Subscribe: Latest News from SYS-CON MEDIA
http://www.sys-con.com/index.rss
Added By: Feedage Forager Feedage Grade A rated
Language: English
Tags:
big asm  big  cloud month  cloud  create  devops  kevin  lightboard lessons  lightboard  month  new  read  security  week   
Rate this Feed
Rate this feedRate this feedRate this feedRate this feedRate this feed
Rate this feed 1 starRate this feed 2 starRate this feed 3 starRate this feed 4 starRate this feed 5 star

Comments (0)

Feed Details and Statistics Feed Statistics
Preview: Latest News from SYS-CON MEDIA

Latest News from SYS-CON MEDIA



Latest News from SYS-CON MEDIA



Last Build Date: Mon, 18 Dec 2017 17:44:35 EST

Copyright: Copyright 2017 Ulitzer.com
 



Developing Mobile Apps for iOS and Android | @CloudExpo #API #Cloud #Mobility

Mon, 18 Dec 2017 12:00:00 EST

Developing mobile apps has never been an easy task. Creating a mobile app for iOS means owning strong programming skills about Objective-C or Swift and knowing their APIs. Android-based apps are not so different: you have to know Java and the Android Platform and its API. The learning curve is not fast and it includes how to create nice and interactive user interfaces, connecting embedded features like GPS, camera, showing maps, images and so forth.

read more




[video] Accelerate the Development Process with @Opsani_ | @DevOpsSummit #CD #DevOps #Containers

Mon, 18 Dec 2017 11:45:00 EST

"Opsani helps the enterprise adopt containers, help them move their infrastructure into this modern world of DevOps, accelerate the delivery of new features into production, and really get them going on the container path," explained Ross Schibler, CEO of Opsani, and Peter Nickolov, CTO of Opsani, in this SYS-CON.tv interview at DevOps Summit at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.

read more




[slides] Kubernetes for Enterprise Teams | @DevOpsSummit @NirmataCloud #DevOps #Serverless

Mon, 18 Dec 2017 11:30:00 EST

Enterprises are adopting Kubernetes to accelerate the development and the delivery of cloud-native applications. However, sharing a Kubernetes cluster between members of the same team can be challenging. And, sharing clusters across multiple teams is even harder. Kubernetes offers several constructs to help implement segmentation and isolation. However, these primitives can be complex to understand and apply. As a result, it’s becoming common for enterprises to end up with several clusters. This leads to a waste of cloud resources and increased operational overhead.

read more




The Top 21 Cloud Monitoring Tools for 2018 | @CloudExpo #Cloud #APM #Monitoring

Mon, 18 Dec 2017 09:45:00 EST

Let's do a visualization exercise. Imagine it's December 31, 2018, and you're ringing in the New Year with your friends and family. You think back on everything that you accomplished in the last year: your company's revenue is through the roof thanks to the success of your product, and you were promoted to Lead Developer. 2019 is poised to be an even bigger year for your company because you have the tools and insight to scale as quickly as demand requires. You're a happy human, and it's not just because of the bubbly in your glass. Now how does one turn this visualization into reality? You start by setting yourself up with the right technology to succeed. Behind every great cloud app is a fleet of powerful cloud monitoring tools that provide insight and direction for improving your product. This is the ticket for turning 2018 into the year of your dreams.

read more




F5 Certified Practice Exams

Tue, 12 Dec 2017 08:00:00 EST

Thinking of taking the F5 Certified 101 or 201 exams but not sure if you are ready? Ease the anxiety by taking a F5 Practice Exam! That’s what I did, and it sure helped. If you remember, back in August I attempted the 201-TMOS Administrator exam and successfully failed, missing by a few questions. I’ve […](image)

read more




DevCentral’s Featured Member for December – Kevin Davies

Fri, 01 Dec 2017 08:00:00 EST

When we prepare for our Featured Member series, I typically send out a questionnaire and the DevCentral member writes out their answers. With the opening question I’ll do a bit of editing and use that for the intro. This month however, airloom’s Kevin Davies did such a great job with the opening, I decided to […](image)

read more




Announcing 2018 Agenda | @CloudExpo @ExpoDX #IoT #AI #DevOps #SmartCities #DigitalTransformation

