Psilva's Prophecies

Peter Silva

Subscribe to Peter Silva: eMailAlertsEmail Alerts
Get Peter Silva: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Latest Articles from Peter Silva
With 2017 crossing the half way point, let’s look at some technology trends thus far. Breaches: Many personal records are half empty due to the continued rash of intrusions while the crooks are half full of our personal information along with some ransom payments. According to the Iden...
Today let’s look at how to create and deploy an auto-scaled BIG-IP Virtual Edition Web Application Firewall by using a Cloud Formation Template (CFT) in AWS. CFTs are simply a quick way to spin up solutions that otherwise, you may have to create manually. The idea behind this CFT is it...
#DCCloud17 The term ‘Cloud’ as in Cloud Computing has been around for a while and this month we're focusing on F5 Cloud Deployments
Application Delivery got its start in the form of network-based load balancing hardware. It is the essential foundation on which Application Delivery Controllers (ADCs) operate. The second iteration of purpose-built load balancing (following application-based proprietary systems) mater...
The mad dash to connect virtually every noun to the internet or The Internet of Things, is creating a massive M2M network for all the devices, systems, sensors and actuators to connect & communicate on the Internet. With that, they need a communications protocol to understand each othe...
The term ‘Proxy’ is a contraction that comes from the middle English word procuracy, a legal term meaning to act on behalf of another. You may have heard of a proxy vote. Where you submit your choice and someone else votes the ballot on your behalf. In networking and web traffic, a pro...
Whenever you connect anything to the internet, there is risk involved. Just ask the millions of IoT zombies infected with Mirai. Sure, there have been various stories over the years about hacking thermostats, refrigerators, cameras, pacemakers, insulin pumps and other medical devices a...
Imagine how difficult it would be to use the Internet if you had to remember dozens of number combinations to do anything. The Domain Name System (DNS) was created in 1983 to enable humans to easily identify all the computers, services, and resources connected to the Internet by name—i...
The time of year when crystal balls get a viewing and many pundits put out their annual predictions for the coming year. Rather than thinking up my own, I figured I’d regurgitate what many others are expecting to happen. 8 Predictions About How the Security Industry Will Fare in 2017 –...
IT organizations have a simple goal: make it easy for workers to access all their work applications from any device. But that simple goal becomes complicated when new apps and old, legacy applications do not authenticate in the same way. In this Lightboard Lesson, I draw out how VMware...
Phishing has been around since the dawn of the internet. The term was first used in an AOL Usenet group back in 1996 but it wasn’t until 2003 when many baited hooks and lures started dropping. Popular transaction destinations like PayPal and eBay were some of the early victims of these...
With 2016 crossing the half way point, let’s take a look at some technology trends thus far. Breaches: Well, many databases are half empty due to the continued rash of intrusions while the crooks are half full with our personal information. According to the Identity Theft Resource C...
The digital society has emerged. Today’s always-connected world and the applications we interact with are changing the way we live. People are mobile, our devices are mobile, and by all accounts, everything that is a noun – a person, place or thing – will soon be connected and generati...
Yann Desmarest is the Innovation Center Manager at e-Xpert Solutions SA and one of DevCentral’s top contributors. e-Xpert Solutions SA is a F5 Gold Partner, Unity Partner Support and a Guardian Partner. Yann has been a BIG-IP administrator for 6 years and enjoys basketball, table tenni...
I often write about the Internet of Things, or the soon-to-be-cliché IoT. You know, the smart-fridges, smart-cars, smart-thermostats, healthcare devices, wearables and any of those connected devices that have a sensor, gathers data and reports back to some entity. You are able to contr...
Shot this late last year for Information Security Buzz. What are five information security new year’s resolutions for improving cyber security in 2016 and why?
Have you sent Santa your list of all the wearables you’ll want under the tree this year? Maybe you’ve asked for a fitness tracker, a health monitor or that fancy new smart watch. But don’t stop there! As we continue to integrate technology with our desire for self-improvement and li...
F5 and Nutanix partner to bring the power of invisible infrastructure and software-defined application servers to critical enterprise application. Joint customers benefit from improved availability, scalability, performance, and security enabled through orchestration, management, and a...
IoT applications will come in all shapes and sizes but no matter the size, availability is paramount to support both customers and the business. The most basic high-availability architecture is the typical three-tier design. A pair of ADCs in the DMZ terminates the connection. They in ...
John McAdam, F5 President & CEO talks about what the mobile revolution means to F5. John discusses how mobile technology is driving innovation, why the need for intelligent application traffic management is critical, how F5 is in the sweet spot for the explosion of mobile data traffic ...
From Baby Boomers to Gen X, Y, & Z, there are certain characteristics that define, at least according to demographers and historians, each generation. Generation X, specifically, might also remember a Rush song called The Analog Kid. While not as frequently played as Tom Sawyer or ...
