It’s that time of year when we gift and re-gift, just like this text from last year. And the perfect opportunity to re-post, re-purpose and re-use all my 2013 blog entries. If you missed any of the 112 attempts including 67 videos, here they are wrapped in one simple entry. I read somewhere that lists in blogs are good. This year I broke it out by month to see what was happening at the time and let’s be honest, pure self promotion.
Thanks for reading and watching throughout 2013.
Have a Safe and Happy New Year.
January
Is TV’s Warm Glowing Warming Glow Fading?
Lost Records a Day Shows Doctors are Blasé
Inside Look – Enterprise Manager v3.1
HELLO, My Name is Cloud_009…
Security Bloggers Network Voting
Solving Substantiation with SAML
In 5 Minutes or Less: BIG-IP Advanced Firewall Manager
Inside Look – SAML Federation with BIG-IP APM
February
Inside Look – BIG-IP Advanced Firewall Manager
16 Racks (16 Tons Parody)
Is BYO Already D?
In 5 Minutes Guest Edition – BIG-IP LTM Integration with Quarri POQ
BYOD 2.0 – Moving Beyond MDM with F5 Mobile App Manager
Inside Look – F5 Mobile App Manager
Inside Look: BIG-IP ASM Botnet and Web Scraping Protection
RSA2013: Aloha from RSA
RSA2013: Find F5
RSA2013: Gimme 90 Seconds Security Edition
RSA2013: Partner Spotlight – Websense
RSA2013: Partner Spotlight – Quarri
RSA2013: F5 RSA Security Trends Survey
RSA2013: BIG-IP SSL/TLS Services
RSA2013: BIG-IP DNS Services
RSA2013: Interview with Jeremiah Grossman
RSA2013: That’s a Wrap
March
Pulse2013 – Find F5
Pulse2013 – Gimme 90 Seconds: IBM Edition
Pulse2013 – BIG-IP ASM & IBM InfoSphere Guardium
Pulse2013 – IBM Maximo Optimization & SSO with BIG-IP APM
Pulse2013 – That’s a Wrap
RSA2013 & Pulse2013 – The Video Outtakes
Pulse2013 – IBM Technology Evangelist Kathy Zeidenstein
This Blog May Have Jumped the Shark
Every Day is a 0-Day Nowadays
Q. The Safest Mobile Device? A. Depends
April
Mobile Threats Rise 261% in Perspective
Ride The Crime Coaster
Conversation with One of CloudNOW’s Top 10 Women: Lori MacVittie
Most of the Time We Get it Wrong
The Prosecution Calls Your Smartphone to the Stand
Targets of Opportunity
F5 Tech Talk – Streamline, Secure and Optimize XA and XD Deployments
May
Interop2013: Find F5
Interop2013: DDoS’ing Interop
Interop2013: F5 Certification Program
Interop2013: BIG-IQ Cloud
Interop2013: Partner Spotlight – Big Switch Networks
Interop2013: Partner Spotlight – ICSA Labs
Interop2013: DDoS’ing Interop Follow Up
Interop2013: That’s a Wrap
50/50 Odds for BYOD
Interop2013: The Video Outtakes
FedRAMP Federates Further
iRules – Is There Anything You Can’t Do?
June
TechEd2013 – Find F5
TechEd2013 – Network Virtualization & Cloud Solutions
TechEd2013 – Secure Windows Azure Access
TechEd2013 – The Top 5 Questions
TechEd2013 – NVGRE with Microsoft’s System Center 2012 VMM (feat. Korock)
TechEd2013 – Gimme 90 Seconds Betcha Didn’t Know Edition (feat. Simpson)
TechEd2013 – That’s a Wrap
TechEd2013 – The Video Outtakes
Small Business is a Big Target
Is 2013 Half Empty or Half Full?
Inside Look – PCoIP Proxy for VMware Horizon View
In 5 Minutes or Less – PCoIP Proxy for VMware Horizon View
BYOD Behavior – Size Does Matter
July
The First Six Remix
BYOD – More Than an IT Issue
BYOD 2.0 — Moving Beyond MDM
20,000 For Every 1
Big Data Getting Attention
Corporate Mobile Data and BYOD Infographic(s)
August
Hackable Homes
Back to School BYOB Style
DNS Doldrums
VMworld2013 – Find F5
VMworld2013 – F5 VMware Alliance
VMworld2013 – Defy Convention
VMworld2013 – VMware NSX
VMworld2013 – vCenter Orchestrator
VMworld2013 – That’s a Wrap
VMworld2013 – The Video Outtakes
September
You Got a Minute?
Are You Ready For Some…Technology!!
The Malware Mess
World’s Biggest Data Breaches [Infographic]
BIG-IP Edge Client v1.0.6 for iOS 7
BYOD Injuries
October
Bring Your Own A-Z
The Hacker Will See You Now
The Million Mobile Malware March
Privacy for a Price
Identity Theft Hits Close to Home
November
DNS Does the Job
F5 Synthesis: The Reference Architectures
AWS re:Invent 2013 – Find F5
AWS re:Invent 2013 – Cloud Bursting Reference Architecture (feat. Pearce)
AWS re:Invent 2013 – Cloud Migration Reference Architecture (feat. Pearce)
AWS re:Invent 2013 – F5 AWS Solutions (feat. Pearce & Huang)
AWS re:Invent 2013 – Cloud Federation Reference Architecture (feat. Pearce)
AWS re:Invent 2013 – LineRate Systems (feat. Moshiri)
AWS re:Invent 2013 – That’s a Wrap
AWS re:Invent 2013 – The Video Outtakes
Behind the ‘ALOHA!’
December
The Top 10, Top 10 Predictions for 2014
Gartner Data Center 2013: Find F5
GartnerDC 2013: DDoS Reference Architecture (feat. Holmes)
GartnerDC 2013: Application Services Reference Architecture (feat. Haynes)
GartnerDC 2013: Intelligent DNS Scale Reference Architecture (feat Silva)
GartnerDC 2013: That’s a Wrap
GartnerDC 2013: The Video Outtakes
And a couple special holiday themed entries from years past.
e-card Malware
X marks the Games
ps
Related
Blog Roll 2011
Blog Roll 2012
Connect with Peter:
Connect with F5:
Technorati Tags: f5,devcentral,blogs,silva,social media,2013,video,cloud,security,mobile