Tuesday 21 May 2013

How was it for you? - Delivering good experience for the always-on customer

How was it for you? - Delivering good experience for the always-on customer | F5 DevCentral

 

It’s an undeniable fact that customers are increasingly connecting to services with expectations of an always-on, anytime, anywhere accessibility. There is a massive opportunity for businesses to engage more frequently with a switched on and interested consumer-base, but it brings the challenge of delivering the kind of seamless experience that they expect – in fact, it has been worked out that the average internet user will be put off visiting a site again if confronted with a delay of just 250 milliseconds. That’s quicker than the blink of an eye.

 

This means that the pressure is on for companies to deliver websites and online applications with as few delays as possible, otherwise there’s a risk that they will, quite literally, lose business. I don’t think many business leaders appreciate just how critical to the bottom line this is!

 

While a lot of delays suffered can be down to the connection to the end-user’s device (traditionally known as “the last mile”), there is a lot that can be done to reduce the page load speeds from the server side. For example, if you can tell that a user is accessing the site on a mobile device, high bandwidth images will be unnecessary and a mobile-friendly version of the site can, even should, be delivered instead. Time and money invested here to ensure maximum speed and availability is a solid investment in revenue.

 

It is something of a surprise that mobile access is so widely neglected when you consider that the latest statistics from Ofcom indicate that 39 per cent of the UK population access the internet on their mobiles. This figure is only going to get higher as smartphone penetration increases - estimated to reach 75% by 2016. It’s imperative that businesses address this shortcoming in order to boost the bottom line.

 

Good user experience is a key part of revenue generation and should be a top priority.

Thursday 16 May 2013

RIP SMS

RIP SMS | F5 DevCentral

 

Informa recently reported that the number of messages sent using free chat apps like 'WhatsApp' has overtaken the number of traditional paid-for SMS messages sent. The BBC revealed that according to Ovum, more than £15bn of SMS revenue was lost in 2012 due to popularity of chat apps. When you bear in mind that the Apple app store only opened in 2008 and that WhatsApp only launched in 2009, this is quite incredible.

 

Free apps aren't just muscling in on the messaging territory of mobile service providers; WhatsApp is now rumoured to be considering a voice chat function. If we can text and make calls for free on the go, what does the future have in store for mobile service providers? It seems likely that free messaging apps will follow in Skype’s footsteps by making traditionally paid-for services free for all. As communication apps continue to take their piece of the pie, mobile service providers will need to look for alternative opportunities to generate revenue. 

 

In addition to the revelation that free texts are overtaking their paid-for equivalents, this quarter has also revealed another first. This is the first time that smartphones have outnumbered basic phones in terms of worldwide shipments (in a total market of 418.6 million devices, 216.2 (51.6%) were smartphones). 

 

With smartphones becoming more and more prolific, apps are becoming an increasingly important part of our lives. And with communication services available free of charge, why would we choose to pay for our messages and calls, if we didn't need to?

Service providers need to find alternative ways to make revenue; rather than calls and texts, they should shift their focus to data. Securing and managing the data on our mobile devices is likely to become more of a priority as the uptake of smartphones and tablets continues to skyrocket. 

 

Context is something that has come up in several of our blog posts and this is one incident where it plays a truly crucial role. In order to remain competitive in this changing market, mobile service providers need to understand context; offering intelligence that allows them to deliver the right data to the right user at the right time, quickly and securely. Understanding what kind of data it is, who is accessing it, from which network, and from which device is key to its secure delivery. Once they understand that, mobile operators can build new products and services in order to keep their customers happy.  

 

While we may have a long way to go before the SMS is obsolete, any mobile service provider that chooses to ignore the threat posed by the arrival of free chat apps is going to get left behind. Apps and free chat apps in particular are about making data and communication accessible to all. Understanding context will empower service providers to build new revenue streams and secure an advantage over the competition. 

Friday 10 May 2013

Plan for the war, not the for battle: managing mobile devices

Plan for the war, not the for battle: managing mobile devices | F5 DevCentral

 

Ancient Chinese General Sun Tzu's relevance to Internet Security continues to impress me. Famous for his documented military tactics in ‘The art of War', Tzu stated, “Know thine enemy and know thy self; in a hundred battles, you will never be defeated. When you are ignorant of the enemy but know yourself, your chances of winning or losing are equal.”. Countless times have I reflected on this statement when considering the many different aspects of technology security. Today's focus will be on mobility.

