Learn F5 Technologies, Get Answers & Share Community Solutions Join DevCentral

Filter by:
  • Solution
  • Technology

Articles

Sort results

HP Discover and what F5 bring to the party

There are only a couple of weeks to go before HP Discover, taking place this year in Frankfurt on 4-6 December.  HP is a big organisation with lots of end user and vendor touchpoints.  The short video below, by F5's Alasdair... Read more
0 Reviews

DNSSEC – the forgotten security asset?

An interesting article from CIO Online last month explained how DNS had been used to identify over 700 instances of a managed service provider’s customers being infected with malware. The MSP was able to determine the malware using DNS. As the... Read more
0 Reviews

Context. SDN. Big Data. Security. Cloud.

That's right, something for everyone.  F5 recently attended IP Expo in the UK.  We had some speaker sessions at the event - some readers might have come along and seen them live.  The event organisers did a nice job of filming... Read more
0 Reviews

"Why Legacy Security Systems are Failing"

As explained by Nathan Pearce during a presentation at the National Security Conference in the UK earlier this year.  Non-technical, real-life, worth taking a few minutes to listen to: Read more
0 Reviews

VMworld 2012 Europe - Strobel's Scribblings, Part IV

The last installment...sniff...from F5's Frank Strobel at VMworld in Barcelona: One man's end is another's beginning... While VMworld EMEA 2012 came to an end today, something else saw its first light: @F5VMW The latest member to the... Read more
0 Reviews

VMworld 2012 Europe - Strobel's Scribblings, Part III

More from Frank Strobel, live from VMworld 2012 in Barcelona.  Today, 16,000 feet and a tale of two booths... At the end of another 10 hour day at VMworld in Barcelona, my feet started hating me.  At least, they clearly express their... Read more
0 Reviews

VMworld 2012 Europe - Strobel's Scribblings, Part I

The first of what will be a series of reports from Barcelona...F5's Frank Strobel wraps-up Day Zero's events: ---------- Normal 0 false false false EN-US X-NONE... Read more
0 Reviews

Policy is key for protection in the cloud era

Today, companies host mission-critical systems such as email in the cloud, which contain both customer details, company-confidential information and without which, company operations would grind to a halt. Although cloud providers were forced to... Read more
0 Reviews

VMware’s Mobile Secure Desktop Bootcamp…

F5 features heavily on Day 4 of the VMware View Mobile Secure Desktop Bootcamp.  Click through to VMware’s End User Computing Blog here (or see below) for free-on-demand training.  As F5’s Lori MacVittie posts here, “by combining BIG-IP... Read more
0 Reviews

Microsoft server virtualisation: 'How To' videos

We have added nine new videos to illustrate how F5 technologies help optimise specific applications and Microsoft server virtualisation solutions: Video 1: Introducing F5 Application Ready Solutions – Explains how F5® solutions... Read more
0 Reviews

Videos from F5's recent Agility customer / partner conference in London

A week or so ago, F5 in EMEA held our annual customer / partner conference in London.  I meant to do a little write-up sooner but after an incredibly busy conference week I flew to F5's HQ in Seattle and didn't get round to posting... Read more
0 Reviews

Clarity & Control In The Private Cloud

The private cloud doesn't just happen. It is not a simple case of powering up a private cloud server and pressing start. Virtualisation is all about the management of both data and applications - and this requires a deep level of resource... Read more
0 Reviews

Migrating DevCentral to the Cloud

It was a huge undertaking and not without considerable concern, but we’re delighted to announce that DevCentral has now fully migrated to the Cloud thanks to our collaboration with Bluelock who provided us with the advanced Cloud design we... Read more
0 Reviews

Information Age 'How To' Guide to securing the enterprise

From secure remote access tips to technical precautions to defend web app functionality, this guide, published in conjunction with Information Age, has it all. Contributors include several of F5's best security people. Read more
0 Reviews

Data Diversity: a leading UK tech writer posts…

To change things up a little TechView has invited tech luminary Adrian Bridgwater to share a few thoughts on Big Data and related management issues.  More about Adrian can be found at the end of this post.  He can be found in many ... Read more
0 Reviews

Watch out for cloud congestion

F5's Lori MacVittie recently wrote a piece for ZDNet on cloud congestion and I thought I'd summarise it for our UK TechView readers: As cloud-based application usage continues to increase among consumers and corporate employees and more... Read more
0 Reviews

Mobile Device Support for VMware View

End user computing means that a wide range of mobile devices from laptops to tablets and from desktops to smartphones are being used. The diversity of these mobile devices and the sheer number of them in the workplace can overwhelm IT and strain... Read more
0 Reviews

He Who Defends Everything Defends nothing… Right?

There has been much  made in Information Technology about the military quote: “He Who Defends Everything Defends Nothing” – Originally uttered by Frederick The Great of Prussia. He has some other great quotes, check them out when you have a... Read more
0 Reviews

On the move: connecting users to apps

Whether it be traffic flow, water flow or the flow of commerce, there exist points within these flows where control mechanisms are applied. These control points might be simple - like traffic lights - or complex - like power distribution for a... Read more
0 Reviews

Toll Booths and Dams. And Strategic Points of Control

An interesting thing about toll booths, they provide a point at which all sorts of things can happen. When you are stopped to pay a toll, it smooths the flow of traffic by letting a finite number of vehicles through per minute, reducing congestio... Read more
0 Reviews

You Say Tomato, I Say Network Service Bus

It’s interesting to watch the evolution of IT over time. I have repeatedly been told “you people, we were doing that with X, back before you had a name for it!” And likely, the speaker is telling the truth, as far as it goes. Seriously, while th... Read more
0 Reviews

What Is Your Reason for Virtualization and Cloud, Anyway?

Gear shifting in a modern car is a highly virtualized application nowadays. Whether you’re driving a stick or an automatic, it is certainly not the same as your great grandaddy’s shifting (assuming he owned a car). The huge difference between ... Read more
0 Reviews

What CIOs Can Learn from the Spartans

When your data center is constantly under pressure to address operational risks, try leveraging some ancient wisdom from King Leonidas and William Wallace The Battle of Thermopylae is most often remembered for the valiant stand of the... Read more
0 Reviews