JANUARY 8, 2014 02:00 PM EST
When we talk about the impact of BYOD and BYOA and the Internet of Things, we
often focus on the impact on data center architectures. That's because there
will be an increasing need for authentication, for access control, for
security, for application delivery as the number of potential endpoints
(clients, devices, things) increases. That means scale in the data center.
What we gloss over, what we skip, is that before any of these "things" ever
makes a request to access an application it had to execute a DNS query.
Every. Single. Thing.
Maybe that's because we assume DNS can handle the load. So far it's done
well. You rarely, if ever, hear of disruptions or outages due directly to the
execution of DNS. Oh, there has been some issues with misconfiguration of DNS
and of exploitation of DNS (hijacking, illicit use in reflection attacks,
With 2016 crossing the half way point, let’s take a look at some technology
trends thus far.
Breaches: Well, many databases are half empty due to the continued rash of
intrusions while the crooks are half full with our personal information.
According to the Identity Theft Resource Center (ITRC), there have been 522
breaches thus far in 2016 exposing almost 13,000,000 records. Many are health
care providers as our medical information is becoming the gold mine of stolen
info. Not really surprising since the health care wearable market is set to
explode in the coming years. Many of... (more)
The digital society has emerged.
Today’s always-connected world and the applications we interact with are
changing the way we live. People are mobile, our devices are mobile, and by
all accounts, everything that is a noun – a person, place or thing – will
soon be connected and generating data… and all that traffic is destined for
an application – that could also be portable – located somewhere in a
But not all data traffic is created equally and critical information might
need some action that requires automation of the deployment process. At the
same time, organiz... (more)
For the month of June, DevCentral is highlighting our Programmability Month
and Codeshare Challenge. A fantastic opportunity to catch up on the power of
programmability and learn how the BIG-IP platform can transform your
infrastructure with a few lines of code.
Since my coding ability is still in the infancy stage, I thought of looking
at programmability from a different angle. Can we code a human?
First, the word ‘Programmability.’ According to multiple sources
including dictionary.com, it is derived from the adjective ‘Programmable’
or capable of being programmed. As a noun, i... (more)
2020 seems to be an important milestone for the Internet of Things. That’s
the year that Cisco says there will be 50 billion connected devices and also
the year Gartner notes that over 50% of major new business processes and
systems will incorporate some element of the Internet of Things.
That’s the good news.
A recent Symantec Internet Security Threat Report says there are 25 connected
devices per 100 inhabitants in the US. Minimum 25 entry points to your
personal information, not counting your front door, personal computers,
compromised ATMs and other data sources. As your con... (more)
A few years ago, those little iHome alarm clocks started to appear in hotel
rooms. Cool gadgets that you could mount your mobile phone to battery charge
or play the music on the device. We also had a few in our home. They worked
perfectly for the iPhone 4 since the connector was that 1 inch protruding
plug. When I got the iPhone6, those clocks instantly became useless.
Obsolete. At least the phone connector part lost its value.
I’ve been thinking about this for a while.
The rate of obsolescence. The state when an object, technology, service or
practice is no longer needed or wan... (more)