What is Stunnel and how do you configure it?
Here is another example of a more “exotic” Stunnel configuration. Most people, and rightly so, will ask “but why?”. Well, because we can!
Here is another example of a more “exotic” Stunnel configuration. Most people, and rightly so, will ask “but why?”. Well, because we can!
OK, so I probably should have read the manual first... But what kind of engineer does that?!
F5 BIG-IP is a great product, with great features. The flip side of this, however, is that its complexity means it can require specialist skills to successfully update.
F5 BIG-IP is a great product, with great features. The flip side of this, however, is that its complexity means it can require specialist skills to successfully deploy and maintain.
We're super excited to announce the expansion of our portfolio, offering a broader range of Application Delivery solutions; namely our new, vendor-agnostic Application Delivery Platform, the Loadbalancer ADC Portal.
There are so many benefits to moving away from the F5 LTM i2600, you'd be crazy not to at least explore your options.
VMware's recent acquisition, and the introduction of additional subscription-based licensing costs have led many companies to re-evaluate their options. It's unlikely that many will completely ditch VMware. However, several companies I've talked to recently are concerned that the cost and complexity of NSX, may mean it is no longer fit
With mTLS, the client is required to present its certificate to the server (and visa versa). Hence mutual certificate authentication occurs. This double layer of authentication provides an additional layer of protection against impersonation attacks.
In the world of medical imaging, where Picture Archiving and Communication System (PACS) solutions are vital for the storage and management of critical medical imaging data, high availability, even in smaller-scale environments, is imperative.
The single root I/O virtualization (SR-IOV) interface is an extension to the PCI Express (PCIe) specification. SR-IOV allows a device, such as a network adapter, to separate access to its resources among various PCIe hardware functions.
Loadbalancer is frequently recommended by HPE, mainly because they are less complex and easier to work with than some other providers. They add value right from the discovery stage, all the way through to implementation and maintenance.
At the very least, this blog should save you hours of Googling!
Managing lots of disparate load balancers is a complete pain, and an increasing risk to application delivery.
TLS/SSL encryption of your HTTPS data brings a number of significant benefits, leading to a trusted user experience.
Citrix NetScaler is a great product, with great features. The flip side of this, however, is that its complexity means it can require specialist skills to successfully deploy and maintain.
Maintenance, features, or a CVE are all good reasons to upgrade your NetScaler appliance. However, as with any complex task undertaken for the first time, it can get a little confusing.
Perplexed by proxy?! Ruffled by reverse proxy?! We’ve all been there. Honestly, sometimes I think the language we use makes things sound way more complicated than they actually are.
We've had a few concerned customers asking about the Google disclosure of the recent huge DDoS attack, and the potential underlying vulnerability in some HTTP/2 servers.
SSL/TLS termination is the most regularly implemented kind of SSL/TLS offload.
Data protection is focused on making sure that data remains available and immutable — even after a cybersecurity attack, or system failure. This prevents data loss and facilitates data recovery.
I built a parallel Loadbalancer Enterprise configuration alongside the existing Citrix NetScaler load balancer.
The urgent need for digitalization, connectivity, and service transformation is putting huge strain on an already overwhelmed NHS.
Loadbalancer.org worked with this commercial bank to deliver a highly available, resilient, and scalable HPE Ezmeral Data Fabric object storage solution.
Your decision should be informed by an honest self-assessment of the skills and experience needed to build, sell, and manage the solution.
We do a lot of work with object storage solution providers, and one of the main concerns that they have is throughput.