The entire intent of load balancing is to create a system that virtualizes
the “service” from the physical servers that actually run that service. A
more basic definition is to balance the load across a bunch of physical
servers and make those servers look like one great big server to the outside
world. There are many reasons to do this, but the primary drivers can be
summarized as “scalability,” “high availability,” and
Scalability is the capability of dynamically, or easily, adapting to
increased load without impacting existing performance. Service virtualization
presented an interesting opportunity for scalability; if the service, or the
point of user contact, was separated from the actual servers, scaling of the
application would simply mean adding more servers or cloud resources which
would not be visible to the end user.
High Availability ... (more)
The mad dash to connect virtually every noun to the internet or the Internet
of Things is creating a massive M2M network for all the devices, systems,
sensors and actuators to connect & communicate on the Internet.
With that, they need a communications protocol to understand each other. One
of those is Message Queue Telemetry Transport (MQTT). MQTT is a “subscribe
and publish” messaging protocol designed for lightweight machine-to-machine
(or IoT) communications.
In this episode of Lightboard Lessons, I light up how MQTT works.
IoT Ready Infrastructure IoT Effect on Applications IoT Influence on Society
What are These "Things? The Intruders of Things
Internet [email protected], taking place June 6-8, 2017 at Javits Center, New
York City, is co-located with 20th [email protected] and will feature
technical sessions from a rock star conference facult... (more)
The time of year when crystal balls get a viewing and many pundits put out
their annual predictions for the coming year. Rather than thinking up my own,
I figured I’d regurgitate what many others are expecting to happen.
8 Predictions About How the Security Industry Will Fare in 2017 – An eWeek
slideshow looking at areas like IoT, ransomware, automated attacks and the
security skills shortage in the industry. Chris Preimesberger (@editingwhiz),
who does a monthly #eweekchat on twitter, covers many of the worries facing
10 IoT Predictions for 2017 – IoT was my number 1 in The Top 10, Top 10
Predictions for 2016 and no doubt, IoT will continue to cause havoc. People
focus so much on the ‘things’ themselves rather than the risk of an
internet connection. This list discusses how IoT will grow up in 2017, how
having a service component will be key, the com... (more)
I recently recovered from ACDF surgery where they remove a herniated or
degenerative disc in the neck and fuse the cervical bones above and below the
disk. My body had a huge vulnerability where one good shove or fender bender
could have ruptured my spinal cord. I had some items removed and added some
hardware and now my risk of injury is greatly reduced.
Breaches are occurring at a record pace, botnets are consuming IoT devices
and bandwidth, and the cloud is becoming a de-facto standard for many
companies. Vulnerabilities are often found at the intersection of all three
of these trends, so vulnerability and risk management has never been a
greater or more critical challenge for organizations.
Vulnerabilities come in all shapes and sizes but one thing that stays
constant – at least in computer security – is that a vulnerability is a
weakness which allows an attack... (more)
JANUARY 8, 2014 02:00 PM EST
When we talk about the impact of BYOD and BYOA and the Internet of Things, we
often focus on the impact on data center architectures. That's because there
will be an increasing need for authentication, for access control, for
security, for application delivery as the number of potential endpoints
(clients, devices, things) increases. That means scale in the data center.
What we gloss over, what we skip, is that before any of these "things" ever
makes a request to access an application it had to execute a DNS query.
Every. Single. Thing.
Maybe that's because we assume DNS can handle the load. So far it's done
well. You rarely, if ever, hear of disruptions or outages due directly to the
execution of DNS. Oh, there has been some issues with misconfiguration of DNS
and of exploitation of DNS (hijacking, illicit use in reflection attacks,
The Year of the (Fire) Rooster will soon be upon us and the talkative,
outspoken, frank, open, honest, and loyal Rooster could influence events in
2017. Whether you were born under the symbol or not, Roosters strive on trust
and responsibility, essential for any organization especially in these times.