 

Despite all the doom and gloom stories, mobility isn't evil. Personally, I think its a great idea and should be promoted. It is an enabler that keeps me working during situations that I would have previously deemed 'down time'. In fact, this post is being written on a tablet on the train somewhere in the English countryside. Mobility is great but, as Uncle Ben said to Peter Parker in Stan Lee's Spiderman, "With great power comes great responsibility!". Bringing us to the security element of mobility.

 

Security is about compromise. The best way to secure data is to ensure that no-one has access to it. But then what's the point of that data - Schrödinger's cat anyone? So, architecturally, we start with zero access and then work back from there until, eventually, we have data that is reference-able by the desired audience - we have implemented calculated risk. And with it the complexity added to the data's security by the technologies wrapped around it.

 

As important as many vendors will tell you their security boxes are its important not to lose focus on what it is we are trying to protect - the actual data. Concentrating on the technologies and devices around the data is a good way to lose sight of the original goal, a great way to add unnecessary complexity and leave the data itself open to danger. And this problem is big in terms of where the data could end up - refer previous post: "Data theft: 9,751 phones stolen last month".

 

Slashdot post "Popular Android Anti-Virus Software Fooled By Trivial Techniques" brought to my attention a great example of fighting the battle instead of the war. Anti-virus is a tactical solution and, in this case, was circumvented to provide access to data. If the security solution protected the apps and their individual data stores as entities in their own right - protected themselves even from the host operating system - then the data remains safe.

 

Sun Tzu told us to fight the war, not the battle - to not lose sight of what the security solution should be protecting. Are you fighting tactical security battles or are you winning the data protection war?

Friday 3 May 2013

Network load-balancing: Failing at the speed of light

Network load-balancing: Failing at the speed of light | F5 DevCentral

 

The way in which applications fail is not binary - either on or off in state. Applications can fail to deliver data quickly, accurately, securely or appropriately for the requesting device. Network load balancing alone delivers no protection against these types of delivery failure. This significant limitation is due to a lack of appreciation of context in regard to:

 

  • the performance of remote networks beyond the data centre
  • unexpected application behaviour
  • the capability of the end user device
  • real time, end user experience analytics

 

Network performance

The slowest segment of data’s journey between server and a remote device is typically the last mile of delivery – the network connected directly to the end user technology. This is increasingly so for mobile devices however, irrespective of the medium, wireless or fixed-line, end-to-end performance management is a critical step toward a positive end user experience. The effect of poor performance caused by networks beyond the hosting data center are amplified by the inefficiencies of web applications and their protocols. Web applications are often developed in sterile lab environments lacking the difficulties of real world application access. Consequently, behavioural testing in these labs return acceptable results that are not mirrored in production environments. In the case of interactive applications, where data is received from and pushed to the data centre, the impact of minor latency becomes significantly increased.

 

Unexpected application behaviour

Unforeseen errors occur during application run-time. For example, uncaught exceptions, as they are referred to in programming terminology, occur when an application reaches a state that was unexpected by the developer. They make their way into applications via a number of means - inexperienced developers, oversight from pressure to release functionality quickly, bugs in API’s (application programming interfaces), to name just a few – and they typically result in an application crash. Unfortunately, requesting of developers to not make mistakes isn’t a viable solution. Such a symptom is a consequence of the human element in computing. The resulting experience for end users can range from meaningless or confusing application error messages to long delays ending with a session timeout and a web browser error. The cost to the enterprise is loss of business and damaged reputation.

 

Device capability

Optimal application responses for laptops, tablets and smartphones are not alike. For example, Apple’s IOS, the operating system found on iPhone’s and iPad’s, cannot consume web applications developed with Adobe’s Shockwave Flash. Nor can they interpret web applications developed in Microsoft’s Silverlight. The application delivery network must concern itself with the unique requirements of a growing list of end user device types and ensure the devices are connected to the appropriate service. Failing to do so leads to poor end user experience – errors, confusion and disappointment.

