”Things” and the applications/services that support them are changing the
way we live. Wearables in the sports and health sectors will grow to nearly
170 million devices by 2017 — an annual growth rate of 41 percent. Specific
to the enterprise, if you thought the Bring Your Own Device (BYOD) craze was
a headache, just wait until button cameras, smart watches, fitness trackers,
and connected glasses are a daily occurrence in the office. Workplace
wearables will be a huge challenge in the coming years as more devices,
clothing and pretty much any ‘thing’ with a chip or sensor become
commonplace in society.
PricewaterhouseCoopers (PwC) in The Wearable Future report found that 77% of
respondents thought that a top benefit of wearable technology is the
potential to make employees more productive and efficient. If the technology
is simple to use and integrates with other... (more)
With 2015 crossing the half way point, let’s take a look at some technology
trends thus far.
Breaches: Well, many databases are half empty due to the continued rash of
intrusions while the crooks are half full with our personal information. Data
breaches are on a record pace this year and according to the Identity Theft
Resource Center (ITRC), there have been 400 data incidents as of June 30,
2015. One more than this time last year. And, 117,576,693 records had been
compromised. ITRC also noted a 85% increase in the number of breaches within
the banking sector. From health care ... (more)
IoT applications will come in all shapes and sizes but no matter the size,
availability is paramount to support both customers and the business. The
most basic high-availability architecture is the typical three-tier design. A
pair of ADCs in the DMZ terminates the connection. They in turn intelligently
distribute the client request to a pool (multiple) of IoT application servers
which then query the database servers for the appropriate content. Each tier
has redundant servers so in the event of a server outage, the others take the
load and the system stays available.
This is a ... (more)
As more applications are needed to run those Things, traditional
infrastructure concerns like scale and reliability will become paramount.
Additional challenges with identity and access, improving the user
experience, and the need for faster provisioning of services could overwhelm
IT departments. A robust, scalable and intelligent infrastructure will be
necessary to handle the massive traffic growth.
IT professionals are tasked with designing and building the infrastructure
that’s ready for the challenges that lie ahead, including IoT. But many of
today’s traditional architectu... (more)
RSA Technology Consultant Josh Waterloo talks about the evolution of
two-factor authentication and how risk based auth is starting to take hold.
He also shows us a demo of the integration between RSA SecurID and BIG-IP APM
to provide risk based, strong authentication for corporate access to
RSA 2015 – The Preview Video RSA2015 – Find F5 F5 @ RSA 2015 F5 YouTube
Channel Technorati Tags: