Welcome to DevCentral

 

Community Leaderboard

# Name Points
1 Kevin Stewart Kevin Stewart  13599
2 nitass nitass  8849
3 What Lies Beneath What Lies Beneath  5707
4 Jason Rahm Jason Rahm  4485
5 Cory Cory  3441
Full Leaderboard »

Featured Articles

Getting FREAK-y with BIG-IP

Since it’s been about 3 months since POODLE, we’re clearly overdue for another major vulnerability in SSL and/or TLS. Fortunately for us, the research team at SmackTLS has released details of the FREAK attack (aka OpenSSL CVE-2015-0204). We...

MWC 2015 – How LTE Roaming Works (feat Nas)

Peter Nas, Sr. Solution Architect, explains what happens when the many MWC attendees from all over the world arrive in Barcelona and need to connect their mobile devices to a carrier network. Peter does a great job walking us through what happens...

Optimizing IoT and Mobile Communications with TCP Fast Open

There's a lot of focus on the performance of mobile communications given the incredible rate at which mobile is outpacing legacy PC (did you ever think we'd see the day when we called it that?) usage. There's been tons of research on...

F5 Threat Analysis: It's a mad, mad, mad, mad ... bot

Madness. It's an aptly named bot, as it's likely to evoke just that reaction in those who find it lurking in their systems or at whom its sets it sights. A disturbing trend illustrated by the focus of our latest threat analysis is the...

DevCentral Top 5: Feb 25, 2015

The articles on DevCentral have been absolutely fantastic as of late.  Understandably, readers can expect to find great F5-related technical content here at DevCentral, but several industry-relevant pieces are also found in this...

Recent Articles

How you integrate network services matters

This post is cross-posted at https://blogs.cisco.com/datacenter/how-you-integrate-network-services-matters Polymorphism is a concept central to object-oriented programming. The notion of polymorphism is used to extend the capabilities of a basic object, like a mammal, to specific implementations, like cats or dogs or honey badgers, even though they don't care about such technica...

Getting FREAK-y with BIG-IP

Since it’s been about 3 months since POODLE, we’re clearly overdue for another major vulnerability in SSL and/or TLS. Fortunately for us, the research team at SmackTLS has released details of the FREAK attack (aka OpenSSL CVE-2015-0204). We can test whether our browsers are vulnerable here, and we can read cryptographer Matthew D. Green’s excellent summary of the attack mechanism on his...

Evaluating the Impact of New Devices

Given this year’s MWC theme is “The Edge of Innovation”, it’s no wonder that several new mobile phone made their debut this week—accompanied by a slew of new capabilities aimed at grabbing both analyst and subscriber attention. Microsoft announced two new smartphones, the Lumia series and the Windows 10. Jolla launched their version of the smart phone and the first Jolla Tablet will start...

MWC 2015 – The Mobile Revolution with F5 CEO John McAdam

John McAdam, F5 President & CEO talks about what the mobile revolution means to F5. John discusses how mobile technology is driving innovation, why the need for intelligent application traffic management is critical, how F5 is in the sweet spot for the explosion of mobile data traffic and why Mobile World Congress is attracts so many executives from around the world. If you only watch one...

Whiteboard Wednesday: Global Traffic Manager Load Balancing Algorithms Part 3

Jason continues the series of whiteboard sessions on Global Traffic Manager load balancing, covering the topology algorithm at the wideIP level. Resources About Global Server Load Balancing (Manual) Overview of BIG-IP GTM Topology Records Solution 10434 (9.x - 10.x) Solution 13412 (11.x) Overview of the Longest Match algorithm Solution 10721 (9.x - 10.x) Solution 14284 (11.x) Using...

MWC 2015 – Enhancing Subscriber’s Quality of Experience (feat Mahmoodi)

Misbah Mahmoodi, Sr. Product Marketing Manager, does a great job explaining the service provider challenges with the exponential growth in data usage from a subscriber point of view. For mobile operators, one of the worst things that subscribers can experience on the network is when they begin to stream their favorite video, and instead of the video playing, they see that spinning wheel. Misbah...

MWC 2015 – TCP Opt for Service Providers (feat Yue)

Frank Yue, Sr. Technical Marketing Manager, visits again to talk about the unique challenges service providers face in managing mobile data traffic. As more devices are generating more traffic, congestion can create bottlenecks on a carrier’s network. Service providers need to manage and properly deliver that traffic efficiently to subscribers. Frank explains that TCP was not really designed...

Why TCP optimisation has become more important than content optimisation

Since the very early days of 2G and 3G deployments, mobile operators from all around the world have been deploying and using content optimization platforms. The reasons for deploying these technologies were pretty straightforward. Bandwidth at the 2G and 3G radio layers was pretty low compared to bit rates that were available on wireline networks, so reducing the bit rates of the ever...

Why TCP optimisation has become more important than content optimisation

Since the very early days of 2G and 3G deployments, mobile operators from all around the world have been deploying and using content optimization platforms. The reasons for deploying these technologies were pretty straightforward. Bandwidth at the 2G and 3G radio layers was pretty low compared to bit rates that were available on wireline networks, so reducing the bit rates of the ever...

Mobile Service Providers are missing a Key Security Issue - And it is not DNS

#MWC15 Barcelona is a great city, but with 100,000 people coming to the city for Mobile World Congress, it is expected that the criminals will come in force to prey upon these unwary travelers. When I travel, I am careful to protect myself from unsavory acts such as pickpocketing or physical attack. I avoid areas that may be dangerous and I take care to protect my personal belongings from theft...

Recent Questions and Answers

Stewart 172 answered the question ASM to block indexing of sites.
29 minutes ago Read More
John Wagnon 1297 answered the question ASM to block indexing of sites.
49 minutes ago Read More
JN 21 answered the question Restore UCS file across platforms
1 hour ago Read More
jona187 16 asked the question iRule to set country code for IP
1 hour ago Read More
cjbarr1234 17 answered the question iRule to mitigate TLS/SSL FREAK?
1 hour ago Read More
cjbarr1234 17 answered the question VMware interface problem
1 hour ago Read More
Stewart 172 asked the question ASM to block indexing of sites.
1 hour ago Read More
mikeshimkus 1480 answered the question ADFS 3.0 Monitor not working
2 hours ago Read More
More Questions »