Learn F5 Technologies, Get Answers & Share Community Solutions Join DevCentral

Filter by:
  • Solution
  • Technology

Articles

Sort results

Applying ‘Centralized Control, Decentralized Execution’ to Network Architecture

#SDN brings to the fore some critical differences between concepts of control and execution While most discussions with respect to SDN are focused on a variety of architectural questions (me included) and technical capabilities, there’s another... Read more
0 Reviews

Never attribute to technology that which is explained by the failure of people

#cloud Whether it’s Hanlon or Occam or MacVittie, the razor often cuts both ways. I am certainly not one to ignore the issue of complexity in architecture nor do I dismiss lightly the risk introduced by cloud computing through increased... Read more
0 Reviews

F5 Friday: Ops First Rule

#cloud #microsoft #iam “An application is only as reliable as its least reliable component” It’s unlikely there’s anyone in IT today that doesn’t understand the role of load balancing to scale. Whether cloud or not, load balancing is the key... Read more
0 Reviews

Mobile versus Mobile: 867-5309

#mobile #context The identity crisis created by common platforms negatively impacts the ability to serve consumers and corporate IT consistently The focus on the explosion of mobile devices is heavily weighted toward IT in terms of management... Read more
0 Reviews

F5 and Traffix: When Worlds Collide

#mwc12 #traffix #mobile Strategic points of control are critical to managing the convergence of technology in any network - enterprise or carrier What happens when technology converges? When old meets new? A fine example of what might happen... Read more
0 Reviews

Mobile versus Mobile: An Identity Crisis

#mobileThe expansive options consumers revel in creates an identity crisis for IT that is best resolved via context-aware mobile mediation. Back in the days of the browser wars, when standards were still largely ignored and the battle for the... Read more
0 Reviews

BFF: Complexity and Operational Risk

#adcfw The reason bars place bouncers at the door is because it’s easier and less riskier to prevent entry than to root out later No one ever said choosing a career in IT was going to be easy, but no one said it had to be so hard you’d be... Read more
0 Reviews

F5 Friday: Latency, Logging, and Sprawl

#v11 Logging, necessary for a variety of reasons in the data center, can consume resources and introduce undesirable latency. Avoiding that latency improves application performance and in some cases, the quality of logs. Logging. It’s... Read more
0 Reviews

Strategic Trifecta: Access Management

#mobile A single, contextual point of control for access management can ease the pain of managing the explosion of client devices in enterprise environments. Regardless of the approach to access management, ultimately any solution must include... Read more
0 Reviews

F5 Friday: If Data is King then Storage Virtualization is the Castellan

The storage virtualization layer is another strategic point of control in the data center where costs can be minimized and resource utilization maximized. In olden times of lore, the king may have been top dog but it was the castellan through... Read more
0 Reviews

F5 Friday: The Dynamic Control Plane

It’s not just cloud computing and virtualization that introduce volatility into the data center. The natural state of cloud computing is one of constant change. Applications and services and users interacting in ways that constantly change... Read more
0 Reviews

Solutions are Strategic. Technology is Tactical.

And it all begins with the business. Last week was one of those weeks where my to-do list was growing twice as fast as I was checking things off. And when that happens you know some things end up deprioritized and just don’t get the attention... Read more
0 Reviews

F5 Friday: The Art of Efficient Defense

It’s not enough to have a strategic point of control; you’ve got to use it, too. One of the primary threats to the positive operational posture of an organization is that of extremely heavy load. Whether it’s from a concerted effort to take... Read more
0 Reviews

How to Build a Silo Faster: Not Enough Ops in your Devops

We need to remember that operations isn’t just about deploying applications, it’s about deploying applications within a much larger, interdependent ecosystem. One of the key focuses of devops – that hardy movement that seeks to bridge the gap... Read more
0 Reviews

The “True Security Company” Red Herring

The claim a company is not a “true security company” because they don’t focus solely on security products is a red herring. If I ask you to define a true security company, you might tend to fall back on the most obvious answer, “Well, it’s a... Read more
0 Reviews

More Users, More Access, More Clients, Less Control

It used to be that “mobile” access implied “remote” access. That’s no longer true. As the variety of clients continue to expand along with the venues from which we users can access corporate resources the ability to intelligently enforce... Read more
0 Reviews

Don’t Conflate Virtual with Dynamic

Focusing on form factor over function is as shallow and misguided as focusing on beauty over brains. The saying goes that if all you have is a hammer, everything looks like a nail. I suppose then that it only makes sense that if the only tool you... Read more
0 Reviews

What We Learned from Anonymous: DDoS is now 3DoS

It’s not just that attacks are distributed, but that attacks are also diverse in nature – up and down the stack, at the same time. If Anonymous has taught us anything it’s that the future of information security is in fending off attacks across... Read more
0 Reviews

Guest View: “The Grasshopper and the Ant: A Fable for Developers and IT”

Control isn’t just about technology. Sometimes control of strategy is just as essential to ensuring success. The Grasshopper and the Ant: A Fable for Developers and IT(http://bit.ly/8XboZ7) by Jake Sorofman, Chief Marketing Officer, rPath,... Read more
0 Reviews

The Multi-Generational Datacenter: From Toddlers to Teenagers

Managing a datacenters is often like managing a multi-generational family – you’ve got applications across a variety of life stages that need to be managed individually, and keeping costs down while doing so is a concern. Those who know Don and I... Read more
0 Reviews

Agile Operations: A Formula for Just-In-Time Provisioning

One of the ways in which traditional architectures and deployment models is actually superior (yes, I said superior) to cloud computing is in provisioning.  Before you label me a cloud heretic, let me explain. In traditional... Read more
0 Reviews

What is a Strategic Point of Control Anyway?

From mammoth hunting to military maneuvers to the datacenter, the key to success is control Recalling your elementary school lessons, you’ll probably remember that mammoths were large and dangerous creatures and like most animals they were quite... Read more
0 Reviews

Is Your Application Infrastructure Architecture Based on the Postal Service Delivery Model?

If it is, you might want to reconsider how you’re handling security, acceleration, and delivery of your applications before users “go postal” because of poor application performance. Sometimes wisdom comes from the most unexpected places.... Read more
0 Reviews