Thu, 30 Nov 2017 18:00:00 EST

Cloud Expo | DXWorld Expo have announced the conference tracks for Cloud Expo 2018. Cloud Expo will be held June 5-7, 2018, at the Javits Center in New York City, and November 6-8, 2018, at the Santa Clara Convention Center, Santa Clara, CA. Digital Transformation (DX) is a major focus with the introduction of DX Expo within the program. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive over the long term. A total of 88% of Fortune 500 companies from a generation ago are now out of business. Only 12% still survive. Similar percentages are found throughout enterprises of all sizes.

read more




The OWASP Top 10 – 2017 vs. BIG-IP ASM

Wed, 29 Nov 2017 08:00:00 EST

With the release of the new 2017 Edition of the OWASP Top 10, we wanted to give a quick rundown of how BIG-IP ASM can mitigate these vulnerabilities. First, here’s how the 2013 edition compares to 2017. And how BIG-IP ASM mitigates the vulnerabilities. Vulnerability BIG-IP ASM Controls A1 Injection Flaws Attack signatures Meta character […](image)

read more




Mitigate L7 DDoS with BIG-IP ASM

Tue, 28 Nov 2017 08:00:00 EST

Today, let’s look at a couple ways to mitigate an application DDoS attack with BIG-IP ASM. We’ve logged into a BIG-IP ASM and navigated to Security>DDoS Protection>DDoS Profiles. In the General Settings of Application Security, we’ll activate an application DoS iRule event. We’ll click TPS-based Detection to see the temporarily lowered TPS thresholds to easily simulate […](image)

read more




The Endpoint Imperative: The Perimeter is Dead; Long Live the Perimeter!

Sat, 14 Oct 2017 12:36:44 EDT

Cloud, mobility and the Internet of Things have obliterated the traditional perimeter that protected organizations. The result: Higher productivity, but bigger challenges for security, data protection, and mobile device management.This episode of the “The Endpoint Imperative” podcast series from Intel, Kevin L. Jackson and Intel’s Yasser Rasheed explore the new normal for security, with a focus on the end users.Kevin: The topic for this episode is,"The Perimeter is Dead, Long Live the Perimeter". With me is Yasser Rasheed Director of Business Client Security with Intel. Yasser welcome back.Yasser: Hi Kevin, happy to be back.Kevin: This time, however, I'd like to really talk to you about this security perimeter thing. Cloud mobility and the internet things have really obliterated what I've always referred to as the wall and moat security paradigm, where working inside the enterprise was safe but working outside of the company's walls wasn't. What's pending impact of this evolution?Yasser: You know Kevin nowadays with the cloud and mobility trends, we as end users we take our devices and work anywhere and everywhere at anytime. We take our laptops and work from home or from a coffee shop or on the go during the trip. The new shift here is really making us re-think how we protect the information that we have access to. The concept or the traditional concept of protecting at the perimeter with the traditional firewalls and gateways is really non-existent anymore. When I'm using my laptop at a coffee shop, I am no longer going through a firewall to access a cloud service. It's imperative for the industry to re-think the concept of listening at the perimeter level from a security perspective.Kevin: Did the IT team miss the boat with getting a grip on the management of security within this new business ecosystem of today?Yasser: From my perspective, it's not about missing the boat as much as the industry is moving and evolving very fast and IT organizations, more specifically information security organizations, need to cope with this evolution, and in certain cases may need to be ahead of it. At the same time, by the same token, that evolution is giving an advantage to the hacker community, to the bad guys really, to take advantage of the shift and attack the endpoints. Attack the end users, grab the data, steal the data or lock it in and ask for ransom.Kevin: These new approaches to information technology have really changed the traditional workplace. Yasser how are IT leaders balancing the benefits of cloud and mobility, things like productivity and accessibility, with the obvious security challenges? frameborder="no" height="300" scrolling="no" src="https://w.soundcloud.com/player/?url=https%3A//api.soundcloud.com/tracks/353867429&color=%23ff5500&auto_play=true&hide_related=false&show_comments=true&show_user=true&show_reposts=false&show_teaser=true&visual=true" width="100%"> Yasser: Great question Kevin. We know that end users especially the new generations of end users focus tremendously on the ease of use and the productivity, and don't want to be burdened with additional security processes that they don't really comprehend. It's imperative for the IT leaders and information security leaders to balance end-user productivity, the simplicity of integration for IT and the productivity end-user experience for end users. The only way for the industry to evolve and achieve the right level of protection is with the right balance. This is not an easy job to do, however, it's the only way for the industry to keep moving in this direction.Kevin: Do you have any advice on how to make security everybody's job in this new normal?Yasser: Great question. The first thing I advise everyone is for the leaders in the IT and information security industry to educat[...]



