Wednesday, February 12, 2014

VMware PEX 2014: That’s a Wrap

I wrap it up from VMware PEX 2014 in San Francisco. Special thanks to Frank Strobel, Paul Pindell and Charlie Cano for being guests along with Courtney and Nathan for their camera work. Reporting from across the bay in Sausalito, thanks for watching!

 

ps

Related

 

Connect with Peter: Connect with F5:
o_linkedin[1] o_rss[1] o_twitter[1]   o_facebook[1] o_twitter[1] o_slideshare[1] o_youtube[1]

VMware PEX 2014: NSX Integration Demo (Cano solo)

Charlie Cano, Biz Dev Sr Solution Architect, demonstrates how F5 services can be deployed and configured from within NSX into the environment. This integration provides access to everything available on the BIG-IP platform. Deploy to physical or virtual environments with the REST based API BIG-IQ, the single point of integration for all your BIG-IP devices.

 

ps

Related

 

Connect with Peter: Connect with F5:
o_linkedin[1] o_rss[1] o_twitter[1]   o_facebook[1] o_twitter[1] o_slideshare[1] o_youtube[1]

Tuesday, February 11, 2014

VMware PEX 2014: Optimized Horizon View Technical Whiteboard (feat Pindell)

I watch as F5 Biz Dev Solution Architect Paul Pindell whiteboards his way through the new VMware Horizon View Optimized Solution. Paul gets into the technical details about a how typical Horizon View deployment looks and how the new solution provides an economical, secure, and high performing VDI environment. A cost effective, simple, quick, and highly secure VDI deployment.

 

ps

Related

Connect with Peter: Connect with F5:
o_linkedin[1] o_rss[1] o_twitter[1]   o_facebook[1] o_twitter[1] o_slideshare[1] o_youtube[1]

VMware PEX 2014: F5 VMware Technology Alliance – Horizon View (feat Strobel)

I chat with F5 Sr. Business Development Manager Frank Strobel about the F5 & VMware Technology Alliance and specifically about F5’s new VMware Horizon View Optimized Solution, the deep collaboration and associated reference architecture. Secure access, traffic management, and simplified deployment for VMware Horizon View.

 

ps

Related

 

Connect with Peter: Connect with F5:
o_linkedin[1] o_rss[1] o_twitter[1]   o_facebook[1] o_twitter[1] o_slideshare[1] o_youtube[1]

Monday, February 10, 2014

VMware PEX 2014: Find F5

Sporting a cool DevCentral t-shirt, I show you how to find F5 booth 208 at VMware Partner Exchange 2014. The theme for PEX is Master the New Reality and F5’s Synthesis is a perfect way to master infrastructure’s new reality…the Cloud.

 

ps

Related

 

Connect with Peter: Connect with F5:
o_linkedin[1] o_rss[1] o_twitter[1]   o_facebook[1] o_twitter[1] o_slideshare[1] o_youtube[1]

Tuesday, February 4, 2014

Mobile Malware Milestone

Did you celebrate or castigate?

You might not know but last week was the 10 year birthday of Cabir, the first mobile malware. It spread through Bluetooth after infecting the Nokia Series 60 phones running Symbian. Also last week, Kindsight Security Labs (Alcatel-Lucent) released the results of a study (pdf) that found more than 11.6 million mobile devices are infected by mobile malware at any given time and that mobile infections increased 20% globally in 2013.

This, obviously, increases risk for stolen personal and financial information, can lead to bill shock resulting from hijacked data usage, or extortion to regain control of the device along with allowing bad guys to remotely track location, download contact lists, intercept/send messages, record conversations and best of all, take pictures.

About 60% of all mobile infections involved Android devices that downloaded malicious software from the Google Play store and 40% were Android phones that received malicious code while tethered to a Windows laptop. Both Blackberry and iPhone combined to represent less than 1% of all infected devices. 4G LTE devices are the most likely to be infected and the number of mobile malware samples grew 20X in 2013. This will only get worse as new strains are released, like the proof of concept code that is capable of tracking your taps and swipes as you use a smartphone.  That's right, monitor touch events. Say a phone has not been touched in a while and suddenly there is 4 touch events. Well, that's probably a PIN, according to Forbes contributor Tamlin Magee. Add to that a screenshot, now you can overlay the touches with the screenshot and know exactly what is being entered.

You know it and I know it: The more we become one with our mobile devices, the more they become targets. It holds our most precious secrets which can be very valuable to some. We need to use care when operating such a device since, in many ways, our lives depend on it. And it is usually around this point in the article that I chastise mobile users for careless behavior but in this instance, there are certainly times where there is nothing you can do. You can be paranoid, careful and only visit the branded app stores yet the risk is still present.

Ten years in and we're just getting started.

ps

Related:

 

Connect with Peter: Connect with F5:
o_linkedin[1] o_rss[1] o_twitter[1]   o_facebook[1] o_twitter[1] o_slideshare[1] o_youtube[1]