Learn F5 Technologies, Get Answers & Share Community Solutions Join DevCentral

Filter by:
  • Solution
  • Technology

Articles

Sort results

Programmability in the Network: Your Errors, Do not Show Them to Me

#devops Errors happen, but your users should never see them. Ever. Every once in a while things happen, like errors. They are as inevitable as winter in Wisconsin, rain in Seattle, and that today someone will post a picture of a cat that shows... Read more
0 Reviews

The Bifurcation of the Network: Flows versus Messages

#SDN The network is naturally stratified because flows are not messages, and vice versa.   Once the initial thrill of SDN abated to a dull roar, the issue of what to do about higher order services (layers 4-7) was raised. Thus far, we've... Read more
0 Reviews

The Three Faces of Programmability in Software-Defined Infrastructure

#SDN #devops #API Your toaster is configurable, not programmable. Programmability is becoming as hyped as the technology trends with which it is associated: SDN, Devops, and even cloud. It's used to (incorrectly) describe everything fro... Read more
0 Reviews

Newton's First Law of Devops

#devops Deployment patterns enabling continuous delivery help align operations with development - and keep user frustration to a minimum One of the most difficult transitions for operations to make is the need to support releases more frequently.... Read more
0 Reviews

BREACH attack

There were some interesting developments with regard to crypto and TLS this year at the BlackHat security conference. This first article is about the BREACH attack, CVE-2013-3587. For background, take a look at my earlier article that talks... Read more
0 Reviews

SHA512 passwords

F5 has used the Linux standard MD5 hashed passwords since the introduction of V9. These passwords are resistant to rainbow tables, but not completely immune. Recently, BIG-IP 11.4 was enhanced to hash local passwords with the salted SHA512... Read more
1 Review

F5 Firewall Like No Other - Bringing Proxy Back

Who doesn’t love a Justin Timberlake reference when talking about security technology? The guy helped bring back the Fedora, which I am pleasantly delighted to see on the heads of hipsters and kids all over the place. In this third and final blog... Read more
0 Reviews

Programmability in the Network: Canary Deployments

#devops The canary deployment pattern is another means of enabling continuous delivery. Deployment patterns (or as I like to call them of late, devops patterns) are good examples of how devops can put into place systems and tools that enabl... Read more
0 Reviews

The OpenStack Open Letter Debate

I don’t make a habit of inserting myself into OSS wars, they tend to hurt everyone and benefit no one. Far too often (content management OSS projects are a great example) they result in code splitting and users with limited options movin... Read more
0 Reviews

Corporate Mobile Data and BYOD Infographic(s)

Very busy week so I figured I'd re-source a couple of recent infographics that I found interesting and timely.  Courtesy: http://www.druva.com/blog/state-of-corporate-mobile-data   Courtesy... Read more
0 Reviews

Stretched Beyond The Limit

The BIG-IP Advanced Firewall Manager (AFM) has done it again...and again....and again.  The BIG-IP AFM is a high-performance network firewall that guards your data center against extensive network threats on the most widely deployed... Read more
0 Reviews

Performance versus Presentation

#webperf #ado You remember the service, not the plating (unless you're a foodie) One morning, while reading the Internet (yes, the entire Internet), I happened upon a rather snarky (and yes, I liked the tone and appreciated the honesty) blog... Read more
0 Reviews

Where Have You Been?

You may have noticed that I’ve been awfully quiet out here lately. That’s because I’ve been adapting to my new role and making certain I had a clue what I was talking about before I came out and posted a bunch of things. But it’s been long enough... Read more
0 Reviews

F5 Has A Network Firewall?

It's true...F5 has long been known as the worldwide leader in Application Delivery Controllers, but F5 also scores aces with layer 3-4 security devices as well.  It's no surprise that network security is extremely important in... Read more
1 Review

Big Data Getting Attention

According to IBM, we generate 2.5 quintillion (2.5 followed by 17 zeros) bytes of data every day.  In the last two years, we've created about 90% of the data we have today.  Almost everything that's 'connected' generates... Read more
0 Reviews

Private Cloud is not a Euphemism for Managing Hardware

#cloud #infosec #devops Private cloud is about management, but not about hardware As with every technology, definitions almost immediately become muddled when it becomes apparent that the technology is going to "change the world." SDN i... Read more
0 Reviews

F5 Firewall Like No Other– Application-Centric Logging

F5 has always been an engineering-driven company. Sometimes this frustrates new sales people as they have to learn new technologies and come around to looking at the F5 way of doing things. So of course we made our firewall different, too. We... Read more
0 Reviews

20,000 For Every 1

On average.  Earlier this month, the State of California released its first annual data breach report showing that in 2012, 131 data breaches were reported putting more than 2.5 million Californians personal data at risk.  The real... Read more
0 Reviews

DevOps: Where's Your Back Button?

#devops There is no back button on deployment. But there can be. It was nearly 10pm on a Saturday night. A handful of architects and developers sat around a cube, munching on cold pizza and chatting while waiting for the phone call that would... Read more
0 Reviews

BYOD 2.0 -- Moving Beyond MDM

#BYOD has quickly transformed IT, offering a revolutionary way to support the mobile workforce. The first wave of BYOD featured MDM solutions that controlled the entire device. In the next wave, BYOD 2.0, control applies only to those apps... Read more
0 Reviews

BYOD - More Than an IT Issue

I explain the various organizational entities that should be involved when creating a BYOD policy. ps Related: F5's Feeling Alive with Newly Unveiled Mobile App Manager Inside Look - F5 Mobile App Manager Is BYO Already D? Will BYOL Cripple... Read more
0 Reviews

Tweaking Timeouts

#webperf #fast #mobile Alternative title: Stop Blaming the Network I have a weakness for a particular Android game that shall remain nameless (to protect the innocent, of course). It frequently complains that I have "a poor networ... Read more
0 Reviews

The First Six Remix

With 2013 cruising along and half the year in the rear view, I thought a rest stop with all the off-ramps thus far would catch you up on this road trip.  67 stops, 44 watchable. BYOD Behavior - Size Does Matter In 5 Minutes or Less - PCoIP... Read more
0 Reviews

Programmability in the Network: Versioning Patterns

#devops API and application versioning becomes a requirement when dev is agile. Agile development methodologies advocate a rapid release cycle. Facebook, for example, noted last year that it pushes code live twice a day. Organizations may neve... Read more
0 Reviews

SmartCloud Orchestrator and SmartCloud Provisioning

I have to admit, I’m a bit excited to get my hands dirty with IBM’s latest release of SmartCloud Orchestrator (version 2.2) which was just released this quarter.  With the new tools they have developed we have now a series of features th... Read more
0 Reviews