Legacy Application SSO with BIG-IP and Okta

Tue, 10 Oct 2017 08:00:00 EDT

IT organizations have a simple goal: make it easy for workers to access all their work applications from any device. But that simple goal becomes complicated when new apps and old, legacy applications do not authenticate in the same way. Today we’ll take you through BIG-IP APM’s integration with Okta, a cloud-based identity-as-a-service provider. The […](image)

read more




Lightboard Lessons: Connecting Cars with BIG-IP

Wed, 04 Oct 2017 08:00:00 EDT

I light up how BIG-IP and Solace work together in a MQTT connected car infrastructure. ps Related: Using F5 BIG-IP and Solace Open Data Movement technology for MQTT message routing and delivery Lightboard Lessons: What is MQTT? Advertisements(image)

read more




DevCentral’s Featured Member for October – Jad Tabbara

Tue, 03 Oct 2017 08:00:00 EDT

Jad Tabbara has been a Security Engineer with e-Xpert Solutions in Switzerland since 2014. He graduated from INSA de Lyon FRANCE with a master degree in telecommunications and nowadays, work takes the most part of my time, but happy to succeed in his endeavors. As hobbies, he enjoys playing sports (soccer, tennis), traveling, sharing time […](image)

read more




Add a Data Collection Device to your BIG-IQ Cluster

Tue, 26 Sep 2017 08:00:00 EDT

Gathering and analyzing data helps organizations make intelligent decisions about their IT infrastructure. You may need a data collection device (DCD) to collect BIG-IP data so you can manage that device with BIG-IQ. BIG-IQ is a platform that manages your devices and the services they deliver. Let’s look at how to discover and add a […](image)

read more




Lightboard Lessons: What is HTTP?

Wed, 20 Sep 2017 08:00:00 EDT

In this Lightboard Lesson, I light up some #basics about HTTP. HTTP defines the structure of messages between web components such as browser or command line clients, servers like Apache or Nginx, and proxies like the BIG-IP. ps Related: What is HTTP? What is HTTP Part II – Underlying Protocols Advertisements(image)

read more




[video] #DevOps Five Years Later at @DevOpsSummit | @AndiMann #AI #DX #Serverless #Monitoring

Fri, 15 Sep 2017 10:00:00 EDT

After more than five years of DevOps, definitions are evolving, boundaries are expanding, ‘unicorns’ are no longer rare, enterprises are on board, and pundits are moving on. Can we now look at an evolution of DevOps? Should we? Is the foundation of DevOps ‘done’, or is there still too much left to do? What is mature, and what is still missing? What does the next 5 years of DevOps look like? In this Power Panel at DevOps Summit, moderated by DevOps Summit Conference Chair Andi Mann, panelists looked back at what DevOps has become, and forward at what it might create next.

read more




[video] @Tintri's Enterprise Cloud | @CloudExpo #IaaS #DevOps #AI #DX #DigitalTransformation

Tue, 12 Sep 2017 20:00:00 EDT

"Tintri focuses on the Ops side of the DevOps, which basically is pushing more and more of the accessibility of the infrastructure to the developers and trying to get behind the scenes," explained Dhiraj Sehgal of Tintri in this SYS-CON.tv interview at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.

read more




Automatically Update your BIG-IP Pool Using the Service Discovery iApp

Tue, 12 Sep 2017 08:00:00 EDT

Let’s look at how to automatically add members to your BIG-IP pool by using the Service Discovery iApp. Whenever you deploy a BIG-IP Virtual Edition by using one of the templates on the F5 Github site, this iApp is installed on the BIG-IP. The idea behind this iApp is you assign a tag to a […](image)

read more




DevCentral’s Featured Member for September – Rob Carr

Tue, 05 Sep 2017 08:00:00 EDT

Rob Carr is a Senior Trainer/Professional Services Consultant with Red Education Pty in Australia, covering the Oceania and Asia markets. He has done training and engagements from New Zealand to Taiwan and points in between. About 60% of his time...(image)

read more




Lightboard Lessons: What is BIG-IQ?

