Learn F5 Technologies, Get Answers & Share Community Solutions Join DevCentral

Filter by:
  • Solution
  • Technology

Articles

Sort results

Get Social with DevCentral

That title sounds so 2009 but let’s go with it anyway. #Flashback…no, #Throwback…no, how about #TinkerTuesday? Is there such a thing? (There is.) #DevCentral will be ramping up our social activities in 2018 and we wanted to share some of the media... Read more
1 Review

The Applications of Our Lives

The Internet of Things will soon become The Internet of Nouns There are a few 'The ______ of Our Lives' out there: Days. Time. Moments. Love. They define who we are, where we've been and where we are going. And today, many of those... Read more
0 Reviews

Security’s FUD Factor

Had a short but interesting twitter exchange with @securityincite @Gillis57 and @essobi ‏(Mike Rothman, Gillis Jones and not sure (sorry!!) respectively) about using Fear, Uncertainty and Doubt when talking... Read more
0 Reviews

The Best Day to Blog Experiment - Day 4

If you missed the past three days, welcome to The Best Day to Blog Experiment; you are now a participant.  If you are a returning reader, thanks for your participation and for the first time readers, I’ve come across many stories about when... Read more
0 Reviews

Now ReTweet After Me! Ah, Never Mind.

There is some interesting research over on Sysomos Inc. which indicates that 71% of twitter messages get no reaction at all, like a reply or retweet, 85% get one @reply and 92% of the actual retweets happen within the first hour.  Over the... Read more
0 Reviews

Defeating Attacks Easier Than Detecting Them

Defeating modern attacks – even distributed ones – isn’t the problem. The problem is detecting them in the first place. Last week researchers claimed they’ve discovered a way to exploit a basic security flaw that’s used in software that’s in... Read more
0 Reviews

Devops: Controlling Application Release Cycles to Avoid the WordPress Effect

Minimizing the impact of code changes on multi-tenant applications requires a little devops “magic” and a broader architectural strategy Ignoring the unavoidable “cloud outage” hysteria that accompanies any Web 2.0 application outage today,... Read more
0 Reviews

Are You Scrubbing the Twitter Stream on Your Web Site?

Never never trust content from a user, even if that user is another application. Web 2.0 is as much about integration as it is interactivity. Thus it’s no surprise that an increasing number of organizations are including a feed of their recent... Read more
0 Reviews

Are You Scrubbing the Twitter Stream on Your Web Site?

Never never trust content from a user, even if that user is another application. Web 2.0 is as much about integration as it is interactivity. Thus it’s no surprise that an increasing number of organizations are including a feed of their recent... Read more
0 Reviews

F5 Web Media On-Demand

We’ve had some exciting announcements of late, like the BIG-IP Edge Gateway and the BIG-IP LTM VE, and lots of great content has been developed to highlight the benefits of these solutions.   It’s been a while since I’ve updated you... Read more
0 Reviews

How to Gracefully Degrade Web 2.0 Applications To Maintain Availability

I haven’t heard the term “graceful degradation” in a long time, but as we continue to push the limits of data centers and our budgets to provide capacity it’s a concept we need to revisit. You might have heard that Twitter was down (again) last... Read more
0 Reviews

The State of My Blog Address

Readers, distinguished bloggers, various feeds - A year ago this week, I crossed over into double-digit blog entries (a whopping 10 stories at the time but a relative blog newcomer) and was wondering what magical rant would make this Blog Go to... Read more
0 Reviews

Post-Blog Report: 26 Short Topics about Security

Aloha and welcome to the post-blog report.  Over the last 5 months, I’ve been writing a blog series called, 26 Short Topics about Security and wanted to share some observations.  First, I went about this since there are so many IT... Read more
0 Reviews

Next-Generation Management of Data Centers Should be Modeled on Social Networking

Should the next generation management of network and application network devices look and act more like Facebook and Twitter? Infrastructure 2.0 could take us there. Y ou may think I’m kidding and certainly I make this proposal with some amount... Read more
0 Reviews

You’ve Taken That Out of Context

Hello and Welcome to the new hit Game Show: You’ve Taken that Out of Context!  Hilarity ensues in this action packed half-hour when contestants try to deliver the appropriate resources to end users depending on several factors and... Read more
0 Reviews

IPv6 and the End of the World

There’s always been a certain amount of conspiracy theories when security type events happen or instances where there is secrecy. There are those who don’t buy the ‘reported’ reason a security event (like a breach) occurred, those who claim to... Read more
0 Reviews

Twitter Account Lockouts Continue to Plague Users

Brute force attacks by spammers seeking easy access causing frustration for users with no resolution in sight At least once a day I see someone on Twitter broadcast that they have been “locked out of their Twitter account, temporarily.” A search... Read more
0 Reviews

Social Media – Friend or Foe

Social Networks are now part of our society for better or worse.  It has allowed us to both connect with current friends and find pals from the past; it offers businesses another outlet for marketing and sales; it allows us to collaborate,... Read more
0 Reviews

Linux is Not the Answer to Security Problems

Malicious links served up in a browser are OS agnostic. They don’t care about the OS because the target is people, not technology. In response to the problem of links and trust put forth in a recent post a reader replies that the answer to “evil... Read more
0 Reviews

If Your Users See an HTTP Error Code You’re Doing It Wrong

There is no reason in a modern web application for users to see a white error page Sightings of the Twitter “fail whale” are, these days, fewer and far between. That’s a good thing. What’s interesting is that when it does show up, users are... Read more
0 Reviews

Taking Down Twitter as easy as D.N.S.

If they can take down Twitter via DNS, they can take your site, too. Everyone is talking about the DoS (Denial of Service) attack on Twitter but most of them are missing what really happened. We’re so used to defending against HTTP-based DoS... Read more
0 Reviews

I Can Has UR .htaccess File

Notice that isn’t a question, it’s a statement of fact Twitter is having a bad month. After it was blamed, albeit incorrectly, for a breach leading to the disclosure of both personal and corporate information via Google’s GMail and Apps, its... Read more
0 Reviews

Rip and Replace Won’t Solve Twitter’s (Or Your) Security Problems

The “replace” in “rip and replace” essentially means getting rid of old security problems and replacing them with new ones. Twittergate is (thankfully) behind us but it’s almost assuredly going to be the case that we’ll be rehashing this one for... Read more
0 Reviews

DevCentral Top5 07/17/2009

Summer vacations, travel and distractingly favorable weather may interrupt the normal work weeks for some, but they can't stop the content. DevCentral has been alive and well through these sunny days thanks to the blogs, docs and media... Read more
0 Reviews

Twittergate Reveals E-Mail is Bigger Security Risk than Twitter

First, everyone needs to calm down. Twitter.com itself was not breached. According to Evan Williams as quoted in a TechCrunch article, the attack did not breach Twitter.com or its administrative functions, nor were user accounts affected in an... Read more
0 Reviews