2016 (Year of the Monkey) brought us a crazy year of high profile breaches, a
500% increase in ransomware, a 0-day per day and slick malware each looking
to cause havoc on all parts of society including your mobile device. The
monkey’s shenanigans exhausted many of us in 2016 and 2017 will require
some quick thinking and practical solutions to battle the ongoing,
A year ago I noted, Mobility, both the state of being and the devices we use,
will continue to grow and be an immense enabler and/or inhibitor for
organizations. Today, we are the devices... (more)
I meet with F5′s ARX Solution Engineer Matt Quill for a F5 ARX and Oracle
ZFS Storage along with chatting with Oracle’s David Wallace.
Oracle OpenWorld 2011 – Aloha:Find F5 Booth 1527 Oracle OpenWorld 2011:
BIG-IP WANOp & Oracle GoldenGate Oracle OpenWorld 2011: F5 ARX & Oracle ZFS
Storage F5 YouTube Channel Oracle OpenWorld Live
Technorati Tags: F5, oracle openworld, integration, Pete Silva, security,
business, goldengate, technology, zfs, storage, oracle, oow2011
Connect with Peter: Connect with F5:
2020 seems to be an important milestone for the Internet of Things. That’s
the year that Cisco says there will be 50 billion connected devices and also
the year Gartner notes that over 50% of major new business processes and
systems will incorporate some element of the Internet of Things.
That’s the good news.
A recent Symantec Internet Security Threat Report says there are 25 connected
devices per 100 inhabitants in the US. Minimum 25 entry points to your
personal information, not counting your front door, personal computers,
compromised ATMs and other data sources. As your connected devices grow, so
will your exposure. And with no clear methods of identifying and
authenticating connected devices, enterprises will have a challenging time
getting a handle on how many employee shirts, shoes, fitness trackers, and
smartwatches are connected to the corporate network. ... (more)
A few years ago, those little iHome alarm clocks started to appear in hotel
rooms. Cool gadgets that you could mount your mobile phone to battery charge
or play the music on the device. We also had a few in our home. They worked
perfectly for the iPhone 4 since the connector was that 1 inch protruding
plug. When I got the iPhone6, those clocks instantly became useless.
Obsolete. At least the phone connector part lost its value.
I’ve been thinking about this for a while.
The rate of obsolescence. The state when an object, technology, service or
practice is no longer needed or wanted… even though it still may be in good
working order. E-waste is the fastest growing segment of the waste stream.
With the technological advances, not only are we buying the latest and
greatest electronics but we’re also dumping perfectly good, working devices
at silly rates. There was eve... (more)
With 2016 crossing the half way point, let’s take a look at some technology
trends thus far.
Breaches: Well, many databases are half empty due to the continued rash of
intrusions while the crooks are half full with our personal information.
According to the Identity Theft Resource Center (ITRC), there have been 522
breaches thus far in 2016 exposing almost 13,000,000 records. Many are health
care providers as our medical information is becoming the gold mine of stolen
info. Not really surprising since the health care wearable market is set to
explode in the coming years. Many of those wearables will be transmitting our
health data back to providers. There were also a bunch of very recognizable
names getting blasted in the media: IRS, Snapchat, Wendy’s and LinkedIn.
And the best advice we got? Don’t use the same password across multiple
sites. Updating passwords is ... (more)
Fun and a little mental.
If you’ve been following along the DevCentral team’s journey toward F5
Certification, then you may be aware that we were in Chicago last week for
F5’s Agility 2016 conference and took our 101 Application Delivery
Fundamentals exam. I am happy to report that all of us, Jason, John, Chase
and I, passed our exams. I gotta tell you, it’s a relief since I didn’t
want to title this article, ‘Two Out of Three Ain’t Bad.’ Good song but
wanted to avoid that.
We started this excursion back in April (me in March) with the team deciding
to create a study group. Each week we’d tackle a topic with the guidance of
Eric Mitchell’s excellent Study Guide. We worked through the sections and
decided to test our luck with the Certification Team’s mobile testing
center…with the pressure of passing during an F5 event. Imagine the slight
pre-test anxiety going th... (more)