2015
4 TopicsBlog Roll 2015
It’s that time of year when we gift and re-gift, just like this text from last year. And the perfect opportunity to re-post, re-purpose and re-use all my 2015 blog entries. If you missed any of the 89 attempts including 59 videos, here they are wrapped in one simple entry. I read somewhere that lists in blogs are good. I broke it out by month to see what was happening at the time and let's be honest, pure self-promotion. Thanks for reading and watching throughout 2015. Have a Safe and Happy New Year. January 2015 OK 2015, Now What? The Analog Generation Application Availability Between Hybrid Data Centers Will Deflate-Gate Lead to Micro-Chipped Footballs? VMware Partner Exchange 2015: Video Preview February VMware PEX 2015 – Find F5 VMware PEX 2015 – What Customers Want From Security Vendors VMware PEX 2015 – BIG-IP on vCloud Air VMware PEX 2015 – F5 Channel Partner Ecosystem VMware PEX 2015 – That’s a Wrap! 5 Ways #IamF5 The Internet of Me, Myself & I Intelligent DNS Animated Whiteboard Mobile World Congress 2015 - The Preview Video March MWC 2015 - Find F5 MWC 2015 – NFV for Service Providers (feat Yue) MWC 2015 – Threats to Mobile Carrier Networks (feat George) MWC 2015 – How LTE Roaming Works (feat Nas) MWC 2015 – Getting Work Done on the Go (feat Carovano) MWC 2015 - SDN Demystified (feat Duncan) MWC 2015 – TCP Opt for Service Providers (feat Yue) MWC 2015 – Enhancing Subscriber’s Quality of Experience (feat Mahmoodi) MWC 2015 – The Mobile Revolution with F5 CEO John McAdam MWC 2015 – That’s a Wrap! Lost in Translation...in Italy April Healthcare in the Crosshairs What are These "Things”? IoT Influence on Society RSA 2015 - The Preview Video RSA2015 – Find F5 RSA2015 Partner Spotlight - RSA Risk Based Authentication RSA2015 – Defending the New Perimeter RSA2015 – The InfoSec Landscape with Jeremiah Grossman RSA2015 Partner Spotlight: FireEye Partnership RSA2015 – SSL Everywhere (feat Holmes) RSA2015 – That’s a Wrap! IoT Effect on Applications May IoT Ready Infrastructure F5 Agility EMEA 2015 - The Preview Video F5 EMEA Agility 2015 - Welcome to Edinburgh What Are You Looking Forward To At F5 Agility 2015? F5 Agility 2015 EMEA – ACI with F5 & Cisco F5 Agility 2015 EMEA – King Robert the Bruce F5 Agility 2015 EMEA – Sir William Wallace That’s a Wrap from EMEA F5 Agility 2015 June The IoT Ready Platform I Almost Bit...and Would've Been Bitten July F5 Animated Whiteboards Is 2015 Half Empty or Half Full? F5Agility15 - The Preview Video August Welcome to F5 Agility 2015 Innovate, Expand, Deliver with F5 CEO Manny Rivelo Get F5 Certified at F5 Agility 2015 Software Defined Data Center Made Easy with F5 and VMware F5 DevCentral Solves Your BIG-IP Questions That's a Wrap from #F5Agility15 Our Five Senses on Sensors VMworld2015 – The Preview Video VMworld2015 – Find F5 VMworld2015 – Realize the Virtual Possibilities (feat. de la Motte) September VMworld2015 – Business Mobility Made Easy with F5 and VMware (feat. Venezia) Software Defined Data Center Made Simple (feat. Pindell) - VMworld2015 That’s a Wrap from VMworld2015 F5 + Blue Medora: Gain Control of Your Applications with vRealize Is Your DNS Vulnerable? October AWS re:Invent 2015 – The Preview Video IoT: Tabs to be Read Later Find F5 at AWS re:Invent 2015 AWS re:Invent 2015 - Value of App Services in the Cloud (feat Vrankic) AWS re:Invent 2015 – SSL Everywhere…Including the Cloud (feat Stanley) AWS re:Invent 2015 – Web Application Firewall in the Cloud (feat Haynes) AWS re:Invent 2015 – Programmability in the Cloud (feat Applebaum) AWS re:Invent 2015 – The F5 Ready Program (feat Pickering) That’s a Wrap from AWS re:Invent 2015 The Wave of Change at Tech Events F5 + SimpliVity: Deploy and Simplify Application Deployments Together Wearables Head to Tail F5 + Nutanix: Invisible Infrastructure and SDAS Joining Forces November Ask the Expert – Are WAFs Dead? Ask the Expert – Why SSL Everywhere? Ask the Expert – Why Web Fraud Protection? Ask the Expert – Why Identity and Access Management? Connecting the Threads Identity Theft: Not So Scary Anymore? F5 Blog: Backseat Drivers, Your Wish Has Come True Inside the ALOHA! December Arguing with Things Punchbowl, Pearl Harbor and my Grandparents The Top 10, Top 10 Predictions for 2016 And a couple special holiday themed entries from years past. e-card Malware X marks the Games ps Related Blog Roll 2014 Blog Roll 2013 Blog Roll 2012 Blog Roll 2011 Technorati Tags: f5,big-ip,security,cloud,mobile,video,silva,2015,blogs,iot,things Connect with Peter: Connect with F5:298Views0likes0CommentsIs 2015 Half Empty or Half Full?
