The Global Leader in Application Delivery Networking

F5 Networks

Subscribe to F5 Networks: eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get F5 Networks: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories

The time of year when crystal balls get a viewing and many pundits put out their annual predictions for the coming year. Rather than thinking up my own, I figured I’d regurgitate what many others are expecting to happen. 8 Predictions About How the Security Industry Will Fare in 2017 – An eWeek slideshow looking at areas like IoT, ransomware, automated attacks and the security skills shortage in the industry. Chris Preimesberger (@editingwhiz), who does a monthly #eweekchat on twitter, covers many of the worries facing organizations. 10 IoT Predictions for 2017 – IoT was my number 1 in The Top 10, Top 10 Predictions for 2016 and no doubt, IoT will continue to cause havoc. People focus so much on the ‘things’ themselves rather than the risk of an internet connection. This list discusses how IoT will grow up in 2017, how having a service component will be key, the com... (more)

Managing Your Vulnerabilities | @ThingsExpo #IoT #M2M #Cloud #Security

I recently recovered from ACDF surgery where they remove a herniated or degenerative disc in the neck and fuse the cervical bones above and below the disk. My body had a huge vulnerability where one good shove or fender bender could have ruptured my spinal cord. I had some items removed and added some hardware and now my risk of injury is greatly reduced. Breaches are occurring at a record pace, botnets are consuming IoT devices and bandwidth, and the cloud is becoming a de-facto standard for many companies. Vulnerabilities are often found at the intersection of all three of these trends, so vulnerability and risk management has never been a greater or more critical challenge for organizations. Vulnerabilities come in all shapes and sizes but one thing that stays constant – at least in computer security – is that a vulnerability is a weakness which allows an attack... (more)

The #IoT and DNS | @ThingsExpo #BigData #IoT #M2M #DigitalTransformation

JANUARY 8, 2014 02:00 PM EST When we talk about the impact of BYOD and BYOA and the Internet of Things, we often focus on the impact on data center architectures. That's because there will be an increasing need for authentication, for access control, for security, for application delivery as the number of potential endpoints (clients, devices, things) increases. That means scale in the data center. What we gloss over, what we skip, is that before any of these "things" ever makes a request to access an application it had to execute a DNS query. Every. Single. Thing. Maybe that's because we assume DNS can handle the load. So far it's done well. You rarely, if ever, hear of disruptions or outages due directly to the execution of DNS. Oh, there has been some issues with misconfiguration of DNS and of exploitation of DNS (hijacking, illicit use in reflection attacks, et... (more)

iWorkflow and Orchestration | @CloudExpo #IoT #M2M #DigitalTransformation

The digital society has emerged. Today’s always-connected world and the applications we interact with are changing the way we live. People are mobile, our devices are mobile, and by all accounts, everything that is a noun – a person, place or thing – will soon be connected and generating data… and all that traffic is destined for an application – that could also be portable – located somewhere in a data center. But not all data traffic is created equally and critical information might need some action that requires automation of the deployment process. At the same time, organizations can’t afford to manually make policy adjustments every time something needs attention. Automated coordination between applications, data and infrastructure from provisioning to applying policies and services which are in-line with business needs must be in place. This is Orchestration.... (more)

I’m Sorry Sir, You’re Obsolete | @ThingsExpo #IoT #M2M #API #Cloud

A few years ago, those little iHome alarm clocks started to appear in hotel rooms. Cool gadgets that you could mount your mobile phone to battery charge or play the music on the device. We also had a few in our home. They worked perfectly for the iPhone 4 since the connector was that 1 inch protruding plug. When I got the iPhone6, those clocks instantly became useless. Obsolete. At least the phone connector part lost its value. I’ve been thinking about this for a while. The rate of obsolescence. The state when an object, technology, service or practice is no longer needed or wanted… even though it still may be in good working order. E-waste is the fastest growing segment of the waste stream. With the technological advances, not only are we buying the latest and greatest electronics but we’re also dumping perfectly good, working devices at silly rates. There was eve... (more)

