The Global Leader in Application Delivery Networking

F5 Networks

Subscribe to F5 Networks: eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get F5 Networks: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories

The entire intent of load balancing is to create a system that virtualizes the “service” from the physical servers that actually run that service. A more basic definition is to balance the load across a bunch of physical servers and make those servers look like one great big server to the outside world. There are many reasons to do this, but the primary drivers can be summarized as “scalability,” “high availability,” and “predictability.” Scalability is the capability of dynamically, or easily, adapting to increased load without impacting existing performance. Service virtualization presented an interesting opportunity for scalability; if the service, or the point of user contact, was separated from the actual servers, scaling of the application would simply mean adding more servers or cloud resources which would not be visible to the end user. High Availability ... (more)

What Is #MQTT? | @ThingsExpo #IoT #M2M #RTC #DigitalTransformation

The mad dash to connect virtually every noun to the internet or the Internet of Things is creating a massive M2M network for all the devices, systems, sensors and actuators to connect & communicate on the Internet. With that, they need a communications protocol to understand each other. One of those is Message Queue Telemetry Transport (MQTT). MQTT is a “subscribe and publish” messaging protocol designed for lightweight machine-to-machine (or IoT) communications. In this episode of Lightboard Lessons, I light up how MQTT works. ps Related: IoT Ready Infrastructure IoT Effect on Applications IoT Influence on Society What are These "Things? The Intruders of Things Internet [email protected], taking place June 6-8, 2017 at Javits Center, New York City, is co-located with 20th [email protected] and will feature technical sessions from a rock star conference facult... (more)

2017 Top 10 Predictions | @CloudExpo #BigData #IoT #AI #ML #DL #DevOps

The time of year when crystal balls get a viewing and many pundits put out their annual predictions for the coming year. Rather than thinking up my own, I figured I’d regurgitate what many others are expecting to happen. 8 Predictions About How the Security Industry Will Fare in 2017 – An eWeek slideshow looking at areas like IoT, ransomware, automated attacks and the security skills shortage in the industry. Chris Preimesberger (@editingwhiz), who does a monthly #eweekchat on twitter, covers many of the worries facing organizations. 10 IoT Predictions for 2017 – IoT was my number 1 in The Top 10, Top 10 Predictions for 2016 and no doubt, IoT will continue to cause havoc. People focus so much on the ‘things’ themselves rather than the risk of an internet connection. This list discusses how IoT will grow up in 2017, how having a service component will be key, the com... (more)

Managing Your Vulnerabilities | @ThingsExpo #IoT #M2M #Cloud #Security

I recently recovered from ACDF surgery where they remove a herniated or degenerative disc in the neck and fuse the cervical bones above and below the disk. My body had a huge vulnerability where one good shove or fender bender could have ruptured my spinal cord. I had some items removed and added some hardware and now my risk of injury is greatly reduced. Breaches are occurring at a record pace, botnets are consuming IoT devices and bandwidth, and the cloud is becoming a de-facto standard for many companies. Vulnerabilities are often found at the intersection of all three of these trends, so vulnerability and risk management has never been a greater or more critical challenge for organizations. Vulnerabilities come in all shapes and sizes but one thing that stays constant – at least in computer security – is that a vulnerability is a weakness which allows an attack... (more)

The #IoT and DNS | @ThingsExpo #BigData #IoT #M2M #DigitalTransformation

JANUARY 8, 2014 02:00 PM EST When we talk about the impact of BYOD and BYOA and the Internet of Things, we often focus on the impact on data center architectures. That's because there will be an increasing need for authentication, for access control, for security, for application delivery as the number of potential endpoints (clients, devices, things) increases. That means scale in the data center. What we gloss over, what we skip, is that before any of these "things" ever makes a request to access an application it had to execute a DNS query. Every. Single. Thing. Maybe that's because we assume DNS can handle the load. So far it's done well. You rarely, if ever, hear of disruptions or outages due directly to the execution of DNS. Oh, there has been some issues with misconfiguration of DNS and of exploitation of DNS (hijacking, illicit use in reflection attacks, et... (more)