With 2015 crossing the half way point, let's take a look at some technology trends thus far. Breaches: Well, many databases are half empty due to the continued rash of intrusions while the crooks are half full with our personal information. Data breaches are on a record pace this year and according to the Identity Theft Resource Center (ITRC), there have been 400 data incidents as of June 30, 2015. One more than this time last year. And, 117,576,693 records had been compromised. ITRC also noted a 85% increase in the number of breaches within the banking sector. From health care to government agencies to hotel chains to universities and even Major League Baseball, breaches and attacks are now a daily occurrence. Cloud: Who would've thought back in 2008 that this cloud thing would now be half full? Over the last couple years, the 'cloud' has become a very viable option for organizations large and small. It is becoming the platform for IoT and many organizations such as Google and GE are now moving critical corporate applications to the cloud. While hybrid is the new normal remember, The Cloud is Still just a Datacenter Somewhere. DNS: While IPv4 addresses are now completely empty, DNS seems to be half to almost full in 2015. DNS continues to be a target for attackers along with being an enabler for IoT. It is so important that Cisco recently acquired OpenDNS to help fight IoT attacks and the courts got a guilty plea from an Estonian man who altered DNS settings on infected PCs with the DNSChanger malware. I think of DNS as a silent sufferer - you really don't care about it until it doesn't work. Start caring this year. Internet: Full but still growing. As noted above, IPv4 addresses are gone. Asia, Europe, Latin America and now North America have run out of IPv4 addresses and have exhausted their supplies. If you're wondering how to handle this glass, F5 has some awesome 4to6 and 6to4 solutions. IoT: Things, sensors and actuators are all the buzz and are certainly half full for 2015. At this time last year, IoT was at the top of the Gartner Hype Cycle and it has certainly not disappointed. Stories abound about Internet of Things Security Risks and Challenges, 10 of the biggest IoT data generators, the Top 10 Worst Wearable Tech Devices So Far, The (Far-Flung) Future Of Wearables, along with the ability to Smell Virtual Environments and if We Need Universal Robot Rights, Ethics And Legislation. RoboEthics, that is. Mobile: We are mobile, our devices are mobile and the applications we access are now probably mobile also. Mobility, in all it's connotations, is a huge concern for enterprises and it'll only get worse as we start wearing our connected clothing to the office. The Digital Dress Code has emerged. Mobile is certainly half full and there is no empting it now. Privacy: At this point with all the surveillance, data breaches, gadgets gathering our daily data and our constant need to tell the world what we're doing every second, this is probably bone dry. Pardon, half empty, sticking to the theme. That's what I got so far and I'm sure 2015's second half will bring more amazement, questions and wonders. We'll do our year in reviews and predictions for 2016 as we all lament, where did 2015 go? There is that old notion that if you see a glass half full, you're an optimist and if you see it half empty you are a pessimist. Actually, you need to understand what the glass itself was before the question. Was it empty and filled half way or was it full and poured out? There's you answer! ps Related: It's all contained within the blog. Technorati Tags: f5,breach,security,cloud,dns,iot,mobile,2015,silva,empty or full Connect with Peter: Connect with F5:1.1KViews0likes2CommentsOK 2015, Now What?
