Welcome to DevCentral

 

Community Leaderboard

# Name Points
1 Kevin Stewart Kevin Stewart  13669
2 nitass nitass  9650
3 What Lies Beneath What Lies Beneath  5707
4 Jason Rahm Jason Rahm  4636
5 Cory Cory  3451
Full Leaderboard »

Featured Articles

Intrinsic Security - The Key to Effective Hybrid DDoS Protection

Do you love security?  Are you simultaneously fascinated and petrified by the damage inflicted by a single DDoS attack?  Understandably, you want to learn more about DDoS defense solutions.  Well, you came to the right place! ...

The RSA Conference: What Do You Want To Learn?

RSA is not just a public-key cryptosystem, it’s also the premier security conference in the world.  Let’s face it…Rivest, Shamir, and Adleman know how to take a great thing and expand it into a really great thing!  The RSA Conference ...

You named your products "Good, Better and Best?" What were you thinking?

“Funny … but really, what are the names you’re going to market with?” “I’m not presenting these to my customer. They’re too simple.” And that’s when I knew we’d gotten it right. After all, the objective for licensing is to make it simple...

A Little Love for Ops - the All New BIG-IP Operations Guide

A couple years in the making, the long sought after F5 BIG-IP TMOS: Operations Guide, hence force called the "Manual of Operational Greatness," has arrived! In addition to the great documentation on how to design and deliver traffic...

Getting FREAK-y with BIG-IP

Since it’s been about 3 months since POODLE, we’re clearly overdue for another major vulnerability in SSL and/or TLS. Fortunately for us, the research team at SmackTLS has released details of the FREAK attack (aka OpenSSL CVE-2015-0204). We...

Recent Articles

Beyond Scalability: Achieving Availability

Scalability is only one of the factors that determine availability. Security and performance play a critical role in achieving the application availability demanded by business and customers alike. Whether the goal is to achieve higher levels or productivity or generate greater customer engagement and revenue the venue today is the same: applications. In any application-focused business...

What does the Internet of Things mean for your business and your network?

You’ve heard of the Internet of Things (or Internet of Everything) by now, I’m sure. It’s things like your fridge telling you when you’ve run out of eggs; your shoes telling you how far you’ve travelled; your car keeping you up to date on local traffic so you know which routes to avoid; your house telling you how much water or heating is being used, that kind of thing. For businesses the...

F5 2015 網路世界預測之三 : 雲端並非生而平等

Adapted from What’s new in 2015: consumer hyperawareness, public services going digital, and a shift in the way we view clouds. 雲端重心從促進採納轉向優化   這幾年來,IT產業積極將他們的技術轉移到雲端 -...

Lost in Translation...in Italy

I've been travelling recently. To places and fields that have limited to no mobile connectivity and this can be a challenge when a challenge arises. Immediately following Mobile World Congress in Barcelona earlier this month, my family embarked on a multi-week European vacation. After spending a couple more days in Spain, we jumped on the rail to Paris for a couple days and then on to Rome...

F5 2015 網路世界預測之二 : 公眾服務轉捩點

Adapted from What’s new in 2015: consumer hyperawareness, public services going digital, and a shift in the way we view...

Whiteboard Wednesday: Global Traffic Manager Load Balancing Algorithms Part 6

Jason continues the series on Global Traffic Manager load balancing algorithms with a transition from static to dynamic load balancing algorithms. In this video, Jason covers the LDNS-based algorithms: hops, completion rate, and round trip time. Resources About Global Server Load Balancing (manual) Collecting Metrics (manual) Solution 11673 - Some BIG-IP GTM versions use data other than...

Managing Thousands of Apps

Managing Thousands of Apps As enterprises move toward both public and private cloud models, they dramatically shorten the time for an internal application owner to receive new infrastructure they request.  Typical enterprises often see server deployment times move from weeks to just a few minutes.  This newfound agility enables developers to create and deploy applications at a...

What Ops Needs to Know about HTTP/2

So HTTP/2 is official. That means all the talking is (finally) done and after 16 years of waiting, we've got ourselves a new lingua franca of the web. Okay, maybe that's pushing it, but we do have a new standard to move to that offers some improvements in the areas of resource management and performance that make it definitely worth taking a look at. For example, HTTP/2 is largely...

Intrinsic Security - The Key to Effective Hybrid DDoS Protection

Do you love security?  Are you simultaneously fascinated and petrified by the damage inflicted by a single DDoS attack?  Understandably, you want to learn more about DDoS defense solutions.  Well, you came to the right place!  F5 will be hosting a webinar on Tuesday, March 31 from 10:00 to 11:00 PDT to discuss this extremely important topic.  Join us for this free...

F5 2015 網路世界預測之一: 消費者超意識的興起

Adapted from What’s new in 2015: consumer hyperawareness, public services going digital, and a shift in the way we view...

Recent Questions and Answers

Gilbert 63 asked the question Get HTTP Monitor
3 minutes ago Read More
Krys Frankiewicz 8 answered the question HTTPS monitoring from ACE to F5
3 minutes ago Read More
Martin Sharratt 7 answered the question Inconsistent Monitors
16 minutes ago Read More
whoward 1 answered the question Inconsistent Monitors
41 minutes ago Read More
amolari 1094 answered the question 2 Way SSL Authentication Diagram?
1 hour ago Read More
amolari 1094 answered the question LTM VE download
2 hours ago Read More
Craig Yates 1 asked the question LTM VE download
2 hours ago Read More
Andy 1 answered the question BIG-IP : upgrade fails to transfer configuration
2 hours ago Read More
More Questions »