 

Real time analytics

Analytics provide enterprises with operational visibility. However, unless that visibility is derived from real time behaviour, includes detailed application and end user device information, then the data is of little use. Only end user experience related analytics can be used to measure successful application delivery. The analytics must include performance, operating system and web browser versions, network and application responsiveness, to be useful in determining service levels.

 

With a broad range of devices to support and varying remote network connectivity problems, IT departments must deliver access from anywhere and on any device securely, fast & always available, 24 hours a day. Solving todays application delivery issues requires intelligence in the network, delivering:

 

  • Application awareness: Total insight into how the application is supposed to look on the wire
  • User awareness: The ability to see which users are trying to access what application, from which devices.
  • Resource awareness: The intelligence to tie all the pieces of the application delivery infrastructure together to provide real-time visibility into the entire Application Delivery Network.

 

There is little strategic about the unintelligent forwarding of packets form device to device as performed by network load balancers. Gartner's Mark Fabbi shares this view, "Cisco's move limiting Application Control Engine development shows that the time for stand-alone load balancers has passed. IT leaders should focus on leveraging more advanced application delivery controller features to improve application deployments."

Thursday 2 May 2013

Big data is booming, but context is king

Big data is booming, but context is king | F5 DevCentral

 

The big data phenomenon is something that we at F5 Networks have been banging on about for a while now – after all the network plays such a vital role in ensuring businesses really get the most out of big data by letting that information flow freely.

 

One of the drums we have been constantly beating is that context is king; analysing big data is one thing but applying context to it, by tying together information from multiple sources, is the best way of really understanding it.

 

A report from the team at Gartner recently revealed that 42% of IT leaders have already invested in big data technology, or are planning to do so over the next 12 months. Interestingly the report added that a better understanding of big data – such as what it actually is and the benefits it can bring to an enterprise – will continue to drive adoption of these analytical technologies.

 

An article on Computer Weekly said the report went on to state that: “Organisations are becoming aware that big data initiatives are critical because they have identified obvious or potential business opportunities that cannot be met with traditional data sources, technologies or practices.” http://www.computerweekly.com/news/2240179450/Big-data-understanding-drives-spending

 

It’s great that businesses are identifying where big data can improve their decision making but as we keep saying that is just one step of the process. For a business to achieve decent return on investment (RoI) from its big data initiative there are many other aspects to consider.

 

One of the most important is getting the right infrastructure in place to ensure all that data can get from where it resides to where it needs to be without any hiccups. Many of the services that will be collecting the data – such as social media sites, CRM systems and so on – and the platforms to analyse them are hosted in the cloud.

 

This means application delivery becomes more important than ever; it helps all that traffic flow around the network, getting it from where it originates to where it’s analysed and finally to where those insights are acted on. That’s how to get the best out of big data, and where IT bosses should focus at least some of their energy when looking into big data technologies.

 

As big data matures from a massively-hyped buzzword into a technology that can actually benefit businesses it is vital that companies don’t ignore the context of all the data they are collecting and analysing. The best way to do that is to ensure the right applications are allowed to work as they should. That is the best way to ensure truly user-centric information in the era of big data.

Wednesday 1 May 2013

Infosecurity Europe 2013 - Interview with F5's Tim Hearn

Infosecurity Europe 2013 - Interview with F5's Tim Hearn | F5 DevCentral

 

F5 Sales Director, Tim Hearn, takes a seat to discuss working in the Public Sector.

Infosecurity Europe 2013 - chat with Cenzic's Stephen Bishop

Infosecurity Europe 2013 - chat with Cenzic's Stephen Bishop | F5 DevCentral

 

Stephen Bishop from Cenzic stopped by our stand at Infosecurity Europe 2013. We grab a few minutes of his time to talk about the F5/Cnezic partnership and our awesome joint solution.

 

Infosecurity Europe 2013 - Security discussion with JJ

Infosecurity Europe 2013 - Interview with JJ | F5 DevCentral

 

Taking 5 minutes to talk with F5 Security Solution Architect, Joakim Sundberg (JJ), at Infosecurity Europe 2013 in London.