Learn F5 Technologies, Get Answers & Share Community Solutions Join DevCentral

Filter by:
  • Solution
  • Technology

Articles

Sort results

F5預測:智慧應用網路趨勢 教育邁向個人化

This is a localised version of the original article here. 科技改變了所有產業,教育也不例外,教育課題從未像今天這樣受到關注。我相信大家都同意教育已歷經了重大的改變,學生和教師不再像以前那樣被局限在一間掛著黑板的教室。 現在,網際網路成為主要的促成機制,學生藉由它聚集在一起,傳播理念和發掘經濟機會。教育資源已成為一個熱門的主題,對學生的學習方式帶來改變。Johns Hopkins大學教育研究與改革中心教授Steven... Read more
0 Reviews

F5 Predicts: Education gets personal

The topic of education is taking centre stage today like never before. I think we can all agree that education has come a long way from the days where students and teachers were confined to a classroom with a chalkboard. Technology now underpins... Read more
0 Reviews

On Cloud Nine: Lucky 7 questions you have about Singapore’s journey to becoming a Smart Nation

The Infocomm Development Authority (IDA) wants to make Singapore the world’s first Smart Nation, and this vision means connecting devices, things and people to provide better quality of life in an era of mobility, urban density, aging population... Read more
0 Reviews

雲端安全顧慮:無端的猜疑?

This blog is adapted from the original post here.  企業組織採納雲端技術可以帶來許多不可否認的效益,包括成本節省、商務敏捷性、以及讓使用多種運算裝置的員工們達到更好的生產力。根據IDC所做的第五個年度終端使用者調查,亞太區資訊長(CIO)在2013年增加50%的雲端服務與技術支出,達到75億美元。再者,他們對於要使用何種類型的雲端模式以及要在雲端之上執行何種工作負荷,也都有必較特定的選擇。IDC在最近的Vendor... Read more
0 Reviews

IT安全性不能以一種方案「一體適用」

This is adapated from the original post by Matt Miller. 今天的安全局勢具有高度複雜化的傾向,原因大致上可以歸咎於日益複雜化的網路攻擊本質,特別是從管理者的觀點來看。例如,分散式拒絕服務攻擊(DDoS)現在已達到400Gbps速度,目標包括網路和應用層。很顯然的,攻擊者持續進化,開發其他方法來繞過包括防火牆等傳統安全防護。 對於面對應用層DDoS攻擊威脅的企業而言,必須克服的挑戰在於如何區分人類流量與魁儡(bot)流量。 ... Read more
0 Reviews

Proud to win, Humbled to serve – F5 wins APAC Awards

In recent weeks, the award bells have been ringing for F5 in Asia Pacific. We’ve bagged not one, but four awards, showing a clear testament to our continued market and technological leadership. F5 has always been committed to delivering a holistic... Read more
0 Reviews

UAE Cybersecurity Threat Landscape Growing in Intensity and Complexity

Leading UAE IT decision-makers agree that cybersecurity threats are growing in intensity and scale across the region.  According to a new survey commissioned by F5 Networks, 81% of surveyed IT decision-makers believed their organisation... Read more
0 Reviews

آخر تطورات مشهد تهديدات الأمن الالكتروني في المملكة العربية السعودية "الهجمات أصبحت أكثر قوةً وتعقيداً من أي وقت مضى"

: أقر كبار صناع القرار في قطاع تقنية المعلومات بالمملكة العربية السعودية بأن التهديدات الالكترونية تتنامى بشدة وعلى نطاق واسع في جميع أنحاء المملكة، ما يعرض الشركات لمخاطر إصابة سمعتها ومكانتها وبنيتها الأساسية. وقد أظهرت نتائج الدراسة... Read more
0 Reviews

Saudi Cybersecurity Threat Landscape “More Intense and Complex Than Ever”

Leading Saudi IT decision-makers agree that cybersecurity threats are growing in intensity and scale across the Kingdom. The situation is putting businesses at risk of hits to both reputation and bottom line. A new survey commissioned by F5... Read more
0 Reviews

The Internet of...(Drum Roll Please)...Band-Aids?!?

