Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
Shows & Panels
A look at Software Defined Application Services
Tuesday - 2/25/2014, 8:13pm EST
Listeners who have paid their dues in the data center know F5 Networks for innovations in load balancing.
Essentially, this is the ability to look at a network and dynamically assign space on servers in order to maintain availability.
The traditional concept of several servers sitting in a closet down the hall has morphed into virtual servers sitting . . . somewhere in the cloud.
The challenge today has moved from managing servers to managing the applications sitting on the servers.
During the interview, Wood talks about this concept known as Software Defined Application Services or SDAS.
In an increasingly complex cloud world it is getting more and more difficult to manage the secure, fast, and reliable delivery of applications.
Randy sates that his customers are not interested in a four hour academic discussion on the differences between Level 4 and Level 7; they are interested in getting the job done.
To this end, F5 Networks has recently partnered with Cisco in something called the Cisco Application Centric Infrastructure.
A myriad of issues are discussed in the interview with a thorough discussion on the value of securing endpoints, like mobile devices.