If everyone is thinking the same, someone isn't thinking

Lori MacVittie

Subscribe to Lori MacVittie: eMailAlertsEmail Alerts
Get Lori MacVittie via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn

Top Stories by Lori MacVittie

Proxies are one of the more interesting (in my no-doubt biased opinion) “devices” in the network. They’re the basis for caching, load balancing, app security, and even app acceleration services. They’re also a bridge between dev and ops and the network, being commonplace to all three groups and environments in most data center architectures. But not all proxies are built on the same architectural principles, which means not all proxies are created equal. A large number of proxies are half-proxies while others are full-proxies, and the differences between them are what mean the difference between what you can and cannot do with them. In fact, there are three very important things you can do with a full-proxy that you can’t do with a regular old proxy. Before we jump into those three things, let’s review the differences between them, shall we? Half-Proxy Half-proxy ... (more)

The Power of the Proxy: Request Routing Memcached By @LMacVittie | @DevOpsSummit #DevOps

There are three things today that an application needs to survive in today’s demanding world: scale, security, and performance. It is for both reasons of scale and performance that memcached has become such a popular solution in modern application architectures. It aids in scalability by offloading database requests, which naturally increases the capacity of the database to answer queries not answerable by memcached. It improves performance, of course, by providing very fast responses to queries that in turn, are able to be returned to the user with greater alacrity. From memcac... (more)

App Attack Surface in the Cloud | @CloudExpo #Cloud #AWS #Microservices

Is the App Attack Surface in the Cloud Really Different Than On-Premises? No. Still here? Okay then, let me explain further. This whole thing started because I was reading the Internet the other day and happened upon a claim that stated: “the attack surface for cloud applications is dramatically different than for highly controlled data centers”. And that made me frustrated because it isn’t true at all. The attack surface for applications deployed in the cloud is the same as that of applications deployed on-premises. It doesn’t matter if we’re talking about SaaS or IaaS. An appli... (more)

Programmability in the Network: Risk-based Data Scrubbing By @LMacVittie | @DevOpsSummit #DevOps

Programmability in the Network: Risk-based Data Scrubbing This post is brought to you by the letter “C” (for context). There’s a whole lot of talking and proposing and presenting going on around risk-based. Usually it’s around authentication and access. The basic premise is that based on a score, formulated from a set of variables (context), you decide whether or not someone is allowed access to a resource. The formula is based on context and can include things like location, device, time of day, day of week, and application status. Now, interestingly enough, one of the top five s... (more)

Microservices and HTTP/2 By @LMacVittie | @DevOpsSummit #DevOps #Docker #Containers #Microservices

Microservices & IoT Power Panel at @DevOpsSummit In this Power Panel at @DevOpsSummit, moderated by Jason Bloomberg, president of Intellyx, panelists Roberto Medrano, Executive Vice President at Akana; Lori MacVittie, Evangelist for F5 Networks; and Troy Topnik, ActiveState's Technical Product Manager; and Otis Gospodnetić, founder of Sematext; peeled away the buzz and discuss the important architectural principles behind implementing IoT solutions for the enterprise. As remote IoT devices and sensors become increasingly intelligent, they become part of our distributed cloud en... (more)