The digital society has emerged.
Today’s always-connected world and the applications we interact with are
changing the way we live. People are mobile, our devices are mobile, and by
all accounts, everything that is a noun – a person, place or thing – will
soon be connected and generating data… and all that traffic is destined for
an application – that could also be portable – located somewhere in a
But not all data traffic is created equally and critical information might
need some action that requires automation of the deployment process. At the
same time, organizations can’t afford to manually make policy adjustments
every time something needs attention. Automated coordination between
applications, data and infrastructure from provisioning to applying policies
and services which are in-line with business needs must be in place.
This is Orchestration.... (more)
With 2016 crossing the half way point, let’s take a look at some technology
trends thus far.
Breaches: Well, many databases are half empty due to the continued rash of
intrusions while the crooks are half full with our personal information.
According to the Identity Theft Resource Center (ITRC), there have been 522
breaches thus far in 2016 exposing almost 13,000,000 records. Many are health
care providers as our medical information is becoming the gold mine of stolen
info. Not really surprising since the health care wearable market is set to
explode in the coming years. Many of... (more)
A few years ago, those little iHome alarm clocks started to appear in hotel
rooms. Cool gadgets that you could mount your mobile phone to battery charge
or play the music on the device. We also had a few in our home. They worked
perfectly for the iPhone 4 since the connector was that 1 inch protruding
plug. When I got the iPhone6, those clocks instantly became useless.
Obsolete. At least the phone connector part lost its value.
I’ve been thinking about this for a while.
The rate of obsolescence. The state when an object, technology, service or
practice is no longer needed or wan... (more)
Initially, we came across ransomware which exploited the entire system and
just restricted you from interacting with your own device, later on requiring
you to pay dollars if you want to go back and use your computer.
And then it started becoming obsolete because an end-user. People were asking
themselves: “That is my computer, would I pay $100 for it? If I don't
really have data, I’d better format my PC and start all over again.” So,
that strategy – locking access to computers, started becoming obsolete.
What did the bad guys do? They realized that the previous strategy was onl... (more)
F5 iApps are user-customizable frameworks for deploying applications that
enables you to ‘templatize’ sets of functionality on your F5 gear. You
can automate the process of adding virtual servers or build a custom iApp to
manage your iRules inventory.
Application ready templates were introduced in BIG-IP v10 and the goal was to
provide a wizard for the often deployed applications like Exchange,
SharePoint, Citrix, Oracle, VMware and so forth. This allowed the abstraction
some of the configuration details and reduced the human error when following
the pages of the thick deploymen... (more)
For the month of June, DevCentral is highlighting our Programmability Month
and Codeshare Challenge. A fantastic opportunity to catch up on the power of
programmability and learn how the BIG-IP platform can transform your
infrastructure with a few lines of code.
Since my coding ability is still in the infancy stage, I thought of looking
at programmability from a different angle. Can we code a human?
First, the word ‘Programmability.’ According to multiple sources
including dictionary.com, it is derived from the adjective ‘Programmable’
or capable of being programmed. As a noun, i... (more)