It’s that time of year when we gift and re-gift, just like this text from last year. And the perfect opportunity to re-post, re-purpose and re-use all my 2014 blog entries. If you missed any of the 96 attempts including 57 videos, here they are wrapped in one simple entry. I read somew...
(Originally posted December 07, 2009) In honor of Pearl Harbor day, I want to share a bit of history you might not know about.  This has nothing to do with technology, security or our awesome BIG-IP solutions but felt compelled to honor both my grandparents and service men/women e...
The Important Things Lately I’ve been writing a bunch about the Internet of Things or IoT. You know, where everyday objects have software, chips, and sensors to capture data and report back. Household items like refrigerators, toilets and thermostats along with clothing, cars and...
Yet another retailer has confessed that their systems were breached and an untold number of victims join the growing list of those who have had their data was stolen. This one could be bigger than the infamous Target breach. I wonder if some day we’ll be referring to periods of time by...
…Oh Wait, Let Me Check the Stat-Cloud First! It is like a SAT question: Cincinnati Reds Billy Hamilton has a 10.83 foot lead off first base, can hit a top speed of 21.51 mph and clocked a jump of 0.49 seconds. If the Milwaukee Brewers catcher took 0.667 seconds to to get the ball...
For those of you who like to post food pictures, this is something I can see being a benefit. Smart Chopsticks! Yup, you heard that right. Soon you’ll be able to poke that dim sum and know if the food is tainted. Baidu, China’s internet giant, unveiled them at their annual ...
It is only fitting that the 20th anniversary of the Gartner Hype Cycle has the Internet of Things right at the top of the coaster. IoT is currently at the peak of Inflated Expectations. The Gartner Hype Cycle give organizations an assessment of the maturity, business benefit and future...
The Open Web Application Security Project (OWASP) is focused on improving the security of software. Their mission is to make software security visible, so that individuals and organizations worldwide can make informed decisions about true software security risks and their OWASP Top 10 ...
Did you see what the NFL is doing this year with sensors? Earlier this month they announced a partnership with Zebra Technologies, a company that provides RFID chips for applications from ‘automotive assembly lines to dairy cows’ milk production.’ This season there will be sensors in t...
Achieving the ultimate ‘Five Nines’ of web site availability (around 5 minutes of downtime a year) has been a goal of many organizations since the beginning of the internet era. There are several ways to accomplish this but essentially a few principles apply. Web applications come in ...
I wrap it up from Velocity Conference 2014. Special thanks to Dawn Parzych, Robert Haynes, Cyrus Rafii and John Giacomoni for joining us on camera along with Robert, Courtney, and Natasha behind the lens. Also learn what the top questions asked this week at F5 booth 800. Reporting from...
Dawn Parzych, F5 Sr. Product Manager, returns to demo BIG-IP’s Image Optimization solution. Web images can consume up to 60% of a site load and BIG-IP can significantly reduce the image file size and deliver those pictures much faster to the viewer.   ps Related Velocity 2014 R...
John Giacomoni, LineRate Founder and Sr Architect, joins us to give the lowdown on F5’s TMOS proxy and LineRate proxy. John does a great job explaining the nuances of each, how they function within architecture and the associated deployments within an organization. Each can be deployed...
Synthesis in the Wild! Tim Wagner, Manager, Field Systems Engineering, shows how he whiteboards the F5 Synthesis story to help organizations understand the value of SDAS – Software Defined Application Services. He discusses SDN and how that works within a Layer 2/3 environment and the ...
Imagine how much you’d use the internet if you had to remember dozens of number combinations to do anything. DNS is arguably the primary technology enabling the Internet – translating the domain names people type into a browser into an IP address so the requested service can be found ...
I sit down with F5 Solution Architect Paul Pindell to get an inside look at BIG-IP’s native support for VMware’s PCoIP protocol. He reviews the architecture, business value and gives a great demo on how to configure BIG-IP. BIG-IP APM offers full proxy support for PC-over-IP (PCoIP...
I wrap up Oracle OpenWorld from San Francisco. Special thanks to you, the viewers, along with F5ers Ron Carovano, Chris Akker, Dennis Zhou, Dawn Parzych, Jonathan George, Robert Rexford and the entire booth staff including Sphero. And a very special Mahalo to The Mahea, F5′s youngest T...
Peter Silva interviews F5 Product Manager, Dawn Parzych, to learn more about F5′s Optimization Solutions for Oracle GoldenGate replication software and how BIG-IP WOM can greatly reduce bandwidth and significantly improve throughput performance by 30-50%.
I, along with the future host of the Aloha series – very special guest star Mahealani – welcomes viewers to OOW2012 and helps you find F5 booth 1527. Making her Aloha debut, Mahea steals the show while showing how easy it is to find F5.