Proxies are one of the more interesting (in my no-doubt biased opinion)
“devices” in the network. They’re the basis for caching, load
balancing, app security, and even app acceleration services. They’re also a
bridge between dev and ops and the network, being commonplace to all three
groups and environments in most data center architectures.
But not all proxies are built on the same architectural principles, which
means not all proxies are created equal. A large number of proxies are
half-proxies while others are full-proxies, and the differences between them
are what mean the difference between what you can and cannot do with them. In
fact, there are three very important things you can do with a full-proxy that
you can’t do with a regular old proxy.
Before we jump into those three things, let’s review the differences
between them, shall we?
Half-proxy ... (more)
There are three things today that an application needs to survive in
today’s demanding world: scale, security, and performance.
It is for both reasons of scale and performance that memcached has become
such a popular solution in modern application architectures. It aids in
scalability by offloading database requests, which naturally increases the
capacity of the database to answer queries not answerable by memcached. It
improves performance, of course, by providing very fast responses to queries
that in turn, are able to be returned to the user with greater alacrity.
From memcac... (more)
Is the App Attack Surface in the Cloud Really Different Than On-Premises?
Still here? Okay then, let me explain further. This whole thing started
because I was reading the Internet the other day and happened upon a claim
that stated: “the attack surface for cloud applications is dramatically
different than for highly controlled data centers”.
And that made me frustrated because it isn’t true at all.
The attack surface for applications deployed in the cloud is the same as that
of applications deployed on-premises. It doesn’t matter if we’re talking
about SaaS or IaaS. An appli... (more)
Programmability in the Network: Risk-based Data Scrubbing
This post is brought to you by the letter “C” (for context).
There’s a whole lot of talking and proposing and presenting going on around
risk-based. Usually it’s around authentication and access. The basic
premise is that based on a score, formulated from a set of variables
(context), you decide whether or not someone is allowed access to a resource.
The formula is based on context and can include things like location, device,
time of day, day of week, and application status.
Now, interestingly enough, one of the top five s... (more)
Microservices & IoT Power Panel at @DevOpsSummit
In this Power Panel at @DevOpsSummit, moderated by Jason Bloomberg, president
of Intellyx, panelists Roberto Medrano, Executive Vice President at Akana;
Lori MacVittie, Evangelist for F5 Networks; and Troy Topnik, ActiveState's
Technical Product Manager; and Otis Gospodnetić, founder of Sematext;
peeled away the buzz and discuss the important architectural principles
behind implementing IoT solutions for the enterprise. As remote IoT devices
and sensors become increasingly intelligent, they become part of our
distributed cloud en... (more)