2013-12-17

It’s that time of year when we gift and re-gift, just like this text from last year.  And the perfect opportunity to re-post, re-purpose and re-use all my 2013 blog entries.  If you missed any of the 112 attempts including 67 videos, here they are wrapped in one simple entry.  I read somewhere that lists in blogs are good.  This year I broke it out by month to see what was happening at the time and let’s be honest, pure self promotion. 

Thanks for reading and watching throughout 2013.

Have a Safe and Happy New Year.

January

Is TV’s Warm Glowing Warming Glow Fading?

Lost Records a Day Shows Doctors are Blasé

Inside Look – Enterprise Manager v3.1

HELLO, My Name is Cloud_009…

Security Bloggers Network Voting

Solving Substantiation with SAML

In 5 Minutes or Less: BIG-IP Advanced Firewall Manager

Inside Look – SAML Federation with BIG-IP APM

February

Inside Look – BIG-IP Advanced Firewall Manager

16 Racks (16 Tons Parody)

Is BYO Already D?

In 5 Minutes Guest Edition – BIG-IP LTM Integration with Quarri POQ

BYOD 2.0 – Moving Beyond MDM with F5 Mobile App Manager

Inside Look – F5 Mobile App Manager

Inside Look: BIG-IP ASM Botnet and Web Scraping Protection

RSA2013: Aloha from RSA

RSA2013: Find F5

RSA2013: Gimme 90 Seconds Security Edition

RSA2013: Partner Spotlight – Websense

RSA2013: Partner Spotlight – Quarri

RSA2013: F5 RSA Security Trends Survey

RSA2013: BIG-IP SSL/TLS Services

RSA2013: BIG-IP DNS Services

RSA2013: Interview with Jeremiah Grossman

RSA2013: That’s a Wrap

March

Pulse2013 – Find F5

Pulse2013 – Gimme 90 Seconds: IBM Edition

Pulse2013 – BIG-IP ASM & IBM InfoSphere Guardium

Pulse2013 – IBM Maximo Optimization & SSO with BIG-IP APM

Pulse2013 – That’s a Wrap

RSA2013 & Pulse2013 – The Video Outtakes

Pulse2013 – IBM Technology Evangelist Kathy Zeidenstein

This Blog May Have Jumped the Shark

Every Day is a 0-Day Nowadays

Q. The Safest Mobile Device? A. Depends

April

Mobile Threats Rise 261% in Perspective

Ride The Crime Coaster

Conversation with One of CloudNOW’s Top 10 Women: Lori MacVittie

Most of the Time We Get it Wrong

The Prosecution Calls Your Smartphone to the Stand

Targets of Opportunity

F5 Tech Talk – Streamline, Secure and Optimize XA and XD Deployments

May

Interop2013: Find F5

Interop2013: DDoS’ing Interop

Interop2013: F5 Certification Program

Interop2013: BIG-IQ Cloud

Interop2013: Partner Spotlight – Big Switch Networks

Interop2013: Partner Spotlight – ICSA Labs

Interop2013: DDoS’ing Interop Follow Up

Interop2013: That’s a Wrap

50/50 Odds for BYOD

Interop2013: The Video Outtakes

FedRAMP Federates Further

iRules – Is There Anything You Can’t Do?

June

TechEd2013 – Find F5

TechEd2013 – Network Virtualization & Cloud Solutions

TechEd2013 – Secure Windows Azure Access

TechEd2013 – The Top 5 Questions

TechEd2013 – NVGRE with Microsoft’s System Center 2012 VMM (feat. Korock)

TechEd2013 – Gimme 90 Seconds Betcha Didn’t Know Edition (feat. Simpson)

TechEd2013 – That’s a Wrap

TechEd2013 – The Video Outtakes

Small Business is a Big Target

Is 2013 Half Empty or Half Full?

Inside Look – PCoIP Proxy for VMware Horizon View

In 5 Minutes or Less – PCoIP Proxy for VMware Horizon View

BYOD Behavior – Size Does Matter

July

The First Six Remix

BYOD – More Than an IT Issue

BYOD 2.0 — Moving Beyond MDM

20,000 For Every 1

Big Data Getting Attention

Corporate Mobile Data and BYOD Infographic(s)

August

Hackable Homes

Back to School BYOB Style

DNS Doldrums

VMworld2013 – Find F5

VMworld2013 – F5 VMware Alliance

VMworld2013 – Defy Convention

VMworld2013 – VMware NSX

VMworld2013 – vCenter Orchestrator

VMworld2013 – That’s a Wrap

VMworld2013 – The Video Outtakes

September

You Got a Minute?

Are You Ready For Some…Technology!!

The Malware Mess

World’s Biggest Data Breaches [Infographic]

BIG-IP Edge Client v1.0.6 for iOS 7

BYOD Injuries

October

Bring Your Own A-Z

The Hacker Will See You Now

The Million Mobile Malware March

Privacy for a Price

Identity Theft Hits Close to Home

November

DNS Does the Job

F5 Synthesis: The Reference Architectures

AWS re:Invent 2013 – Find F5

AWS re:Invent 2013 – Cloud Bursting Reference Architecture (feat. Pearce)

AWS re:Invent 2013 – Cloud Migration Reference Architecture (feat. Pearce)

AWS re:Invent 2013 – F5 AWS Solutions (feat. Pearce & Huang)

AWS re:Invent 2013 – Cloud Federation Reference Architecture (feat. Pearce)

AWS re:Invent 2013 – LineRate Systems (feat. Moshiri)

AWS re:Invent 2013 – That’s a Wrap

AWS re:Invent 2013 – The Video Outtakes

Behind the ‘ALOHA!’

December

The Top 10, Top 10 Predictions for 2014

Gartner Data Center 2013: Find F5

GartnerDC 2013: DDoS Reference Architecture (feat. Holmes)

GartnerDC 2013: Application Services Reference Architecture (feat. Haynes)

GartnerDC 2013: Intelligent DNS Scale Reference Architecture (feat Silva)

GartnerDC 2013: That’s a Wrap

GartnerDC 2013: The Video Outtakes

And a couple special holiday themed entries from years past.

e-card Malware

X marks the Games

 

ps

Related

Blog Roll 2011

Blog Roll 2012

Connect with Peter:

Connect with F5:

   

    

 

Technorati Tags: f5,devcentral,blogs,silva,social media,2013,video,cloud,security,mobile

Show more