Saturday 27 April 2013

'Going postal' in the age of the Internet

'Going postal' in the age of the Internet | F5 DevCentral

I check my post once a month. The post box, like for most people, is at the front of my house. But my driveway and daily entry/exit is at the rear of the house. Consequently, going to the letter box is a planned event. I know this makes me sound a bit lazy but let me present an argument in my defence.

Effort vs reward

Refer to this crude but effective effort vs reward chart - I've added a couple of points for context. Monday's are definitely high effort/low reward. Don't get me wrong, I love my job. But at the end of every Monday I always feel like I've been very busy and yet not actually removed anything from my To Do list. Typically, its a planning day. And then there's my most favourite thing ever, eating steak. The array of cuts, sizes, sauces. A veritable playground for the senses (Hey there vegetarians - just think of something else nice). But I digress...

Collecting the post occupies approximately 2 minutes of my time. While this is not very long in comparison to, say, my 90 minute journey to London, or, the torture of watching test match cricket, I remind you of the effort/reward chart. +90% of my post goes straight in the recycling bin. ~5% is not hugely important but is read and then shredded. Leaving the final ~5%, bills: Council Tax, Water Supply, Electricity,…..  Why would anyone like the postal service? My postman Tony is a pleasant chap but maybe my positive thoughts toward him could be best described as Stockholm Syndrome?

Bills: a process of informing the general public they have less money than they first thought. But all those listed above, typically utilities, can be, as I have done, set up as direct debits. So, why the post? The bill opening anxiety is not necessary! Begging the question, what is left for the post (all Hallmark days are being omitted intentionally - bah humbug and all that)?

I don't want to receive post, EVER! Its not necessary. But for such a grand change to happen there are a couple of other steps in the way. The first being my 92 year old grandfather. He doesn't have an email address and has never been on the internet. He's an admirable and well respected man but I doubt he has ever sat in front of a keyboard and he prefers to communicate via written letter than via telephone. The second being the need for a government-run email directory as a primary contact point for all - possibly linked to one's National Insurance ID or drivers license record. And lastly, but certainly not least, there's the need for always-on and always-secure access to the Internet.

Matt Warman, Consumer Technology Editor at The Telegraph discusses a small step forward in making this a reality in, "Web access could be a human right". I do hope this becomes a reality while I'm still kickin'. The sad truth is that moving beyond the postal service can only work when it works for everyone. To help get there, in the mean time, surely the utility providers and government departments could provide an opt-out service. I would happily sign up for online communication, owning the responsibility to check my emails regularly. Wouldn't you?

Thursday 25 April 2013

Infosec 2013 – The BYOD Discussion Continues

Infosec 2013 – The BYOD Discussion Continues | F5 DevCentral

 

This week at Infosec has been a great opportunity to talk to fellow security experts and businesses alike and it’s no surprise that BYOD has remained top of the agenda.

 

In fact, our survey of 120 attendees during the first day of the event revealed that BYOD tops the challenges that IT leaders are facing when trying to secure their networks and devices. 87 per cent highlighted that it is more difficult than ever to secure their business from the threat of cyber attacks, with almost one in four citing the BYOD trend as the major factor in why their organisation is more vulnerable. It’s also no surprise that a high percentage of visitors to our stand this week came to talk to us about BYOD.

 

This may seem shocking to many – the BYOD debate certainly seems to have been going on for years. However, businesses of all sizes are continuing to negotiate the tricky process of managing new devices on the network and putting in place the right levels of authentication to enable the workforce, without too many restrictions for access. It’s certainly true that the introduction of smartphones, laptops and tablets to the workplace has undoubtedly been a huge step forward in enabling mobile working – but it’s also come with its fair share of threats to the business.

 

The good news is that there are all-encompassing solutions for businesses in the market but the solution doesn’t end there. It’s easy for me to talk to IT managers and CIOs about the solutions which are available through technology, but the processes set out within the enterprise environment are also key. It’s not a case of one size fits all. The number one focus for anyone looking to implement a BYOD solution has to be to first understand the user base and their needs. What types of device are they using? Where are they accessing information from? What type of data are they accessing remotely? Once you understand the workforce you can map your solution to ensure the right levels of authentication to protect the network and ensure the best possible end-user experience.

 

It’s been great to speak to so many businesses this week about the challenges they are experiencing and it’s good to hear that more businesses are looking at how they can better enable their workforce. Success is in the detail, though – it’s not a case of buying a solution to tick a box, it’s about establishing what your organisation needs and how you can better support your employees. If you keep that focus in mind, you won’t go far wrong.

Sunday 14 April 2013

Google antitrust pressure

Latest | UK | Technical Blogs | F5 DevCentral

 

On the 7th of June, 2004, the European Commission of the European Union filed a case against Microsoft for abuse of its dominant position in the market. It started in 1993 as a complaint from Novell of Microsoft licensing practices with a ruling not decided until the 17th of September, 2007. Thats fourteen years of what I can imagine to be a lot of lawyers fees.

 

But it wasn't all over for Microsoft, on the 6th of March, 2013, the European Commission fined Microsoft for non-compliance with browser choice commitments. The EC showing how serious it is about antitrust and proving that its initial case was not just a very public slap on the wrist.

