Welcome!


From the Blogosphere

Cisco has been ridding itself of consumer products for some time, which is why it was surprising to see Cisco at the International Consumer Electronics Show this year. According to CEO John Chambers, however, the new IoE (Internet of Everything) plan at Cisco is set to change the traje...
If you listen to the persistent murmur in the market surrounding the Internet of Things right now, you'd believe that it's all about sensors. Sensors and big data. Sensors that monitor everything from entertainment habits to health status to more mundane environmental data about your h...
I like this word re-imagination from Mary Meeker’s Internet Trends presentation. We are seeing so many aspects of our life being transformed by the internet. Take for example, ordering a cab to go somewhere. Either we phone for a yellow cab here in California or if you are in New York...
Do you avoid stores that have had a credit card breach? You are not alone. About 52% of people avoid merchants who have had a data breach according to a recent Lowcards survey. They surveyed over 400 random consumers to better understand the impact of identity theft on consumer behavi...
If you've had to test one of today's composite applications, you know that "access" has become one of the most daunting barriers to SDLC acceleration. Whether we're talking about access to dev/test environments or access to dependent applications, the ability to pull all the required p...
Much has been published about the Open Compute Project. Initiated by Facebook, it has become an industry effort focused on standardization of many parts and components in the datacenter. Initially focused on racks, power and server design, it has also added storage and now networking t...
Some people are never satisfied. These fearless agents of change are everywhere. They're informed, confident and willing to experiment. They seek out the best business technology solution for the job at hand. They act on instinct. Yes, you could say that they're driven. However, they'...
One of the primary principles of object-oriented programming (OOP) is encapsulation. Encapsulation is the way in which the state of an object is protected from manipulation in a way that is not consistent with the way the variable is intended to be manipulated. The variable (state) is ...
Last week Greg Ferro (@etherealmind) wrote this article about his experience with scripting as a method for network automation, with the ultimate conclusion that scripting does not scale. Early in my career I managed a small network that grew to be a IP over X.25 hub of Europe for a...
Cloud computing has finally come into its own. While we’ve been hearing for 8 years or more that cloud computing would one day take over the enterprise, the fact of the matter is that it’s been slow going. While the spread of cloud computing solutions hasn’t been as rapid as many earl...
It's an application world; a world that is rapidly expanding. With new opportunities and markets arising driven by mobility and the Internet of Things, it is only going to keep expanding as applications are deployed to provision, license, and manage the growing sensors and devices in t...
The challenge in architecting, building, and managing data centers is one of balance. There are forces competing to both push together and pull apart datacenter resources. Finding an equilibrium point that is technological sustainable, operationally viable, and business friendly is cha...
Since the birth of Hadoop in 2005-06, the way we think about storing and processing information has evolved considerably. The term “Big Data” has become synonymous with this evolution. But still, many of our customers continue to ask, “What is Big Data?”, “What are its use cases?”, and...
We often get asked “Should I use GridFS for file storage with MongoDB”. As with most things, the answer is a staunch “it depends”. GridFS looks like a great idea on paper - a virtual filesystem held within MongoDB which allows for larger than 16MB files to be held, synced and replicat...
One of the benefits of SDN is centralized control. That is, there is a single repository containing the known current state of the entire network. It is this centralization that enables intelligent application of new policies to govern and control the network - from new routes to user ...
Accomplish much more, very rapidly, while spending less -- this is the business technology trend that savvy executives everywhere have embraced. Worldwide IT spending will reach a total $3.7 trillion in 2014, that's a 2.1 percent increase from last year, according to the latest global ...
This week in the States, the Nation celebrates it’s Independence and many people will be attending or setting off their own fireworks show. In Hawaii, fireworks are shot off more during New Year’s Eve than on July 4th and there is even Daytime Fireworks now. Cloud computing is explo...
If LinkedIn profiles are any indication, User Experience (frequently shortened to UX) is the new orange. Indeed, across all manners of technology, there is an increasing focus on improving user experience. Driven in part by Apple’s success on the consumer side, it would appear that IT ...
I wrap it up from Velocity Conference 2014. Special thanks to Dawn Parzych, Robert Haynes, Cyrus Rafii and John Giacomoni for joining us on camera along with Robert, Courtney, and Natasha behind the lens. Also learn what the top questions asked this week at F5 booth 800. Reporting from...
Dawn Parzych, F5 Sr. Product Manager, returns to demo BIG-IP’s Image Optimization solution. Web images can consume up to 60% of a site load and BIG-IP can significantly reduce the image file size and deliver those pictures much faster to the viewer.