Is 2016 Half Empty or Half Full? | @CloudExpo #BigData #IoT #Mobile #Security

With 2016 crossing the half way point, let’s take a look at some technology trends thus far. Breaches: Well, many databases are half empty due to the continued rash of intrusions while the crooks are half full with our personal information. According to the Identity Theft Resource Center (ITRC), there have been 522 breaches thus far in 2016 exposing almost 13,000,000 records. Many are health care providers as our medical information is becoming the gold mine of stolen info. Not really surprising since the health care wearable market is set to explode in the coming years. Many of those wearables will be transmitting our health data back to providers. There were also a bunch of very recognizable names getting blasted in the media: IRS, Snapchat, Wendy’s and LinkedIn. And the best advice we got? Don’t use the same password across multiple sites. Updating passwords is ... (more)

Are People Programmable? | @ThingsExpo #IoT #BigData

For the month of June, DevCentral is highlighting our Programmability Month and Codeshare Challenge. A fantastic opportunity to catch up on the power of programmability and learn how the BIG-IP platform can transform your infrastructure with a few lines of code. Since my coding ability is still in the infancy stage, I thought of looking at programmability from a different angle. Can we code a human? First, the word ‘Programmability.’ According to multiple sources including dictionary.com, it is derived from the adjective ‘Programmable’ or capable of being programmed. As a noun, it can be an electronic device that can be programmed to perform specific tasks. We hear the word Program in many different contexts – a plan of action to accomplish something, a schedule of events, a television/entertainment program, a planned group of activities for a purpose and so forth. ... (more)

Is 2015 Half Empty or Half Full? By @PSilvas | @ThingsExpo #IoT #Cloud

With 2015 crossing the half way point, let’s take a look at some technology trends thus far. Breaches: Well, many databases are half empty due to the continued rash of intrusions while the crooks are half full with our personal information. Data breaches are on a record pace this year and according to the Identity Theft Resource Center (ITRC), there have been 400 data incidents as of June 30, 2015. One more than this time last year. And, 117,576,693 records had been compromised. ITRC also noted a 85% increase in the number of breaches within the banking sector. From health care to government agencies to hotel chains to universities and even Major League Baseball, breaches and attacks are now a daily occurrence. Cloud: Who would’ve thought back in 2008 that this cloud thing would now be half full? Over the last couple years, the ‘cloud’ has become a very viable op... (more)

Your Applications Deserve iApps | @ThingsExpo #IoT #M2M @API

F5 iApps are user-customizable frameworks for deploying applications that enables you to ‘templatize’ sets of functionality on your F5 gear. You can automate the process of adding virtual servers or build a custom iApp to manage your iRules inventory. Application ready templates were introduced in BIG-IP v10 and the goal was to provide a wizard for the often deployed applications like Exchange, SharePoint, Citrix, Oracle, VMware and so forth. This allowed the abstraction some of the configuration details and reduced the human error when following the pages of the thick deployment guides for those applications. Application templates were great but there was no way to customize the template either during the deployment or adjust it after. Then came iApps®. Introduced in TMOS v11, iApps is the current BIG-IP system framework for deploying services-based, template-driv... (more)

F5 BIG-IP Solution Enables Rackspace Customers to Integrate Cloud Hosting

F5 Networks on Wednesday announced that Rackspace chose F5 BIG-IP products as the foundation for its innovative Cloud Connect service. Cloud Connect is a hybrid architecture that allows customers to mix dedicated and cloud based hosting platforms for scalability, flexibility, and efficiency. With an F5 BIG-IP solution, Rackspace customers can provision resources, secure and manage network traffic, and balance workloads in real time among the two environments. "We chose BIG-IP as a cornerstone of Cloud Connect because with it, we can make our customers' dedicated servers and cloud environments communicate seamlessly with each other over a protected, private network," said Toby Owen, Product Manager for Hybrid Hosting Solutions at Rackspace. "This solution does much more than provide a physical connection; it allows customers to take advantage of BIG-IP's intelligent... (more)

How Load Balancing Impacts the Cost of Cloud

It's not the first time we've heard the statement that cloud can be too expensive and I doubt it will be the last. This latest episode comes from Alexei Rodriguez, Head of Ops at Evernote by way of Structure 2014: Original Tweet: https://twitter.com/joeweinman/status/479769276027379712 It is important to note that this admission - like those in the past - have come from what we call "web monsters." Web monsters are, as the name implies, web-first (and usually only) organizations who have millions (or billions) of users. Modern web monsters generally have only one application for which they are responsible, a la Evernote, Netflix, Facebook, etc... It is unlikely that most enterprises will encounter this same conundrum - that of the cloud actually costing more than a DIY approach - for short-lived projects. A marketing campaign, seasonal promotions and offerings, etc...... (more)