家對於效率方面並沒有多大的重視,導致一些企業的營運成本甚至超過他們試圖免除的投資成本。 ... Read more
0 Reviews

F5 2015 網路世界預測之二 : 公眾服務轉捩點

Adapted from What’s new in 2015: consumer hyperawareness, public services going digital, and a shift in the way we view clouds. 公眾隱私門檻的降低,促成更完整的線上量身定製服務   人們似乎對於提供過多資訊給政府感到遲疑,然而社交網路的爆炸性成長已讓人們對於分享多樣化的個人資訊感到較為自在。 ... Read more
0 Reviews

F5 2015 網路世界預測之一: 消費者超意識的興起

Adapted from What’s new in 2015: consumer hyperawareness, public services going digital, and a shift in the way we view clouds. ... Read more
0 Reviews

Security is no longer just an IT concern, but is behaviour changing?

If - and it’s a big if - there is a positive to the recent spate of information security headlines, then it could well be that more people will take an interest in the protection of their data and devices. There seems to have been a never ending... Read more
0 Reviews

F5 Networks: Di tahun 2015, ‘Consumer Hyperawareness’ Akan Menjadi Kunci Sukses IT Di Berbagai Perusahaan dan Layanan Publik Akan Beralih Ke Digital

Pada tahun 2014 ini telah terjadi banyak hal menarik yang terjadi di dunia, khususnya dari sisi IT. Contohnya, kita telah melihat beberapa transisi dari suatu hal yang baru menjadi hal yang mainstream; seperti contoh big data yang awalnya masih... Read more
0 Reviews

Gone in 5 seconds! Online shoppers will wait just 5 seconds before switching brand

As the dust settled following our Christmas shopping extravaganza, 2014 was declared by many as a record breaking year digitally, with UK online retail sales exceeding £100bn for first time. However, despite the influx of more and more of our... Read more
0 Reviews

Security: the kingmaker of the ecommerce

The festive shopping season is nearly over. I hope you're ready. I completed my shopping yesterday using what I've coined as TSE. That's Total Shopping Efficiency. To explain, I left my car, completed my shopping and was back... Read more
0 Reviews