Learn F5 Technologies, Get Answers & Share Community Solutions Join DevCentral

Filter by:
  • Solution
  • Technology

Articles

Sort results

Post of the Week: Explaining the KRACK Vulnerability

The KRACK attack targets a vulnerability in the WPA2 security protocol that allows for encryption between a mobile device and a wireless router. Read more
Average Rating: 4.9
3 Reviews

Lightboard Lessons: Connecting Cars with BIG-IP

I light up how BIG-IP and Solace work together in a MQTT connected car infrastructure. ps Related: Using F5 BIG-IP and Solace Open Data Movement technology for MQTT message routing and delivery Lightboard Lessons: What is MQTT? Read more
0 Reviews

Using F5 BIG-IP and Solace Open Data Movement technology for MQTT message routing and delivery

The "Internet of Things" (IoT) has the potential to not just impact the way we live and work, but to disrupt entire industries. Some of the major industries that are driving innovation in IoT include manufacturing, transportation, and... Read more
1 Review

F5 BIG-IP MQTT protocol support and use cases in an IoT environment

F5 BIG-IP iRules allow deep understanding and decision making within the MQTT protocol. Check out some use cases and more. Read more
Average Rating: 4.9
3 Reviews

What to Expect in 2017: Mobile Device Security

We are mobile, our devices are mobile, the networks we connect to are mobile and the applications we access are mobile. Mobility, in all its iterations, is a huge enabler and concern for enterprises and it'll only get worse as we start wearing... Read more
0 Reviews

Lightboard Lessons: IoT on BIG-IP

As more organizations deploy IoT applications in their data centers and clouds, they're going to need their ADC to understand the unique protocols these devices use to communicate. In this Lightboard Lesson, I light up how IoT protocol MQTT... Read more
0 Reviews

Security Trends in 2016: Securing the Internet of Things

Whenever you connect anything to the internet, there is risk involved. Just ask the millions of IoT zombies infected with Mirai. Sure, there have been various stories over the years about hacking thermostats, refrigerators, cameras, pacemakers,... Read more
0 Reviews

Security Sidebar: Regulating the Internet of Things

It seems that just about everything is Internet-connected today…cars, cameras, phones, lights, thermostats, refrigerators, toasters…just to name a few. The so-called “Internet of Things” (IoT) is huge. On one hand, this is an amazing step in the advancement of technology. On the other hand, it’s a gold-mine for exploitation if you’re an attacker... Read more
0 Reviews

Lightboard Lessons: What is MQTT?

The mad dash to connect virtually every noun to the internet or The Internet of Things, is creating a massive M2M network for all the devices, systems, sensors and actuators to connect & communicate on the Internet. With that, they need a... Read more
Average Rating: 4.5
3 Reviews

Blog Roll 2016

It’s that time of year when we gift and re-gift, just like this text from last year. And the perfect opportunity to re-post, re-purpose and re-use all my 2016 entries. After 12 years at F5, I had a bit of a transition in 2016, joining the amazing... Read more
1 Review

Gating the IoT

Your car. My toaster. Our lights. The neighbor’s thermostat. With an average of 7.8 connected devices per home, according to recent surveys, there are twice as many “things” in the house as the average 3.14 people per household in the US in... Read more
0 Reviews

The Top 10, Top 10 Predictions for 2017

The time of year when crystal balls get a viewing and many pundits put out their annual predictions for the coming year. Rather than thinking up my own, I figured I’d regurgitate what many others are expecting to happen. 8 Predictions About How... Read more
0 Reviews

The Intruders of Things

Gartner predicts that by 2020, IoT security will make up 20 percent of annual security budgets. 2020 seems to be an important milestone for the Internet of Things. That’s the year that Cisco says there will be 50 billion connected devices and... Read more
1 Review

Is 2016 Half Empty or Half Full?

Updating passwords is a huge trend in 2016 With 2016 crossing the half way point, let's take a look at some technology trends thus far. Breaches: Well, many databases are half empty due to the continued rash of intrusions while the crooks... Read more
0 Reviews

The Visible Data of the Invisible User

As the march to connect each and every noun on this planet continues with a blistering pace, the various ways, contraptions and sensors used to collect data is greatly expanding. What once was a (relatively) small collection of fitness trackers,... Read more
0 Reviews

You’re Getting Under My (e)-Skin

Imagine if the temporary tattoos that come in a box of Cracker Jack (if you’re lucky) had an electronic display logo that lights up when you put it on. Or a fitness tracker that you tape to yourself rather than wearing it around your wrist. Or a... Read more
0 Reviews

Hello Infiltrators - Our Doors are Wide Open

In the 1946 classic ‘Hair Raising Hare,’ Bugs Bunny asks, ‘Have you ever have the feeling you were being watched? Like the eyes of strange things are upon you?’ Like Bugs often did, he breaks the fourth wall and involves the audience directly,... Read more
0 Reviews

Wearing Emotions on Your Sleeve...Literally

Imagine if your emotions and feelings could be measured, tracked and included in a data graph. I'm sure you've heard the saying 'wearing your heart on your sleeve' to indicate that someone expresses their emotions freely or exposes... Read more
1 Review

OK 2016 Monkey, Whatcha Got?

The Year of the (Fire) Monkey is upon us and the curious, playful, smart, opportunistic and sometimes mischievous character could influence events throughout 2016. Whether you were born under the symbol or not, Monkeys thrive on challenges and... Read more
0 Reviews

Backseat Drivers, Your Wish Has Come True

Excuse for speeding 10 years from now: ‘Officer, it was the software.’ When I was in college, I would drive the 1040 miles from Marquette Univ. in Milwaukee to my parent’s house in Rhode Island for things like summer vacation and semester break.... Read more
0 Reviews

Meet the Sensors

I often write about the Internet of Things, or the soon-to-be-cliché IoT. You know, the smart-fridges, smart-cars, smart-thermostats, healthcare devices, wearables and any of those connected devices that have a sensor, gathers data and... Read more
0 Reviews

You Are the Device in 2016

… and the controller and data generator. Were you surprised with that new car in your driveway sporting a huge bow this holiday season? Yea, me neither. But we did get a new gaming console that doesn’t require you to hold a controller in your... Read more
1 Review

Blog Roll 2015

It’s that time of year when we gift and re-gift, just like this text from last year. And the perfect opportunity to re-post, re-purpose and re-use all my 2015 blog entries. If you missed any of the 89 attempts including 59 videos, here they are... Read more
0 Reviews

The Top 10, Top 10 Predictions for 2016

The time of year when crystal balls get a viewing and many pundits put out their annual predictions for the coming year. Rather than thinking up my own, I figured I’d regurgitate what many others are expecting to happen. 7 Future Predictions for... Read more
Average Rating: 3.8
3 Reviews

Arguing with Things

As more things get connected, we may find ourselves disagreeing with them. We all argue, especially if you’re passionate about something. Sometimes it’s with our spouse, sometimes with friends or co-workers and sometimes we scold objects that... Read more
2 Reviews