Blog Roll 2013
It’s that time of year when we gift and re-gift, just like this text from last year. And the perfect opportunity to re-post, re-purpose and re-use all my 2013 blog entries. If you missed any of the 112 attempts including 67 videos, here they are wrapped in one simple entry. I read somewhere that lists in blogs are good. This year I broke it out by month to see what was happening at the time and let's be honest, pure self promotion.
Thanks for reading and watching throughout 2013.
Have a Safe and Happy New Year.
January
- Is TV's Warm Glowing Warming Glow Fading?
- Lost Records a Day Shows Doctors are Blasé
- Inside Look - Enterprise Manager v3.1
- HELLO, My Name is Cloud_009...
- Security Bloggers Network Voting
- Solving Substantiation with SAML
- In 5 Minutes or Less: BIG-IP Advanced Firewall Manager
- Inside Look - SAML Federation with BIG-IP APM
February
- Inside Look - BIG-IP Advanced Firewall Manager
- 16 Racks (16 Tons Parody)
- Is BYO Already D?
- In 5 Minutes Guest Edition - BIG-IP LTM Integration with Quarri POQ
- BYOD 2.0 – Moving Beyond MDM with F5 Mobile App Manager
- Inside Look - F5 Mobile App Manager
- Inside Look: BIG-IP ASM Botnet and Web Scraping Protection
- RSA2013: Aloha from RSA
- RSA2013: Find F5
- RSA2013: Gimme 90 Seconds Security Edition
- RSA2013: Partner Spotlight – Websense
- RSA2013: Partner Spotlight – Quarri
- RSA2013: F5 RSA Security Trends Survey
- RSA2013: BIG-IP SSL/TLS Services
- RSA2013: BIG-IP DNS Services
- RSA2013: Interview with Jeremiah Grossman
- RSA2013: That’s a Wrap
March
- Pulse2013 - Find F5
- Pulse2013 – Gimme 90 Seconds: IBM Edition
- Pulse2013 – BIG-IP ASM & IBM InfoSphere Guardium
- Pulse2013 – IBM Maximo Optimization & SSO with BIG-IP APM
- Pulse2013 – That’s a Wrap
- RSA2013 & Pulse2013 - The Video Outtakes
- Pulse2013 - IBM Technology Evangelist Kathy Zeidenstein
- This Blog May Have Jumped the Shark
- Every Day is a 0-Day Nowadays
- Q. The Safest Mobile Device? A. Depends
April
- Mobile Threats Rise 261% in Perspective
- Ride The Crime Coaster
- Conversation with One of CloudNOW’s Top 10 Women: Lori MacVittie
- Most of the Time We Get it Wrong
- The Prosecution Calls Your Smartphone to the Stand
- Targets of Opportunity
- F5 Tech Talk - Streamline, Secure and Optimize XA and XD Deployments
May
- Interop2013: Find F5
- Interop2013: DDoS'ing Interop
- Interop2013: F5 Certification Program
- Interop2013: BIG-IQ Cloud
- Interop2013: Partner Spotlight - Big Switch Networks
- Interop2013: Partner Spotlight – ICSA Labs
- Interop2013: DDoS'ing Interop Follow Up
- Interop2013: That's a Wrap
- 50/50 Odds for BYOD
- Interop2013: The Video Outtakes
- FedRAMP Federates Further
- iRules - Is There Anything You Can't Do?
June
- TechEd2013 – Find F5
- TechEd2013 – Network Virtualization & Cloud Solutions
- TechEd2013 – Secure Windows Azure Access
- TechEd2013 – The Top 5 Questions
- TechEd2013 – NVGRE with Microsoft’s System Center 2012 VMM (feat. Korock)
- TechEd2013 – Gimme 90 Seconds Betcha Didn’t Know Edition (feat. Simpson)
- TechEd2013 – That’s a Wrap
- TechEd2013 – The Video Outtakes
- Small Business is a Big Target
- Is 2013 Half Empty or Half Full?
- Inside Look - PCoIP Proxy for VMware Horizon View
- In 5 Minutes or Less - PCoIP Proxy for VMware Horizon View
- BYOD Behavior - Size Does Matter
July
- The First Six Remix
- BYOD - More Than an IT Issue
- BYOD 2.0 -- Moving Beyond MDM
- 20,000 For Every 1
- Big Data Getting Attention
- Corporate Mobile Data and BYOD Infographic(s)
August
- Hackable Homes
- Back to School BYOB Style
- DNS Doldrums
- VMworld2013 - Find F5
- VMworld2013 - F5 VMware Alliance
- VMworld2013 - Defy Convention
- VMworld2013 - VMware NSX
- VMworld2013 - vCenter Orchestrator
- VMworld2013 - That's a Wrap
- VMworld2013 - The Video Outtakes
September
- You Got a Minute?
- Are You Ready For Some...Technology!!
- The Malware Mess
- World's Biggest Data Breaches [Infographic]
- BIG-IP Edge Client v1.0.6 for iOS 7
- BYOD Injuries
October
- Bring Your Own A-Z
- The Hacker Will See You Now
- The Million Mobile Malware March
- Privacy for a Price
- Identity Theft Hits Close to Home
November
- DNS Does the Job
- F5 Synthesis: The Reference Architectures
- AWS re:Invent 2013 – Find F5
- AWS re:Invent 2013 - Cloud Bursting Reference Architecture (feat. Pearce)
- AWS re:Invent 2013 – Cloud Migration Reference Architecture (feat. Pearce)
- AWS re:Invent 2013 – F5 AWS Solutions (feat. Pearce & Huang)
- AWS re:Invent 2013 – Cloud Federation Reference Architecture (feat. Pearce)
- AWS re:Invent 2013 – LineRate Systems (feat. Moshiri)
- AWS re:Invent 2013 – That’s a Wrap
- AWS re:Invent 2013 – The Video Outtakes
- Behind the 'ALOHA!'
December
- The Top 10, Top 10 Predictions for 2014
- Gartner Data Center 2013: Find F5
- GartnerDC 2013: DDoS Reference Architecture (feat. Holmes)
- GartnerDC 2013: Application Services Reference Architecture (feat. Haynes)
- GartnerDC 2013: Intelligent DNS Scale Reference Architecture (feat Silva)
- GartnerDC 2013: That’s a Wrap
- GartnerDC 2013: The Video Outtakes
And a couple special holiday themed entries from years past.
ps
Related
Connect with Peter: | Connect with F5: |
Published Dec 17, 2013
Version 1.0PSilva
Ret. Employee
Joined May 16, 2019
PSilva
Ret. Employee
Joined May 16, 2019
- zahid_01_140402Nimbostratusnice and like it