 

But we are far from finished with antitrust cases from the European Commission and now it’s Google in the spotlight. From the FT yesterday, Google in peace deal with Brussels, "Google is bowing for the first time to legally binding constraints on how it presents search results, according to a draft agreement with the EU’s top competition authority.

 

Several people familiar with the deal told the Financial Times that the US internet giant will revamp its results page to include prominent links to rival search engines and clearer signposts for its own in-house services."

 

While fair trading is clearly important to the EU competition authority, are they going too far? Google's search engine isn't forced upon me in any way. I make the decision to trust Google with my questions because I'm happy with its results; it’s never let me down. Furthermore, I use their web browser, Chrome, which, yes, does default its search queries to Google's search service but this was my choice also and, equally, I am provided with the option to change search engine preferences to another provider. One of the many reasons I like Chrome. Its pro-choice!

 

Should fair trade regulation replace letting the best man (service) win? I choose no!

Tuesday 9 April 2013

Don’t forget the network in this Big Data rush

Don’t forget the network in this Big Data rush | F5 DevCentral

 

Big Data is one of those buzzwords that comes along every so often and which those in the technology industry like to grab hold of. Think social enterprise. Think cloud computing.

Essentially Big Data is the collection of vast data sets – data sets that are so large common data processing tools simply cannot cope with the capture, storage, analysis and so much more required to take advantage of it.

But like many subjects that get hyped up to a huge extent, Big Data seems to be suffering from an identity crisis. For example, a report released in April 2012 by The Centre for Economics and Business Research (Cebr) claimed that Big Data could add £216bn to the UK economy by 2017, as well as create 58,000 new jobs.

 

However, on the flip side is the fact that another survey revealed 38% of IT managers said they did not have a clear understanding of what Big Data actually is. That did not stop 49% of them saying they were very concerned about managing Big Data.

 

The explosion in the use of smartphones, cloud computing and social networking means more data than ever before is being created and stored. But one aspect of this seems to be often overlooked: the network. To get the best out of Big Data, businesses must enable all that traffic from applications and so on to move freely across the network.

 

Here at F5 we are helping enterprises get the best out Big Data by ensuring that traffic and therefore all the data it is carrying gets where it needs to go in the most effective and cost-efficient way.

 

The recent announcement about updates to our Application Delivery Controller (ADC) included the new VIPRION 4800 chassis. It offers rates exceeding 20 million layer 7 requests per second and 160Gbps of SSL bulk throughput.

 

This throughput is vital to the health of your applications and networks. The network is vital to Big Data; you cannot get the right insights out of your data if it is not allowed the flow across the network and applications are not allowed to do what they need to.

 

The benefits of Big Data are clear – better customer insights mean increased sales. If you know more about your business and your customers you know them better and can offer them exactly what they want, even if they don’t know they want it. But to fully embrace it and its benefits you must ensure that your network is up to the challenge and can cope with the vast amounts of data that it will be travelling across it.

Creating IT Heroes

As an IT professional, technology evolution can be a blessing and a curse.

The constant conveyor belt of new products mean you have potentially a huge arsenal of tools at your disposal. But the demands of the business and the difficulties of where to place your technology bets means you’re constantly facing difficult decisions.

At the moment, we’re experiencing the most accelerated pace of IT change we’ve ever known. Cloud computing, big data / analytics, mobile and social are transforming the way we work and the way our businesses operate.

Yet, there remains a sentiment in some quarters that the IT department has lost influence in the business in recent years, is unreliable or is a barrier to progress, lacking the necessary knowledge to tackle and implement new solutions and infrastructures efficiently.

We think these trends and the technologies that support them, however, represent a massive opportunity. In fact, we don’t think there’s been a better time for an IT manager to shine, delivering real value to the wider business and transforming the perception from cost centre to business enabler.

The secret is in the enabler bit. The rise of trends such as BYOD and even Bring Your Own Cloud have led – quite rightly – to employees feeling increasingly empowered. They’re bringing their own devices into the workplace, using consumer apps for business purposes and sharing data externally using tools such as Dropbox.

Your challenge is to ensure that employees can continue to innovate and drive change in the way they work, but in a secure environment. As applications move around the data centre and out to the cloud, it’s easy for security and access policies can become disconnected, particularly when supporting an increasing number of personal devices requires additional policies. By consolidating security and access control at the application delivery tier,  you can consistently enforce policies while also improving scalability—to ensure vital services are available to users—across applications and environments.

IT has to be in control, but that doesn’t mean restricting the innovation within your organisation. By ensuring a secure but flexible IT infrastructure is in place with a defined set of processes, business units can incorporate technology which works well for their needs, and allows them to make their own IT choices.

In fact, although the transformation of IT can be a daunting prospect, it also offers a fantastic opportunity to build closer ties with other business units and develop a more collaborative approach. It’s not a time to wait for them to come to you – make the point of reaching out beyond the IT department to find out how you can better work with the wider team to support new digital initiatives in the company. Discuss your cloud, BYOD or security strategy with business unit heads and encourage them to put you in front of their team to better understand their needs and explain the central processes which they should follow.

The good news is that IT spend is continuing to increase. According to a recent global study from Gartner, global IT spending in 2013 will increase 4.2% compared with last year, reaching £2.28tn.

The IT heroes will be the ones who spend it wisely, enabling the business to carry on what it does best.