Thu, 31 Aug 2017 08:00:00 EDT

In this Lightboard Lesson, I light up many of the tasks you can do with BIG-IQ, BIG-IQ centralizes management, licensing, monitoring, and analytics for your dispersed BIG-IP infrastructure. If you have more than a few F5 BIG-IP’s within your organization, managing devices as separate entities will become an administrative bottleneck and slow application deployments.  Deploying […](image)

read more




Deploy an Auto-Scaled BIG-IP VE WAF in AWS

Tue, 29 Aug 2017 08:00:00 EDT

Today let’s look at how to create and deploy an auto-scaled BIG-IP Virtual Edition Web Application Firewall by using a Cloud Formation Template (CFT) in AWS. CFTs are simply a quick way to spin up solutions that otherwise, you may have to create manually. The idea behind this CFT is it is going to create […](image)

read more




Lightboard Lessons: BIG-IP ASM Layered Policies

Wed, 23 Aug 2017 08:00:00 EDT

In this Lightboard Lesson, I light up some use cases for BIG-IP ASM Layered Policies available in BIG-IP v13. With Parent and Child policies, you can: Impose mandatory policy elements on multiple policies; Create multiple policies with baseline protection settings; and Rapidly push changes to multiple policies. ps(image)

read more




I’ve Successfully Failed the F5 Certification 201-TMOS Administration Exam

Tue, 15 Aug 2017 08:00:00 EDT

Yup, you read that right. I did not pass the F5 Certified BIG-IP Administrator test I took while at F5 Agility 2017. And I’m not ashamed since it was a challenging test and I will be trying again. Sure, I went through Eric Mitchell’s (F5er) comprehensive 201 Certification Study Guide along with the TMOS Administration […](image)

read more




API Security - vendors look to develop NG-WAFs

Wed, 09 Aug 2017 07:59:00 EDT

API security is now a central concern for Web Application Firewalls (WAF).  For over a decade, WAFs have been  a necessary component of most web-based applications deployments. WAFs typically

read more




API Security - SD Times Review of OWASP Top 10 - RC1

Tue, 08 Aug 2017 16:40:00 EDT

API Security has finally made it into mainstream security consciousness. The premiere web application security OWASP Top 10 Threats has published its Release Candidate 1 (RC 1). SD Times provided a comprehensive overview on the implications of including

read more




Create a BIG-IP HA Pair in Azure

Tue, 08 Aug 2017 08:00:00 EDT

Use an Azure ARM template to create a high availability (active-standby) pair of BIG-IP Virtual Edition instances in Microsoft Azure. When one BIG-IP VE goes standby, the other becomes active, the virtual server address is reassigned from one external NIC to another. Today, let’s walk through how to create a high availability pair of BIG-IP […](image)

read more




DevCentral’s Featured Member for August – Piotr Lewandowski

Tue, 01 Aug 2017 08:00:00 EDT

Piotr Lewandowski has been working in IT for well over 20 years – and not really conscious decision to go this way – just blind luck. He started in the era without Internet…yes, not so long ago it was possible to live without Internet J…and IBM PC/XT computers. Thanks to self-learning he managed to work […](image)

read more




Lightboard Lessons: What is BIG-IP APM?

