The Global Leader in Application Delivery Networking

F5 Networks

Subscribe to F5 Networks: eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get F5 Networks: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories

The mad dash to connect virtually every noun to the internet or the Internet of Things is creating a massive M2M network for all the devices, systems, sensors and actuators to connect & communicate on the Internet. With that, they need a communications protocol to understand each other. One of those is Message Queue Telemetry Transport (MQTT). MQTT is a “subscribe and publish” messaging protocol designed for lightweight machine-to-machine (or IoT) communications. In this episode of Lightboard Lessons, I light up how MQTT works. ps Related: IoT Ready Infrastructure IoT Effect on Applications IoT Influence on Society What are These "Things? The Intruders of Things Internet [email protected], taking place June 6-8, 2017 at Javits Center, New York City, is co-located with 20th [email protected] and will feature technical sessions from a rock star conference facult... (more)

2017 Top 10 Predictions | @CloudExpo #BigData #IoT #AI #ML #DL #DevOps

The time of year when crystal balls get a viewing and many pundits put out their annual predictions for the coming year. Rather than thinking up my own, I figured I’d regurgitate what many others are expecting to happen. 8 Predictions About How the Security Industry Will Fare in 2017 – An eWeek slideshow looking at areas like IoT, ransomware, automated attacks and the security skills shortage in the industry. Chris Preimesberger (@editingwhiz), who does a monthly #eweekchat on twitter, covers many of the worries facing organizations. 10 IoT Predictions for 2017 – IoT was my number 1 in The Top 10, Top 10 Predictions for 2016 and no doubt, IoT will continue to cause havoc. People focus so much on the ‘things’ themselves rather than the risk of an internet connection. This list discusses how IoT will grow up in 2017, how having a service component will be key, the com... (more)

What Is Virtual Desktop Infrastructure | @CloudExpo #VDI #Cloud #DataCenter

What is VDI? Imagine not having to carry around a laptop or be sitting in a cubicle to access your work desktop applications. Virtual desktop infrastructure (VDI) is appealing to many different constituencies because it combines the benefits of anywhere access with desktop support improvements. Employees typically use a wide range of mobile devices from laptops to tablets and from desktops to smartphones are being used. The diversity of these mobile devices and the sheer number of them in the workplace can overwhelm IT and strain your resources. Desktop Virtualization centralizes sets of desktops, usually in a data center or cloud environment, and then provide access to your employees whether they are in the office, at home or mobile.  VDI deployments virtualize user desktops by delivering them to distinctive endpoint devices over the network from a central locatio... (more)

Securing the Internet of Things | @ThingsExpo #IoT #M2M #Sensors #Security

Security Trends in 2016: Securing the Internet of Things Whenever you connect anything to the internet, there is risk involved. Just ask the millions of IoT zombies infected with Mirai. Sure, there have been various stories over the years about hacking thermostats, refrigerators, cameras, pacemakers, insulin pumps and other medical devices along with cars, homes and hotel rooms…but Mirai took it to a new level. And it’s not the only IoT botnet out there nor are these nasty botnets going away anytime soon. There’s a gold mine of unprotected devices out there waiting to either have their/your info stolen or be used to flood another website with traffic. This is bound to compound in the years to come. A recent Ponemon Institute report noted that an incredible 80% of IoT applications are not tested for vulnerabilities. Let’s try that again – only 20% of the IoT appl... (more)

What Is DNS? | @CloudExpo #Cloud #Security #APM #Monitoring

What Is the Domain Name System (DNS)? Imagine how difficult it would be to use the Internet if you had to remember dozens of number combinations to do anything. The Domain Name System (DNS) was created in 1983 to enable humans to easily identify all the computers, services, and resources connected to the Internet by name—instead of by Internet Protocol (IP) address, an increasingly difficult-to-memorize string of information. Think of all the website domain names you know off the top of your head and how hard it would be to memorize specific IP addresses for all those domain names. Think of DNS as the Internet’s phone book. A DNS server translates the domain names you type into a browser, like www.f5.com, into an IP address (104.219.105.148), which allows your device to find the resource you’re looking for on the Internet. DNS is a hierarchical distributed naming sy... (more)