Once again after a couple weeks off and the calendar odometer flipping another year, I'm sitting here with a blinking curser wondering what to write about. And the thing that pops into my head are Things. The Everythings. While 2014 was the hype year for the Internet of Things (IoT), according to many 2015 will be the year that IoT...and really the Internet of Everything, becomes mainstream. It is occurring this week at CES where tons of smart cars, smart kitchens, smart watches, smart televisions, smart wearables, smart appliances, smart healthcare devices, smart robots, smart belts and anything else that has a sensor, a chip and is connected to the internet will be on display. I wonder if terms like smart aleck and smarty pants might soon be in vogue. While the Hover skateboard originally slated for 2015 is still in the works, there is a massive amount of info related to Things and how they are going to change society, change how we live and change us, as people. Business Insider has a fascinating slide deck showing the most important ways the Internet of Everything market will develop, the benefits newly connected devices will offer consumers and businesses, and the potential barriers that could inhibit growth. IoT will be the largest device market, by far, and will soon be larger than the PC, tablet, and smartphone markets combined. The software to run IoT along with systems to make sense of all that data will be huge. Areas like enhanced customer service and improved use of field assets have already been realized by early adaptors. Moving forward, new business models will blossom and services will become more important than simple products. How they all work together will be key. IoT is not without it's challenges. Threats to data security, physical security, the security of devices, regulations, privacy, encryption, authentication and a host of other issues all need to be addressed before this can really take off. Anyone remember the Cloud a couple years ago? Themes are the same. While consumer devices seem to be the focus today, businesses will benefit with greater operational efficiency along with helping them manage plants, property and equipment. Trend Micro also has a good IoE 101 article with 5 easy steps to explain IoT and IoE to folks. Over on LinkedIn, Jeremy Geelan has put together a great list of the many various, although not exhaustive, IoT events for 2015. He's revised it once already and just might again as more arrive. Over on Computer Business Review, they have their Top 6 Wearable Predictions for 2015 and Gartner is predicting that by 2017, 30% of the wearables will be invisible to the human eye. No matter what, all these things will need a robust, scalable and intelligent infrastructure to handle the massive traffic growth. If you thought our mobile phones & tablets generated a lot of traffic, our Things will be a multitude of what mobile contributed. Get ready now... ps Related: The Internet of Everything: 2015 Slide Deck Top 6 Wearable Predictions for 2015 The 40 Most Important Internet of Things Events in 2015 How Smart, Connected Products Are Transforming Competition IoE 101: How to Explain All Things Smart, Wearable, and IoE A Third Of Wearables To Become Invisible by 2017 Is IoT Hype For Real? Internet of Things OWASP Top 10 The Top 10, Top 10 Predictions for 2015 CloudExpo 2014: The DNS of Things Technorati Tags: 2015,iot,things,sensors,ces,f5,infrastructure,security,silva,wearables Connect with Peter: Connect with F5:398Views0likes0CommentsThe Top 10, Top 10 Predictions for 2015