John Giacomoni, LineRate Founder and Sr Architect, joins us to give the lowdown on F5’s TMOS proxy and LineRate proxy. John does a great job explaining the nuances of each, how they function within architecture and the associated deployments within an organization. Each can be deployed...
North Bridge in partnership with GigaOm Research released their 2014 Future of Cloud Computing – 4th Annual Survey Results. As you examine the 124 slides, one thing is obvious that the greatest growth in cloud computing is coming from Software-as-a-Service (SaaS). Market research like ...
Some people believe good or bad things always happen in threes. I believe you will always be able to find three (and probably more) things that are good or bad and somewhat related, but sometimes I get surprised by the apparent coincidental appearance of several closely related “things...
Robert Haynes, F5 Marketing Services Architect, gives us a preview of the new Acceleration Reference Architecture and shares 3 simple ways you can optimize your application traffic with BIG-IP. Learn more at Synthesis.f5.com
Anyone who has been involved with security knows there is a balance to providing both security and privacy and performance at the same time. Security is often blamed for performance woes, particularly when cryptography is involved. SSL and TLS have long addressed this balance by lev...
First and foremost you can’t have a successful software-defined model if your team still have a hardware-defined mentality. Change is inevitable and whether it's embraced or not it will happen. For experienced CIOs this is not the first time they've experienced this technological and c...
Compute started its major architectural transition several years ago with the introduction of virtualization. If you pay attention to any of the IT noise today, it should be clear that storage and networking are going through their own architectural evolutions as well. But another shif...
72%. That's an estimate of how much of the IT budget is allocated to simply keeping the lights on (a euphemism for everything from actually keeping the lights on to cooling, heating, power, maintenance, upgrades, and day to day operations) in the data center. In a recent Forrester Res...
Ask two politically opposed people in any given country about the causes of the country’s problems, and guess what? Each will give you an answer filtered through their world-view. Through what they know, and what they believe. That is not to say one is right and one is wrong, both simp...
About 8 years ago at my previous employer we started a project related to Autonomic Networking. Autonomic Networking is modeled after Autonomic Computing, an IBM initiative from the early 2000s, targeted at creating self managing computing elements. The network version intends to creat...
Good day everyone! In our recent set of IT camps we talked about Windows 8.1 in the enterprise, one of the topics we discussed was deployment technologies. So I decided to put together a series of screencasts to talk about deploying Windows 8.1. More importantly throughout these scr...
Go ahead. Name a cloud environment that doesn't include load balancing as the key enabler of elastic scalability. I've got coffee... so it's good, take your time... Exactly. Load balancing - whether implemented as traditional high availability pairs or clustering - provides the mean...
Internet usage is evolving, and so are the application scenarios for business technology. In the foreseeable future, desktop personal computers will produce a much smaller share of commercial internet protocol (IP) traffic. Mobile and portable devices -- other than PCs -- will drive th...
Application Performance Management (APM) has been bred with all the right elements to give us the insights we need to see the health of our applications. Similar to your most trusted watch dog, it alerts us to anomalies when events occur, providing awareness to the environment that onl...
In December 2012, research firm Coleman Parkes released a landmark study about the business benefits of service virtualization. The findings were significant: 60% of the respondents indicated that unavailability of systems for testing routinely caused software projects to be delivered ...
It’s no secret that doing nothing is often considered a safe bet. The psychology behind inaction is well understood, particularly in the case of IT — the path of least disruption is usually maintaining the status quo rather than trying something new, But once in a while, a decision ...
A company's managers have to be aware of what hardware and software is on hand, where it is situated, know its quantity, and what is necessary to increase the employees' effectiveness and the whole network's stability. If the managers or system administrators do not have such informati...
A while ago I wrote a few articles describing the various tunnel protocols used for network virtualization between vSwitches on servers, and between vSwitches and physical network gateways. These are the mechanisms that construct overlay networks on top of a physical network. VMWare us...
In February 2011, Vivek Kundra announced the “Cloud First” policy across the US Government. The directive, issued through the Office of Management and Budget, required agencies to give cloud technology first priority in developing IT projects. He also described cloud computing as a “10...
It's probably no surprise that I have long advocated the position that hybrid cloud would eventually become "the standard" architecture with respect to, well, cloud computing. As the dev/ops crowd at Glue Con was recently reminded by the self-styled "most obnoxious man in cloud", Josh ...