The mad dash to connect virtually every noun to the internet or the Internet
of Things is creating a massive M2M network for all the devices, systems,
sensors and actuators to connect & communicate on the Internet.
With that, they need a communications protocol to understand each other. One
of those is Message Queue Telemetry Transport (MQTT). MQTT is a “subscribe
and publish” messaging protocol designed for lightweight machine-to-machine
(or IoT) communications.
In this episode of Lightboard Lessons, I light up how MQTT works.
IoT Ready Infrastructure IoT Effect on Applications IoT Influence on Society
What are These "Things? The Intruders of Things
Internet of @ThingsExpo, taking place June 6-8, 2017 at Javits Center, New
York City, is co-located with 20th International @CloudExpo and will feature
technical sessions from a rock star conference facult... (more)
What is VDI?
Imagine not having to carry around a laptop or be sitting in a cubicle to
access your work desktop applications. Virtual desktop infrastructure (VDI)
is appealing to many different constituencies because it combines the
benefits of anywhere access with desktop support improvements.
Employees typically use a wide range of mobile devices from laptops to
tablets and from desktops to smartphones are being used. The diversity of
these mobile devices and the sheer number of them in the workplace can
overwhelm IT and strain your resources.
Desktop Virtualization centralize... (more)
High Availability of applications is critical to an organization’s
On BIG-IP, HA Groups is a feature that allows BIG-IP to fail over
automatically based not on the health of the BIG-IP system itself but rather
on the health of external resources within a traffic group. These external
resources include the health and availability of pool members, trunk links,
VIPRION cluster members or a combination of all three. This is the only cause
of failover that is triggered based on resources outside of the BIG-IP.
An HA group is a configuration object you create and assign to a ... (more)
The term ‘Proxy’ is a contraction that comes from the middle English word
procuracy, a legal term meaning to act on behalf of another. You may have
heard of a proxy vote. Where you submit your choice and someone else votes
the ballot on your behalf.
In networking and web traffic, a proxy is a device or server that acts on
behalf of other devices. It sits between two entities and performs a service.
Proxies are hardware or software solutions that sit between the client and
the server and does something to requests and sometimes responses.
The first kind of proxy we’ll discuss is ... (more)
Security Trends in 2016: Securing the Internet of Things
Whenever you connect anything to the internet, there is risk involved. Just
ask the millions of IoT zombies infected with Mirai. Sure, there have been
various stories over the years about hacking thermostats, refrigerators,
cameras, pacemakers, insulin pumps and other medical devices along with cars,
homes and hotel rooms…but Mirai took it to a new level.
And it’s not the only IoT botnet out there nor are these nasty botnets
going away anytime soon. There’s a gold mine of unprotected devices out
there waiting to either ha... (more)