2020 seems to be an important milestone for the Internet of Things. That’s
the year that Cisco says there will be 50 billion connected devices and also
the year Gartner notes that over 50% of major new business processes and
systems will incorporate some element of the Internet of Things.
That’s the good news.
A recent Symantec Internet Security Threat Report says there are 25 connected
devices per 100 inhabitants in the US. Minimum 25 entry points to your
personal information, not counting your front door, personal computers,
compromised ATMs and other data sources. As your connected devices grow, so
will your exposure. And with no clear methods of identifying and
authenticating connected devices, enterprises will have a challenging time
getting a handle on how many employee shirts, shoes, fitness trackers, and
smartwatches are connected to the corporate network. ... (more)
A few years ago, those little iHome alarm clocks started to appear in hotel
rooms. Cool gadgets that you could mount your mobile phone to battery charge
or play the music on the device. We also had a few in our home. They worked
perfectly for the iPhone 4 since the connector was that 1 inch protruding
plug. When I got the iPhone6, those clocks instantly became useless.
Obsolete. At least the phone connector part lost its value.
I’ve been thinking about this for a while.
The rate of obsolescence. The state when an object, technology, service or
practice is no longer needed or wan... (more)
With 2016 crossing the half way point, let’s take a look at some technology
trends thus far.
Breaches: Well, many databases are half empty due to the continued rash of
intrusions while the crooks are half full with our personal information.
According to the Identity Theft Resource Center (ITRC), there have been 522
breaches thus far in 2016 exposing almost 13,000,000 records. Many are health
care providers as our medical information is becoming the gold mine of stolen
info. Not really surprising since the health care wearable market is set to
explode in the coming years. Many of... (more)
Fun and a little mental.
If you’ve been following along the DevCentral team’s journey toward F5
Certification, then you may be aware that we were in Chicago last week for
F5’s Agility 2016 conference and took our 101 Application Delivery
Fundamentals exam. I am happy to report that all of us, Jason, John, Chase
and I, passed our exams. I gotta tell you, it’s a relief since I didn’t
want to title this article, ‘Two Out of Three Ain’t Bad.’ Good song but
wanted to avoid that.
We started this excursion back in April (me in March) with the team deciding
to create a study group. Eac... (more)
Whether intentional or accidental, data leaks are a huge concern for
organizations. And it has been for years. Going back to a 2004 survey from an
IT security forum hosted by Qualys, found that 67% of security executives do
not have controls in place to prevent data leakage, A December 2006 survey,
Boston-based researchers Simon Management Group noted that some 78% of
respondents said they were "very concerned" about data exposure. A 2010
article published by Trustwave on CSOonline.com said that 65% of leakage
occurs due to the following combined methods: Microsoft SMB sharing, R... (more)