Employee collaboration and access to communication tools are essential for
workplace productivity. Organizations are increasing their use of Microsoft
Office 365, a subscription-based service that provides hosted versions of
familiar Microsoft applications. Most businesses choose Exchange Online as
the first app in Office 365 they adopt.
The challenge with any SaaS application such as Office 365 is that user
authentication is usually handled by the application itself, so user
credentials are typically stored and managed in the cloud by the provider.
The challenge for IT is to properly authenticate the employee (whether
located inside or outside the corporate network) to a highly available
identity provider (such as Active Directory).
Authentication without complexity
Even though Office 365 runs in a Microsoft-hosted cloud environment, user
authentication and autho... (more)
The Digital Dress Code
Coming to an office near you.
If you thought the Bring Your Own Device (BYOD) craze was a headache, just
wait until button cameras, smart watches, and spy glasses (already here) are
a daily occurrence in the office. Workplace #Wearables will be a huge
challenge in the coming years as more devices, clothing and pretty much any
‘thing’ with a chip or sensor become commonplace in our society. The
device explosion with IoT (Internet of Things) will be much larger than any
of these mobile phones we carry around.
A couple new reports examine the impact of IoT on... (more)
With Levi’s Stadium as a backdrop, I share a bit about the Internet of
Things and the strain it will place on the Domain Name System (DNS) along
with a preview of my DNS of Things session at CloudExpo / @ThingsExpo at the
Santa Clara Convention Center. Reporting from Silicon Valley. Check out
F5’s DNS solutions at
Five Key Issues for the DNS of Things @ThingsExpo The Digital Dress Code F5
Solutions – Intelligent DNS Scale My Sensored Family The Internet
of…(Drum Roll Please)…Band-Aids?!? The Breach of Th... (more)
The path to successful application delivery has been a long and winding road
for many companies.
Back in the days of Y2K and the dot-coms, applications were often delivered
out of a physical data center. This usually consisted of a dedicated
raised-floor room at the corporate headquarters or leased colocation space
from one of the web hosting vendors—or both.
Soon, global organizations and ecommerce sites started to distribute their
applications and deploy them at multiple physical data centers to address
geo-location, redundancy, and disaster recovery challenges. This was an
Yet another retailer has confessed that their systems were breached and an
untold number of victims join the growing list of those who have had their
data was stolen. This one could be bigger than the infamous Target breach. I
wonder if some day we’ll be referring to periods of time by the breach that
occurred. ‘What? You don’t remember the Target breach of ’13! Much
smaller than the Insert Company Here Breach of 2019!’ Or almost like
battles of a long war. ‘The Breach of 2013 was a turning point in the fight
against online crime,’ or some other silly notion.
Don't MIss Peter Si... (more)