The Global Leader in Application Delivery Networking

F5 Networks

Subscribe to F5 Networks: eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get F5 Networks: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories

2020 seems to be an important milestone for the Internet of Things. That’s the year that Cisco says there will be 50 billion connected devices and also the year Gartner notes that over 50% of major new business processes and systems will incorporate some element of the Internet of Things. That’s the good news. A recent Symantec Internet Security Threat Report says there are 25 connected devices per 100 inhabitants in the US. Minimum 25 entry points to your personal information, not counting your front door, personal computers, compromised ATMs and other data sources. As your connected devices grow, so will your exposure. And with no clear methods of identifying and authenticating connected devices, enterprises will have a challenging time getting a handle on how many employee shirts, shoes, fitness trackers, and smartwatches are connected to the corporate network. ... (more)

I’m Sorry Sir, You’re Obsolete | @ThingsExpo #IoT #M2M #API #Cloud

A few years ago, those little iHome alarm clocks started to appear in hotel rooms. Cool gadgets that you could mount your mobile phone to battery charge or play the music on the device. We also had a few in our home. They worked perfectly for the iPhone 4 since the connector was that 1 inch protruding plug. When I got the iPhone6, those clocks instantly became useless. Obsolete. At least the phone connector part lost its value. I’ve been thinking about this for a while. The rate of obsolescence. The state when an object, technology, service or practice is no longer needed or wan... (more)

Is 2016 Half Empty or Half Full? | @CloudExpo #BigData #IoT #Mobile #Security

With 2016 crossing the half way point, let’s take a look at some technology trends thus far. Breaches: Well, many databases are half empty due to the continued rash of intrusions while the crooks are half full with our personal information. According to the Identity Theft Resource Center (ITRC), there have been 522 breaches thus far in 2016 exposing almost 13,000,000 records. Many are health care providers as our medical information is becoming the gold mine of stolen info. Not really surprising since the health care wearable market is set to explode in the coming years. Many of... (more)

The Visible Data of the Invisible User By @PSilvas | @ThingsExpo #IoT

As the march to connect each and every noun on this planet continues with a blistering pace, the various ways, contraptions and sensors used to collect data is greatly expanding. What once was a (relatively) small collection of fitness trackers, smartwatches, thermostats, automobiles and surveillance cameras has grown into a an industry where shirts, shoes, sleeping bags and even liquor bottles want to gather your info. And most of these devices monitor silently without you even knowing. According to Ryan Matthew Pierson over at Readwrite.com, ‘The strength of IoT is in its abili... (more)

I Am an Application Delivery Fundamentalist | @CloudExpo #APM #Agile #Cloud

Fun and a little mental. If you’ve been following along the DevCentral team’s journey toward F5 Certification, then you may be aware that we were in Chicago last week for F5’s Agility 2016 conference and took our 101 Application Delivery Fundamentals exam. I am happy to report that all of us, Jason, John, Chase and I, passed our exams. I gotta tell you, it’s a relief since I didn’t want to title this article, ‘Two Out of Three Ain’t Bad.’ Good song but wanted to avoid that. We started this excursion back in April (me in March) with the team deciding to create a study group. Eac... (more)

Control It All with iControl | @ThingsExpo #IoT #API #Cloud

The concept of Application programming interfaces (APIs) has been around for a while. According to CSC Distinguished Engineer & Chief Product Architect (and bass player) Martin Bartlett, ‘The concept of an API pre-dates even the advent of personal computing, let alone the Web, by a very long time! The principal of a well-documented set of publicly addressable "entry points" that allow an application to interact with another system has been an essential part of software development since the earliest days of utility data processing. However, the advent of distributed systems, an... (more)