Welcome to DevCentral

 

Community Leaderboard

# Name Points
1 Kevin Stewart Kevin Stewart  13509
2 nitass nitass  8759
3 What Lies Beneath What Lies Beneath  5617
4 Jason Rahm Jason Rahm  4302
5 Cory Cory  3441
Full Leaderboard »

Featured Articles

F5 Threat Analysis: It's a mad, mad, mad, mad ... bot

Madness. It's an aptly named bot, as it's likely to evoke just that reaction in those who find it lurking in their systems or at whom its sets it sights. A disturbing trend illustrated by the focus of our latest threat analysis is the...

DevCentral Top 5: Feb 25, 2015

The articles on DevCentral have been absolutely fantastic as of late.  Understandably, readers can expect to find great F5-related technical content here at DevCentral, but several industry-relevant pieces are also found in this...

Is the Security Skills Shortage Real?

I think the Security Shortage is real. It's not just my opinion, it's shared by nearly every CISO I've ever talked with. But the young guys can't find a job. How do we bridge this gap? Some suggestions to move forward.

Can network infrastructure be immutable infrastructure?

Immutable infrastructure, which I think is more appropriately called disposable infrastructure, has been enjoying a reinvigorated life with the success of Dockers and containerization over the past year. Too, DevOps has played a role in...

Intelligent DNS Animated Whiteboard

DNS will become even more important as additional sensors, monitors, actuators and other 'things' connect to the internet. It helps those devices like refrigerators and automobiles get their updates and helps us people find those things in...

Recent Articles

Enhancing Your Subscribers' Quality of Experience (QoE)

Guest blog post by Misbah Mahmoodi, Senior Product Marketing Manager, F5 Networks As a mobile operator, you’ve spent or are about to spend a considerable amount of time and money on upgrading your network to 4G LTE and building out cell towers to ensure that your subscribers have LTE coverage. Great! Job done! Now that you have the fastest network, your subscribers are going to have a great...

F5 Friday: The Value of a Full-Stack Partnership

There's a common movie and television trope (known as the Third Wheel) that revolves around a guy, his girlfriend and either his or her "bestie". You know it - it's the bestie hates girlfriend or boyfriend trope, and it's a common comedic line. Only it's not as funny when it's real and in your data center. Yes, your data center. Only the trope involves your Cisco...

F5 Predicts: A right to life, liberty and… broadband

When Indian Prime Minister Narendra Modi took office, his government made its priorities clear: ““If Atal Bihari Vajpayee government was known for national highways, Narendra Modi government will be known for broadband highway,” his Communications Minister said. It might seem surprising that internet connectivity would take top priority among many other issues of national importance, but in the...

NFV - Orchestration – Many Technologies, Approaches, and Confusion – The Need for Convergence

One of the key success criteria for NFV will be the Orchestration/Management component.  While ETSI/NFV-ISG standards group has published clear guidelines/requirements specification on Management and Orchestration (MANO) for NFV, there is no convergence or unification of Orchestration technologies for NFV.  There are many alternative approaches that include both open source and vendor...

Thoughts from the security non-professional: don’t let your data escape

Probably the biggest IT security threat to F5 Networks is typing this blog, and probably the biggest threat to your organization is reading it. OK, I don’t mean me or you, as such. We are, after all, IT professionals and wouldn’t dream of clicking on that suspicions link or using that freebie USB stick we picked up at the trade show. But the truth is people in organizations do dumb things. Even...

Select Between Multiple Network Access Resources with the Edge Client

The recent announcements that web browsers will be removing plugin support means that customers will no longer be able to provide Network Access resources to their end users via the APM web top.  Instead customers will require their end users to install the Edge Client for their Network Access connections. This poses a problem to customers who require that their end users have the ability...

How Diameter routing for policy can become a differentiator when offering VoLTE services?

This blog post was written by Peter Nas, Senior Solution Architect, F5  In a discussion around the added-value of a Diameter Routing Agent (DRA) in a VoLTE deployment, I was asked the following questions and would like to share my response: How does the PCRF (Policy and Charging Rules Function) make decisions around policies? Are all policies defined per subscriber, or are some...

F5 Threat Analysis: It's a mad, mad, mad, mad ... bot

Madness. It's an aptly named bot, as it's likely to evoke just that reaction in those who find it lurking in their systems or at whom its sets it sights. A disturbing trend illustrated by the focus of our latest threat analysis is the increase in attention being paid to application layer attacks. Not just directly, but also as part of larger volumetric attacks. Increasingly...

아시아태평양지역 클라우드의 현주소 – Part 2

Please find the English language post from which this was adapted here. 이 글은 아시아태평양지역에서의 클라우드에 대하여 살펴보는 시리즈의 두 번째 글이다. 이 글에서는 지역 내 클라우드의 현주소, 클라우드가 어떻게 사용되고 있는지, 무엇이 클라우드가 더 확산되는 것을 막고 있는지, 그리고 클라우드가 어떻게 혁신을 위해 사용될 수 있는지에 대해 알아볼 것이며, 또한 FSI (금융 및 증권업계) 에서의 클라우드에 대해서도 점검해 보겠다. 시리즈의 첫 번째 글에서는 아시아태평양지역 내 클라우드의 현주소와 확산 정도, 무엇이 클라우드가 더 확산되는 것을 막고 있는지에 대하여 살펴 보았다. 하지만 이미 클라우드를 채택한 기업들은 실제로...

Whiteboard Wednesday: Global Traffic Manager Load Balancing Algorithms Part 2

In this episode of Whiteboard Wednesday, John recaps round robin and ratio and then discusses the global availability load balancing algorithms. Resources About Global Server Load Balancing (Manual) GTM Global Availability Load Balancing to Down Pool (Q&A) GTM Global Availability Difference (Q&A)

Recent Questions and Answers

Brian Rossmeisl 20 answered the question F5 GTM prober pool loadbalancing method
4 minutes ago Read More
Joseph.Johnson 17 asked the question iRule redirect to mobile site
7 minutes ago Read More
Brad Parker 1632 answered the question CPU Increase when enabling AES-GCM
32 minutes ago Read More
Parveez 237 answered the question Block range of IP address
40 minutes ago Read More
Matt A 3 answered the question HTTP Redirect from intranet to internet site
50 minutes ago Read More
Matt A 3 answered the question HTTP Redirect from intranet to internet site
51 minutes ago Read More
jdamotta 62 answered the question Block range of IP address
1 hour ago Read More
More Questions »