Blog Roll 2013
It’s that time of year when we gift and re-gift, just like this text from last year. And the perfect opportunity to re-post, re-purpose and re-use all my 2013 blog entries. If you missed any of the 112 attempts including 67 videos, here they are wrapped in one simple entry. I read somewhere that lists in blogs are good. This year I broke it out by month to see what was happening at the time and let's be honest, pure self promotion.
Thanks for reading and watching throughout 2013.
Have a Safe and Happy New Year.
January
- Is TV's Warm Glowing Warming Glow Fading?
- Lost Records a Day Shows Doctors are Blasé
- Inside Look - Enterprise Manager v3.1
- HELLO, My Name is Cloud_009...
- Security Bloggers Network Voting
- Solving Substantiation with SAML
- In 5 Minutes or Less: BIG-IP Advanced Firewall Manager
- Inside Look - SAML Federation with BIG-IP APM
February
- Inside Look - BIG-IP Advanced Firewall Manager
- 16 Racks (16 Tons Parody)
- Is BYO Already D?
- In 5 Minutes Guest Edition - BIG-IP LTM Integration with Quarri POQ
- BYOD 2.0 – Moving Beyond MDM with F5 Mobile App Manager
- Inside Look - F5 Mobile App Manager
- Inside Look: BIG-IP ASM Botnet and Web Scraping Protection
- RSA2013: Aloha from RSA
- RSA2013: Find F5
- RSA2013: Gimme 90 Seconds Security Edition
- RSA2013: Partner Spotlight – Websense
- RSA2013: Partner Spotlight – Quarri
- RSA2013: F5 RSA Security Trends Survey
- RSA2013: BIG-IP SSL/TLS Services
- RSA2013: BIG-IP DNS Services
- RSA2013: Interview with Jeremiah Grossman
- RSA2013: That’s a Wrap
March
- Pulse2013 - Find F5
- Pulse2013 – Gimme 90 Seconds: IBM Edition
- Pulse2013 – BIG-IP ASM & IBM InfoSphere Guardium
- Pulse2013 – IBM Maximo Optimization & SSO with BIG-IP APM
- Pulse2013 – That’s a Wrap
- RSA2013 & Pulse2013 - The Video Outtakes
- Pulse2013 - IBM Technology Evangelist Kathy Zeidenstein
- This Blog May Have Jumped the Shark
- Every Day is a 0-Day Nowadays
- Q. The Safest Mobile Device? A. Depends
April
- Mobile Threats Rise 261% in Perspective
- Ride The Crime Coaster
- Conversation with One of CloudNOW’s Top 10 Women: Lori MacVittie
- Most of the Time We Get it Wrong
- The Prosecution Calls Your Smartphone to the Stand
- Targets of Opportunity
- F5 Tech Talk - Streamline, Secure and Optimize XA and XD Deployments
May
- Interop2013: Find F5
- Interop2013: DDoS'ing Interop
- Interop2013: F5 Certification Program
- Interop2013: BIG-IQ Cloud
- Interop2013: Partner Spotlight - Big Switch Networks
- Interop2013: Partner Spotlight – ICSA Labs
- Interop2013: DDoS'ing Interop Follow Up
- Interop2013: That's a Wrap
- 50/50 Odds for BYOD
- Interop2013: The Video Outtakes
- FedRAMP Federates Further
- iRules - Is There Anything You Can't Do?
June
- TechEd2013 – Find F5
- TechEd2013 – Network Virtualization & Cloud Solutions
- TechEd2013 – Secure Windows Azure Access
- TechEd2013 – The Top 5 Questions
- TechEd2013 – NVGRE with Microsoft’s System Center 2012 VMM (feat. Korock)
- TechEd2013 – Gimme 90 Seconds Betcha Didn’t Know Edition (feat. Simpson)
- TechEd2013 – That’s a Wrap
- TechEd2013 – The Video Outtakes
- Small Business is a Big Target
- Is 2013 Half Empty or Half Full?
- Inside Look - PCoIP Proxy for VMware Horizon View
- In 5 Minutes or Less - PCoIP Proxy for VMware Horizon View
- BYOD Behavior - Size Does Matter
July
- The First Six Remix
- BYOD - More Than an IT Issue
- BYOD 2.0 -- Moving Beyond MDM
- 20,000 For Every 1
- Big Data Getting Attention
- Corporate Mobile Data and BYOD Infographic(s)
August
- Hackable Homes
- Back to School BYOB Style
- DNS Doldrums
- VMworld2013 - Find F5
- VMworld2013 - F5 VMware Alliance
- VMworld2013 - Defy Convention
- VMworld2013 - VMware NSX
- VMworld2013 - vCenter Orchestrator
- VMworld2013 - That's a Wrap
- VMworld2013 - The Video Outtakes
September
- You Got a Minute?
- Are You Ready For Some...Technology!!
- The Malware Mess
- World's Biggest Data Breaches [Infographic]
- BIG-IP Edge Client v1.0.6 for iOS 7
- BYOD Injuries
October
- Bring Your Own A-Z
- The Hacker Will See You Now
- The Million Mobile Malware March
- Privacy for a Price
- Identity Theft Hits Close to Home
November
- DNS Does the Job
- F5 Synthesis: The Reference Architectures
- AWS re:Invent 2013 – Find F5
- AWS re:Invent 2013 - Cloud Bursting Reference Architecture (feat. Pearce)
- AWS re:Invent 2013 – Cloud Migration Reference Architecture (feat. Pearce)
- AWS re:Invent 2013 – F5 AWS Solutions (feat. Pearce & Huang)
- AWS re:Invent 2013 – Cloud Federation Reference Architecture (feat. Pearce)
- AWS re:Invent 2013 – LineRate Systems (feat. Moshiri)
- AWS re:Invent 2013 – That’s a Wrap
- AWS re:Invent 2013 – The Video Outtakes
- Behind the 'ALOHA!'
December
- The Top 10, Top 10 Predictions for 2014
- Gartner Data Center 2013: Find F5
- GartnerDC 2013: DDoS Reference Architecture (feat. Holmes)
- GartnerDC 2013: Application Services Reference Architecture (feat. Haynes)
- GartnerDC 2013: Intelligent DNS Scale Reference Architecture (feat Silva)
- GartnerDC 2013: That’s a Wrap
- GartnerDC 2013: The Video Outtakes
And a couple special holiday themed entries from years past.
ps
Related
Connect with Peter: | Connect with F5: |
Published Dec 17, 2013
Version 1.0PSilva
Technical writer, evangelist, speaker, video host, story teller and overall clever guy. Bringing the slightly theatrical and fairly technical together, I train, write, speak, along with overall evangelism. Highly technical information security professional with social media skills who has also been in such plays as The Glass Menagerie, All’s Well That Ends Well, Cinderella and others.Ret. Employee
PSilva
Technical writer, evangelist, speaker, video host, story teller and overall clever guy. Bringing the slightly theatrical and fairly technical together, I train, write, speak, along with overall evangelism. Highly technical information security professional with social media skills who has also been in such plays as The Glass Menagerie, All’s Well That Ends Well, Cinderella and others.Ret. Employee
1 Comment
- zahid_01_140402
Nimbostratus
nice and like it