It is only fitting that the 20th anniversary of the Gartner Hype Cycle has
the Internet of Things right at the top of the coaster.
IoT is currently at the peak of Inflated Expectations. The Gartner Hype Cycle
give organizations an assessment of the maturity, business benefit and future
direction of more than 2,000 technologies.
The theme for this year’s Emerging Technologies Hype Cycle is Digital
As you can see, being at the top really means that there is a ton of media
coverage about the technology, so much so that it starts to get a little
silly. Everyone is talking about it, including this author. What you can also
so is the downward trend to follow. This is the trough of disillusionment.
Gamification, Mobile Health Monitoring and Big Data all fall into this area.
It means that they already hit their big hype point but doesn’t necessarily
mean that it’... (more)
Achieving the ultimate ‘Five Nines’ of web site availability (around 5
minutes of downtime a year) has been a goal of many organizations since the
beginning of the internet era. There are several ways to accomplish this but
essentially a few principles apply.
Eliminate single points of failure by adding redundancy so if one component
fails, the entire system still works. Have reliable crossover to the
duplicate systems so they are ready when needed. And have the ability to
detect failures as they occur so proper action can be taken.
If the first two are in place, hopefully you nev... (more)
The Open Web Application Security Project (OWASP) is focused on improving the
security of software. Their mission is to make software security visible, so
that individuals and organizations worldwide can make informed decisions
about true software security risks and their OWASP Top 10 provides a list of
the 10 Most Critical Security Risks. For each risk it provides a description,
example vulnerabilities, example attacks, guidance on how to avoid and
references to OWASP and other related resources. Many of you are familiar
with their Top 10 Most Critical Web Application Security R... (more)
Dawn Parzych, F5 Sr. Product Manager, talks about the benefits of HTTP 2.0
and shows us a demo of 170+ pictures appearing instantly while using the
BIG-IP HTTP 2.0 profile. Interesting conversation about web pages loads, the
chattiness of the HTTP protocol and the notion of HTTP 2.0 moving forward.
Learn more at: www.f5.com/products/modules/application-acceleration-manager
Velocity 2014 – Find F5 Velocity 2014 – Acceleration Reference
Architecture Velocity 2014 – LineRate Storefront What are you waiting for?
The Image Format Wars F5 YouTube Channel #velocityconf
Do you avoid stores that have had a credit card breach?
You are not alone. About 52% of people avoid merchants who have had a data
breach according to a recent Lowcards survey. They surveyed over 400 random
consumers to better understand the impact of identity theft on consumer
behavior. 17% said they or a family member was a victim of identity theft
over the last year with half the cases being credit card theft. 94% said they
are more concerned or equally concerned about ID theft. They estimate that
there were 13.5 million cases of credit card identity theft in the United