Wed, 26 Jul 2017 08:00:00 EDT

In this Lightboard, I light up some lessons on BIG-IP Access Policy Manager. BIG-IP APM provides granular access controls to discreet applications and networks supporting 2FA and federated identity management. You can also check out Chase’s written article What is BIG-IP APM? ps(image)

read more




Lightboard Lessons: Attack Mitigation with F5 Silverline

Wed, 19 Jul 2017 08:00:00 EDT

In this Lightboard Lesson, I describe how F5 Silverline Cloud-based Platform can help mitigate DDoS and other application attacks both on-prem and in the cloud with the Hybrid Signaling iApp. Learn how both on-premises and the cloud can work together to create a composite defense against attacks. ps(image)

read more




Ubersmith Announces New Release of its Subscription Business Management Software Suite

Wed, 12 Jul 2017 16:39:57 EDT

Ubersmith’s software suite for subscription-based businesses – especially cloud providers – adds features, enhances support for use on smartphones and tablets and now runs within Docker containers.

read more




BIG-IP VE on Google Cloud Platform

Tue, 11 Jul 2017 08:00:00 EDT

Hot off Cloud Month, let’s look at how to deploy BIG-IP Virtual Edition on the Google Cloud Platform. This is a simple single-NIC, single IP deployment, which means that both management traffic and data traffic are going through the same NIC and are accessible with the same IP address. Before you can create this deployment, […](image)

read more




DevCentral’s Featured Member for July – Vosko Networking’s Niels van Sluis

Wed, 05 Jul 2017 08:00:00 EDT

For almost two years Niels van Sluis has worked as a Security Engineer for Vosko Networking. Vosko’s security team focuses on supporting security solutions from various vendors like F5, Check Point, Cisco and RSA. Niels focuses is on F5 BIG-IP and Check Point. He started his professional career about 20 years ago in the ISP […](image)

read more




DevCentral Cloud Month Wrap

Fri, 30 Jun 2017 07:45:00 EDT

Is it the end of June already? At least it ended on a Friday and we can close out DevCentral’s Cloud Month followed by the weekend! First, huge thanks to our Cloud Month authors: Suzanne, Hitesh, Greg, Marty and Lori. Each delivered an informative series (23 articles in all!) from their area of expertise and […](image)

read more




DevCentral Cloud Month – Week Five

Sun, 25 Jun 2017 08:00:00 EDT

What’s this week about? This is the final week of DevCentral’s Cloud Month so let’s close out strong. Throughout the month Suzanne, Hitesh, Greg, Marty and Lori have taken us on an interesting journey to share their unique cloud expertise. Last week we covered areas like high availability, scalability, responsibility, inter-connectivity and exploring the philosophy […](image)

read more




DevCentral Cloud Month – Week Four

Sun, 18 Jun 2017 09:00:00 EDT

What’s this week about? Ready for another week of Cloud Month on DevCentral? Suzanne, Hitesh, Greg, Marty and Lori are ready! Last week we looked at services, security, automation, migration, Ansible and other areas to focus on once you get your cloud running. We also had a cool Lightboard Lesson explaining BIG-IP in the public […](image)

read more




DevCentral Cloud Month – Week Three

Sun, 11 Jun 2017 16:13:29 EDT

What’s this week about? We hope you’re enjoying DevCentral’s Month thus far and Suzanne, Hitesh, Greg, Marty and Lori ready to go again this week. Last week we got you deployed in AWS and Kubernetes, learned the basics of Azure, got knee-deep in Cloud/Automated architectures and celebrated SOA’s survival. Now that your cloud is installed […](image)

read more




DevCentral Cloud Month – Week Two

Mon, 05 Jun 2017 08:00:00 EDT

What’s this week about? You got a mini taste of DevCentral’s Cloud Month last week and week two we really dig in. This week we’re looking at Build and Deployment considerations for the Cloud.(image)

read more




Cloud Month on F5 DevCentral

Thu, 01 Jun 2017 08:00:00 EDT

#DCCloud17 The term ‘Cloud’ as in Cloud Computing has been around for a while and this month we're focusing on F5 Cloud Deployments(image)

read more




Device Discovery on BIG-IQ 5.1

Tue, 23 May 2017 08:00:00 EDT

The first step in using a BIG-IQ to manage BIG-IP devices BIG-IQ enables administrators to centrally manage BIG-IP infrastructure across the IT landscape.  BIG-IQ discovers, tracks, manages, and monitors physical and virtual BIG-IP devices – in the cloud, on premise, or co-located at your preferred datacenter. Let’s look at how to get BIG-IQ 5.1 to […](image)

read more