Welcome!

F5's iControl API and Software Development Kit

Jeff Browning

Subscribe to Jeff Browning: eMailAlertsEmail Alerts
Get Jeff Browning via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories by Jeff Browning

For those interested, there’s a great series of videos cropping up as the Interop folks and vendors begin staging infrastructure to support the event (starting 10-May in Las Vegas). The latest takes on the issues with IPv6 and includes a nice cameo by one of our favorite, highly-talented tech stars… BIG-IP! Some good stuff with that helps those not in the know about IPv6 “get learned” in just over 4 minutes. Check it.   Some Related Articles Graphing your F5 LTM Environment with Cacti > DevCentral > F5 ... F5 DevCentral > Tech Tips v.10 - Remote Authorization via TACACS+ > DevCentral > F5 ... Rewriting Redirects > DevCentral > F5 DevCentral > Tech Tips Clientless FirePass Login via the command line > DevCentral > F5 ... SNMP - LTM v9.x MIB Navigation > DevCentral > F5 DevCentral > Tech ... LTM: Configuring IP Forwarding > DevCentral > F5 DevCentral > Tech ... LT... (more)

Easing the Pain of Enterprise Application Deployment

To provide the best application performance, reliability, scalability, and security for J2EE applications, many large organizations utilize network load-balancing appliances and application switches. However, coordinating the deployment of applications between application developers and network managers can be a slow, painstaking process for companies choosing the many advantages of the network-based, load-balancing switches. By developing an application to manage the time-consuming coordination between these two teams, developers can self-serve their needs more quickly, network... (more)

Secure Web Services

Businesses need to provide their users with a method for securely connecting to their networks while minimizing the costs associated with providing this service - and also providing end users with as much convenience as possible. As businesses embrace Web services as the method for delivering their applications, they are struggling with security issues. Network World recently reported that the top worry for IT executives deploying Web services is security. SSL (Secure Sockets Layer) can provide a viable alternative to Virtual Private Networking (VPN) companies for securing Web ser... (more)

The Key to Success with Web Services

Web services provide a way to allow efficient communication between disparate services. For years, enterprises have struggled to find reliable, cost-effective ways to integrate and automate critical processes between different application packages. Web services technology has the potential to answer an enterprise's needs, providing the ability to integrate different systems and application types regardless of platform, operating system, or location. The key to the success of Web services is the use of a common data exchange standard such as XML. Through the use of this common la... (more)

SOAs Need an Intelligent SON

Service Oriented Architecture (SOA) is the most significant transformation in IT application architecture in the past several years - representing open standards and a more loosely coupled approach to designing, developing, and deploying applications. While attention is given to the application side of SOA, an often-overlooked ingredient needed to ensure its successful delivery is the underlying network infrastructure. As important as the application tier is, a new service-oriented network (SON) approach is crucial to providing a nimble infrastructure that can accommodate SOA's ... (more)