Welcome to DevCentral

 

Community Leaderboard

# Name Points
1 Kevin Stewart Kevin Stewart  13599
2 nitass nitass  8849
3 What Lies Beneath What Lies Beneath  5707
4 Jason Rahm Jason Rahm  4485
5 Cory Cory  3441
Full Leaderboard »

Featured Articles

MWC 2015 – How LTE Roaming Works (feat Nas)

Peter Nas, Sr. Solution Architect, explains what happens when the many MWC attendees from all over the world arrive in Barcelona and need to connect their mobile devices to a carrier network. Peter does a great job walking us through what happens...

Optimizing IoT and Mobile Communications with TCP Fast Open

There's a lot of focus on the performance of mobile communications given the incredible rate at which mobile is outpacing legacy PC (did you ever think we'd see the day when we called it that?) usage. There's been tons of research on...

F5 Threat Analysis: It's a mad, mad, mad, mad ... bot

Madness. It's an aptly named bot, as it's likely to evoke just that reaction in those who find it lurking in their systems or at whom its sets it sights. A disturbing trend illustrated by the focus of our latest threat analysis is the...

DevCentral Top 5: Feb 25, 2015

The articles on DevCentral have been absolutely fantastic as of late.  Understandably, readers can expect to find great F5-related technical content here at DevCentral, but several industry-relevant pieces are also found in this...

Is the Security Skills Shortage Real?

I think the Security Shortage is real. It's not just my opinion, it's shared by nearly every CISO I've ever talked with. But the young guys can't find a job. How do we bridge this gap? Some suggestions to move forward.

Recent Articles

Code Test Post

priority 100 when HTTP_REQUEST { binary scan [md5 [HTTP::password]] H* password if { [class lookup [HTTP::username] demo_users] equals $password } { #log local0. "User [HTTP::username] has been authorized to access virtual server [virtual name]" # Insert iRule-based application code here if necessary } else { if { [string length [HTTP::password]] != 0...

Evaluating the Impact of New Devices

Given this year’s MWC theme is “The Edge of Innovation”, it’s no wonder that several new mobile phone made their debut this week—accompanied by a slew of new capabilities aimed at grabbing both analyst and subscriber attention. Microsoft announced two new smartphones, the Lumia series and the Windows 10. Jolla launched their version of the smart phone and the first Jolla Tablet will start...

MWC 2015 – The Mobile Revolution with F5 CEO John McAdam

John McAdam, F5 President & CEO talks about what the mobile revolution means to F5. John discusses how mobile technology is driving innovation, why the need for intelligent application traffic management is critical, how F5 is in the sweet spot for the explosion of mobile data traffic and why Mobile World Congress is attracts so many executives from around the world. If you only watch one...

Whiteboard Wednesday: Global Traffic Manager Load Balancing Algorithms Part 3

Jason continues the series of whiteboard sessions on Global Traffic Manager load balancing, covering the topology algorithm at the wideIP level. Resources About Global Server Load Balancing (Manual) Overview of BIG-IP GTM Topology Records Solution 10434 (9.x - 10.x) Solution 13412 (11.x) Overview of the Longest Match algorithm Solution 10721 (9.x - 10.x) Solution 14284 (11.x) Using...

MWC 2015 – Enhancing Subscriber’s Quality of Experience (feat Mahmoodi)

Misbah Mahmoodi, Sr. Product Marketing Manager, does a great job explaining the service provider challenges with the exponential growth in data usage from a subscriber point of view. For mobile operators, one of the worst things that subscribers can experience on the network is when they begin to stream their favorite video, and instead of the video playing, they see that spinning wheel. Misbah...

MWC 2015 – TCP Opt for Service Providers (feat Yue)

Frank Yue, Sr. Technical Marketing Manager, visits again to talk about the unique challenges service providers face in managing mobile data traffic. As more devices are generating more traffic, congestion can create bottlenecks on a carrier’s network. Service providers need to manage and properly deliver that traffic efficiently to subscribers. Frank explains that TCP was not really designed...

Why TCP optimisation has become more important than content optimisation

Since the very early days of 2G and 3G deployments, mobile operators from all around the world have been deploying and using content optimization platforms. The reasons for deploying these technologies were pretty straightforward. Bandwidth at the 2G and 3G radio layers was pretty low compared to bit rates that were available on wireline networks, so reducing the bit rates of the ever...

Why TCP optimisation has become more important than content optimisation

Since the very early days of 2G and 3G deployments, mobile operators from all around the world have been deploying and using content optimization platforms. The reasons for deploying these technologies were pretty straightforward. Bandwidth at the 2G and 3G radio layers was pretty low compared to bit rates that were available on wireline networks, so reducing the bit rates of the ever...

Mobile Service Providers are missing a Key Security Issue - And it is not DNS

#MWC15 Barcelona is a great city, but with 100,000 people coming to the city for Mobile World Congress, it is expected that the criminals will come in force to prey upon these unwary travelers. When I travel, I am careful to protect myself from unsavory acts such as pickpocketing or physical attack. I avoid areas that may be dangerous and I take care to protect my personal belongings from theft...

Mobile Security That Just…Is.

Guest Blog by Jay Kelly, Senior Product Marketing Manager #MWC15 I believe that we can all agree that mobility is exploding, can’t we? According to an IDC report, the worldwide mobile workforce is expected to reach 1.3 billion people by the end of this calendar year (2015). That, according to the same report, represents a tad over 37 percent of the global workforce. And, according to a report...

Recent Questions and Answers

El-Guapo 62 answered the question The best ciphersuite
23 minutes ago Read More
bigipjr28 44 asked the question HTTPS default health monitor
1 hour ago Read More
Kharsma 15 answered the question The best ciphersuite
1 hour ago Read More
grkraj 3 answered the question F5 and DMZ
1 hour ago Read More
More Questions »