What Is Load Balancing? | @CloudExpo #IoT #M2M #API #Cloud

The entire intent of load balancing is to create a system that virtualizes the “service” from the physical servers that actually run that service. A more basic definition is to balance the load across a bunch of physical servers and make those servers look like one great big server to the outside world. There are many reasons to do this, but the primary drivers can be summarized as “scalability,” “high availability,” and “predictability.” Scalability is the capability of dynamically, or easily, adapting to increased load without impacting existing performance. Service virtualization presented an interesting opportunity for scalability; if the service, or the point of user contact, was separated from the actual servers, scaling of the application would simply mean adding more servers or cloud resources which would not be visible to the end user. High Availability ... (more)

OK 2017, Now What? | @ThingsExpo #IoT #M2M #Sensors #Mobility

The Year of the (Fire) Rooster will soon be upon us and the talkative, outspoken, frank, open, honest, and loyal Rooster could influence events in 2017. Whether you were born under the symbol or not, Roosters strive on trust and responsibility, essential for any organization especially in these times. 2016 (Year of the Monkey) brought us a crazy year of high profile breaches, a 500% increase in ransomware, a 0-day per day and slick malware each looking to cause havoc on all parts of society including your mobile device. The monkey’s shenanigans exhausted many of us in 2016 and 2017 will require some quick thinking and practical solutions to battle the ongoing, ever-growing threats. A year ago I noted, Mobility, both the state of being and the devices we use, will continue to grow and be an immense enabler and/or inhibitor for organizations. Today, we are the devices... (more)

Internet of Things "My Sensored Family" By @PSilvas | @ThingsExpo [#IoT]

My Sensored Family Lately I've been writing a bunch about the Internet of Things or IoT. You know, where everyday objects have software, chips, and sensors to capture data and report back. Household items like refrigerators, toilets and thermostats along with clothing, cars and soon, the entire home will be connected. Many of these devices provide actionable data - or just fun entertainment - so people can make decisions about whatever is being monitored. It can also help save lives. Recently my daughter became a robot, at least according to her. My daughter has a rare genetic disorder called HI/HA GDH - Hyperinsulinism / Hyperammonemia Syndrome in the Glutamate Dehydrogenase gene. Say that 3 times fast. Basically, she produces too much insulin (extreme hypoglycemic) and too much ammonia. She gets blood work done every couple months and recently we've had some con... (more)

F5 BIG-IP Solution Enables Rackspace Customers to Integrate Cloud Hosting

F5 Networks on Wednesday announced that Rackspace chose F5 BIG-IP products as the foundation for its innovative Cloud Connect service. Cloud Connect is a hybrid architecture that allows customers to mix dedicated and cloud based hosting platforms for scalability, flexibility, and efficiency. With an F5 BIG-IP solution, Rackspace customers can provision resources, secure and manage network traffic, and balance workloads in real time among the two environments. "We chose BIG-IP as a cornerstone of Cloud Connect because with it, we can make our customers' dedicated servers and cloud environments communicate seamlessly with each other over a protected, private network," said Toby Owen, Product Manager for Hybrid Hosting Solutions at Rackspace. "This solution does much more than provide a physical connection; it allows customers to take advantage of BIG-IP's intelligent... (more)

CloudNOW Interviews: Lauren States, IBM VP of Cloud Computing

by Seema Jethani and Lori MacVittie Very few organizations have the insight that comes from longevity and are able to bring that experience to bear in new and emerging markets. IBM is one of them. That means when IBM makes a statement with respect to the (near and far) future of computing, it’s almost always more than prognostication, it’s pragmatism based on real experience. In that regard, IBM has consistently moved forward with cloud computing using measured strides across its portfolio of products and services, recognizing that the technology evolution often outpaces readies for adoption, if not interest. Its long history with organizations large and small ensures that IBM understands the challenges of adopting new technology, not just from a technical perspective but from a business perspective as well. In a recent interview with CloudNOW, Lauren States, Vic... (more)

F5 Security Vignette Series

Over the last couple weeks, we’ve been rolling out a series of short Security Vignette videos about various IT security challenges.  We’ve posted them to the F5News blog account but also wanted to share in case you missed them.  If we were going to sum up the role of security in corporate IT today we’d have to say it’s to "be prepared." This series looks at many of those security concerns which can be addressed proactively, before they are exploited or become a fire drill. F5 Security Vignette: Proactive Security – The F5 Security Vignette series looks at various security concerns, vulnerabilities and attacks which can cause headaches for Corporate IT and the business integrity overall. This video covers SSL Certificates. F5 Security Vignette: DNSSEC Wrapping – The dirty little secret of the Internet is how insecure DNS really is. The good news is, there’s a soluti... (more)