The time of year that crystal balls get a viewing and many pundits put out their annual predictions for the coming year. Rather than thinking up my own, I figured I’d regurgitate what many others are expecting to happen. IDC Reveals Worldwide Internet of Things Predictions for 2015 - So 2014, according to last year's proclamations, was the break out year for the Internet of Things (Iot) and it didn't disappoint. IoT is everywhere and IDC offers their take for 2015. Cloud, security & network capacity all come into play when wearables, embedded systems and smart cities overrun our society. Gartner Identifies the Top 10 Strategic Technology Trends for 2015 - Gartner announced their technology trends that will be strategic for most organizations in October with IoT, Everywhere Computing and 3D Printing topping the list. They also include the rise of Smart Machines, Software defined systems and the recognition that it is not possible to provide a 100 percent secured environment. Once organizations acknowledge that, they can begin to apply more-sophisticated risk assessment and mitigation tools. Seven Cloud Security Predictions for 2015 - OK, not 10 but 7 interesting cloud security predictions from Perspecsys. With more breaches and surveillance it is important to secure sensitive data while maintaining application functionality. True that. They talk about how Private Clouds will continue growth, the rise of Intellectual data in the cloud, mobile-first development, breach insurance and how the cloud is redrawing the IT security line. More Cloud Data Breaches ‘Inevitable’ in 2015, Forrester Says - Robert Graham reviews Forrester's Predictions 2015: The Days of Fighting the Cloud are Over which talks about how cloud breaches are inevitable but it will probably happen through some typical business process or lack of training rather than a direct cloud hit. Forrester also says that Docker containers will become a slam dunk, that there will be a surge in industry-specific, software-as-a-service product (IoT?) and Software-as-a-service vendors will creep toward hybrid rollouts. Top 10 Tech Predictions for 2015 - Over on LinkedIn Dr. Hossein Eslambolchi, Chairman and CEO at CyberFlow Analytic, offers his 2015 take. He notes that that Applications must be the center (of the universe), that Data Intensive Applications Will Rule Wireless IP and that Cloud Computing Will Plateau among his futures. Security Predictions for 2015 and Beyond - Trend Micro has their annual report out called The Invisible Become Visible on how more cybercriminals with use darknets to share attack tools, stage attacks and sell the ill-gotten gains.We'll be sharing more data, our passwords will still be a target and an exploit kit specifically targeting Android will appear. Top cybersecurity predictions of 2015 - ZDNet offers a slideshow (with text) with their perception. While our healthcare info is always at risk, there will be new players and vulnerabilities geared toward stealing that plus a whole lotta other stuff since Information is a digital goldmine. Also, as more IoT devices connect, there will be attacks targeting your thermostat, car or coffee machine. I called it over a year ago but there you have it. IDC: Top 10 Technology Predictions For 2015 - Yea, I had IDC at the top for IoT but this is their overall report. Forbes goes over this report where new technologies (cloud, mobile, big data, and the Internet of Things — and an exploding number of solutions built on them) will see 100% growth. Worldwide IT and telecommunications spending will grow 3.8% in 2015 to more than $3.8 trillion. Wireless data will grow, innovative partnerships will form, cloud is the new data center and China will have huge influence. Interesting read here. 2015 Timeline - FutureTimeLine.net has an interesting list of upcoming 2015 events. While technology driven, many look at achievements and plans rather than wishes and guesses. For instance, in 2015 The first solar aircraft to circumnavigate the globe will make an attempt, there will be The first self-regulating artificial heart, that Electric car ownership reaches 1 million worldwide and The New Horizons probe arrives at Pluto. It just woke up from the 9 year trip yesterday! 26 Hilariously Inaccurate Predictions About the Future - And for some fun, nostalgia and history here are some predictions that just never came true. From personal helicopters to rocket belts to homes made of steel, many come with the original story. ps Related The Top 10, Top 10 Predictions for 2014 The Top 10, Top 10 2013 Predictions The Top 10, Top Predictions for 2012 Technorati Tags: 2014,2015,predictions,future,technology,security,cloud,iot,silva,f5 Connect with Peter: Connect with F5:514Views0likes0Comments