OK 2017, Now What? | @ThingsExpo #IoT #M2M #Sensors #Mobility

The Year of the (Fire) Rooster will soon be upon us and the talkative, outspoken, frank, open, honest, and loyal Rooster could influence events in 2017. Whether you were born under the symbol or not, Roosters strive on trust and responsibility, essential for any organization especially in these times. 2016 (Year of the Monkey) brought us a crazy year of high profile breaches, a 500% increase in ransomware, a 0-day per day and slick malware each looking to cause havoc on all parts of society including your mobile device. The monkey’s shenanigans exhausted many of us in 2016 and 2017 will require some quick thinking and practical solutions to battle the ongoing, ever-growing threats. A year ago I noted, Mobility, both the state of being and the devices we use, will continue to grow and be an immense enabler and/or inhibitor for organizations. Today, we are the devices... (more)

F5 ARX & Oracle ZFS Storage

I meet with F5′s ARX Solution Engineer Matt Quill for a F5 ARX and Oracle ZFS Storage along with chatting with Oracle’s David Wallace. ps Related: Oracle OpenWorld 2011 – Aloha:Find F5 Booth 1527 Oracle OpenWorld 2011: BIG-IP WANOp & Oracle GoldenGate Oracle OpenWorld 2011: F5 ARX & Oracle ZFS Storage F5 YouTube Channel Oracle OpenWorld Live Technorati Tags: F5, oracle openworld, integration, Pete Silva, security, business, goldengate, technology, zfs, storage, oracle, oow2011 Connect with Peter: Connect with F5:   ... (more)

The Intruders of Things | @ThingsExpo #IoT #M2M #API #Security

2020 seems to be an important milestone for the Internet of Things. That’s the year that Cisco says there will be 50 billion connected devices and also the year Gartner notes that over 50% of major new business processes and systems will incorporate some element of the Internet of Things. That’s the good news. A recent Symantec Internet Security Threat Report says there are 25 connected devices per 100 inhabitants in the US. Minimum 25 entry points to your personal information, not counting your front door, personal computers, compromised ATMs and other data sources. As your connected devices grow, so will your exposure. And with no clear methods of identifying and authenticating connected devices, enterprises will have a challenging time getting a handle on how many employee shirts, shoes, fitness trackers, and smartwatches are connected to the corporate network. ... (more)

I’m Sorry Sir, You’re Obsolete | @ThingsExpo #IoT #M2M #API #Cloud

A few years ago, those little iHome alarm clocks started to appear in hotel rooms. Cool gadgets that you could mount your mobile phone to battery charge or play the music on the device. We also had a few in our home. They worked perfectly for the iPhone 4 since the connector was that 1 inch protruding plug. When I got the iPhone6, those clocks instantly became useless. Obsolete. At least the phone connector part lost its value. I’ve been thinking about this for a while. The rate of obsolescence. The state when an object, technology, service or practice is no longer needed or wanted… even though it still may be in good working order. E-waste is the fastest growing segment of the waste stream. With the technological advances, not only are we buying the latest and greatest electronics but we’re also dumping perfectly good, working devices at silly rates. There was eve... (more)

Is 2016 Half Empty or Half Full? | @CloudExpo #BigData #IoT #Mobile #Security

With 2016 crossing the half way point, let’s take a look at some technology trends thus far. Breaches: Well, many databases are half empty due to the continued rash of intrusions while the crooks are half full with our personal information. According to the Identity Theft Resource Center (ITRC), there have been 522 breaches thus far in 2016 exposing almost 13,000,000 records. Many are health care providers as our medical information is becoming the gold mine of stolen info. Not really surprising since the health care wearable market is set to explode in the coming years. Many of those wearables will be transmitting our health data back to providers. There were also a bunch of very recognizable names getting blasted in the media: IRS, Snapchat, Wendy’s and LinkedIn. And the best advice we got? Don’t use the same password across multiple sites. Updating passwords is ... (more)

I Am an Application Delivery Fundamentalist | @CloudExpo #APM #Agile #Cloud

Fun and a little mental. If you’ve been following along the DevCentral team’s journey toward F5 Certification, then you may be aware that we were in Chicago last week for F5’s Agility 2016 conference and took our 101 Application Delivery Fundamentals exam. I am happy to report that all of us, Jason, John, Chase and I, passed our exams. I gotta tell you, it’s a relief since I didn’t want to title this article, ‘Two Out of Three Ain’t Bad.’ Good song but wanted to avoid that. We started this excursion back in April (me in March) with the team deciding to create a study group. Each week we’d tackle a topic with the guidance of Eric Mitchell’s excellent Study Guide. We worked through the sections and decided to test our luck with the Certification Team’s mobile testing center…with the pressure of passing during an F5 event. Imagine the slight pre-test anxiety going th... (more)