Welcome!

If everyone is thinking the same, someone isn't thinking

Lori MacVittie

Subscribe to Lori MacVittie: eMailAlertsEmail Alerts
Get Lori MacVittie via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories by Lori MacVittie

JANUARY 8, 2014 02:00 PM EST When we talk about the impact of BYOD and BYOA and the Internet of Things, we often focus on the impact on data center architectures. That's because there will be an increasing need for authentication, for access control, for security, for application delivery as the number of potential endpoints (clients, devices, things) increases. That means scale in the data center. What we gloss over, what we skip, is that before any of these "things" ever makes a request to access an application it had to execute a DNS query. Every. Single. Thing. Maybe that's because we assume DNS can handle the load. So far it's done well. You rarely, if ever, hear of disruptions or outages due directly to the execution of DNS. Oh, there has been some issues with misconfiguration of DNS and of exploitation of DNS (hijacking, illicit use in reflection attacks, et... (more)

Proxy Models in Container Environments | @DevOpsSummit #CloudNative #Serverless #DevOps

Inline, side-arm, reverse, and forward. These used to be the terms we used to describe the architectural placement of proxies in the network. Today, containers use some of the same terminology, but are introducing new ones. That's an opportunity for me to extemporaneously expound* on my favorite of all topics: the proxy. One of the primary drivers of cloud (once we all got past the pipedream of cost containment) has been scalability. Scale has challenged agility (and sometimes won) in various surveys over the past five years as the number one benefit organizations seek by deployi... (more)

Cloud Bursting: Gateway Drug for Hybrid Cloud

The first hit’s cheap kid … Recently Ben Kepes started a very interesting discussion on cloud bursting by asking whether or not it was real. This led to Christofer Hoff pointing out that “true” cloud bursting required routing based on business parameters. That needs to be extended to operational parameters, but in general, Hoff’s on the mark in my opinion. The core of the issue with cloud bursting, however, is not that requests must be magically routed to the cloud in an overflow situation (that seems to be universally accepted as part of the definition), but the presumption tha... (more)

The Business Intelligence A Cloud Paradox

Simultaneously one of the best use-cases for cloud as well as the worst. What’s IT to do? David Linthicum, SOA and cloud pundit and all-around interesting technology guy, recently pointed out a short post on business intelligence (BI) vendors joining forces with the cloud to offer cloud-based BI services. Four open-source and proprietary vendors on Wednesday announced a new partnership resulting in a cloud-based BI (business intelligence) stack. Jaspersoft and Talend will respectively lend their open-source BI and data-integration technologies to the integrated offering, which als... (more)

The Impact of Security on Infrastructure Integration

Automation implies integration. Integration implies access. Access requires authentication and authorization. That’s where things start to get interesting… Discussions typically associated with application integration – particularly when integrating applications that are deployed off-premise – are going to happen in the infrastructure realm. It’s just a matter of time. That’s because many of the same challenges the world of enterprise application integration (EAI) has already suffered through (and is still suffering, right now, please send them a sympathy card) will rear up and... (more)