Last week I told you about my family's experience with an under the skin glucose sensor that tracks blood sugar levels. While this Internet of Things trend often takes the form of a thermostat, light bulb or coffee machine, the medical field... Read more
0 Reviews

アジア・太平洋地域におけるクラウドの状況 ― 第一部

このブログポストはアジア・太平洋地域のクラウドに関する一連の記事の第一部です。アジア・太平洋地区のクラウドの状況、どのように使用されているか、利用を妨げているもの、イノベーションのためのクラウドの活用方法等が含まれています。 アジア・太平洋地域のクラウド環境は、欧米と比較すると採用数と成熟度に欠けてはいるものの、急速に成長しています。International Data... Read more
0 Reviews

F5 predicts: IT departments to become brokers

IT brokers In this rapidly evolving age of technology, business demands are constantly changing. New technology innovations are introduced into the market at a dizzying rate. IT departments have the core role of providing technology solutions for... Read more
0 Reviews

Taking the driver’s seat in the App-centric journey

The app economy has taken hold of the world at lightning pace. It is as much social and cultural as it is economic. At its core is how it affects and engages the wider technology landscape. Connectivity is no longer a mere mechanism ... Read more
0 Reviews

SSL Heartbleed 취약성: 영향과 대응책 (part 2)

(1부에서 계속) 그렇다면 클라우드는? 깊은 지식을 가지고 있는 독자라면 클라우드 컴퓨팅은 자신의 독자적인 Heartbleed 위협 프로파일을 가지고 있음을 눈치챘을 것이다. 그것은 사실이며, 특정 클라우드의 구축 상황에 따라 위협의 강도가 다르기 때문이다. 전형적인 LAMP 클라우드 사이트: 전형적인 클라우드 사이트는 Apache, MySQL 및 PhP가 구동되는 리눅스 배포 (보통 줄여서 LAMP라고 불린다) 인스턴스들을 포함하고... Read more
0 Reviews

F5 Automated Backups - The Right Way

Hi all,   Often I've been scouring the devcentral fora and codeshares to find that one piece of handywork that will drastically simplify my automated backup needs on F5 devices. Based on the works of Jason Rahm in his post "Third... Read more
Average Rating: 4.9
5 Reviews

F5 Predicts: Internet of Things Drives Demand for ‘Social Intelligence’

‘Innovation distinguishes between a leader and a follower’, Steve Jobs once famously said. A saying that is crucial for organizations in their efforts to be a ‘global player’. There are currently lots of innovation areas in the technology space,... Read more
0 Reviews

DNS Protection and Performance, Have Both!

There has never been a better time to cripple the Internet by exploiting the vulnerabilities of DNS systems. The proliferation of mobile devices coupled with vulnerabilities of open source DNS systems is keeping a lot of organizations awake at... Read more
0 Reviews

F5 Networks - Dell Storage Forum 2012

W. Curtis Preston spricht auf dem Dell Storage Forum in Paris, Frankreich mit Mark Govan, EMEA Storage Manager von F5 Networks. Das Thema ist F5‘s ARX (Adaptive Resource Switch), eine Lösung, die es Kunden ermöglicht, mehr... Read more
0 Reviews

Oracle OpenWorld 2012: BIG-IP Optimizing Oracle GoldenGate

I interview F5 Product Manager, Dawn Parzych, to learn more about F5's Optimization Solutions for Oracle GoldenGate replication software and how BIG-IP WOM can greatly reduce bandwidth and significantly improve throughput performance by... Read more
0 Reviews

Oracle OpenWorld 2012: BIG-IP ASM and Oracle Database Firewall Integration

I meet with F5 Business Development Solution Architect, Chris Akker to show the BIG-IP ASM integration with Oracle's Database Firewall. A layered, defense-in-depth approach along with the contextual information needed for digital forensic... Read more
0 Reviews

Cloud vs Cloud

The Battle of the Clouds Aloha!  Welcome ladies and gentleman to the face off of the decade.  The Battle of the Clouds.  In this corner, the up and comer, the phenom that has changed the way IT works, wearing the light shorts - The... Read more
0 Reviews

The Challenges of SQL Load Balancing

#infosec #iam load balancing databases is fraught with many operational and business challenges. While cloud computing has brought to the forefront of our attention the ability to scale through duplication, i.e. horizontal scaling or “scale... Read more
1 Review

Taking Comfort In Understanding File Virtualization Terminology

Have you ever began boarding an airplane and thought to yourself, "Wow, this plane is huge… and it's about to fly through the air? How crazy is that?" To make myself feel better I like to see the man or women behind th... Read more
0 Reviews

Einladung zu den F5 Webinars im März – Security und Storage

Gleich 2 Webinare erwarten Sie im März, zu denen ich Sie hiermit herzlich einladen möchte. Die Unified Security Architektur mit BIG-IP In diesem Webinar möchten wir Ihnen aufzeigen, welch umfassende Securitylösungen Sie mit... Read more
0 Reviews

8.3 Alternate Names With ARX

Summary 8.3 names are a relic of the 1980’s, when the FAT12 and FAT16 file systems used in MS-DOS did not have a provision for arbitrarily-long filenames. In those days, names could have at most eight characters, followed by a single period, and... Read more
0 Reviews