Welcome!

If everyone is thinking the same, someone isn't thinking

Lori MacVittie

Subscribe to Lori MacVittie: eMailAlertsEmail Alerts
Get Lori MacVittie via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Latest Blogs from Lori MacVittie
This is, according to the blogging system here on DevCentral, my 1000th post. I actually can’t create a word cloud that spans the more than 5 years I’ve been blogging for F5, but generating one from the most recent posts I’ve written seems to be fairly representative of all 1000 posts....
Throughout the evolution of computing the bus speed, i.e. interconnects, between various components on the main board have traditionally been one of the most limiting factors in terms of computing performance. When considering interconnects between disparate hardware resources such as ...
While cloud computing has brought to the forefront of our attention the ability to scale through duplication, i.e., horizontal scaling or “scale out” strategies, this strategy tends to run into challenges the deeper into the application architecture you go. Working well at the web and ...
Black-box style infrastructure is good, but often fails to include application delivery components. F5 resolves that issue for NetApp FlexPod The best thing about the application delivery tier (load balancing, acceleration, remote access) is that is spans both networking and applic...
Remember the Liberty Alliance? Microsoft Passport? How about the spate of employee provisioning vendors snatched up by big names like Oracle, IBM, and CA? That was nearly ten years ago. That’s when everyone was talking about “Making ID Management Manageable” and leveraging automation...
The first hit’s cheap kid … Recently Ben Kepes twitterbird started a very interesting discussion on cloud bursting by asking whether or not it was real. This led to Christofer Hoff twitterbird pointing out that “true” cloud bursting required routing based on business parameters. That ...
A factor often ignored by those performing contact analysis costs is technology. Call centers, marketing, and other business functions generally rely upon key performance indicators that include costs per contact – a cost associated with every e-mail, call, or web transactions that occ...
The first hit’s cheap kid … Recently Ben Kepes  started a very interesting discussion on cloud bursting by asking whether or not it was real. This led to Christofer Hoff  pointing out that “true” cloud bursting required routing based on business pa...
Right before Christmas Activision released a game called “Skylanders: Spyro’s Adventures.” It’s a fairly straightforward adventure game with a twist: it isn’t entirely digital. Collectible figures known as Skylanders can be inserted and removed into the game (via RFID, I assume) to ena...
Security is a pretty big word. It’s used to represent everything from attack prevention to authentication and authorization to securing transport protocols. It’s used as an umbrella term for such a wide variety of concerns that it has become virtually meaningless when applied to techno...
There’s always been a bit of a disconnect between traditional network-focused ops and more modern, application-focused ops when it comes to infrastructure architecture. The arguments for an against layer 7 (application) load balancing first appeared nearly a decade ago when the concept...
The focus on the explosion of mobile devices is heavily weighted toward IT in terms of management and security. While there’s nothing wrong with it, there’s another aspect of mobility that is often ignored. Much like their tethered counterparts, many mobile devices are constrained by a...
Operationally unified architectures able to leverage cloud computing without compromising on control and security are key to mitigating unintended consequences of cloud The adoption of cloud computing introduces operational challenges that would once required a single-vendor architect...
Why SPDY and similar techniques could succeed where coloring TOS bits failed Back in the day, before VoIP was common and we were all chatting over Skype, there was a very real concern about how to ensure the network could support it. Jitter was the most common source of issues making...
The growing complexity of managing more users from more places using more devices will drive consolidation efforts – but maybe not in the way you think.  Pop quiz time. Given three sets of three items each, how many possible combinations are there when choosing only one from each set...
delete tablet When you’re traveling you carry devices. I’ve got my smart phone, of course, to keep connected via e-mail and text and, if need be, voice. But I also carry my tablet and the old stand-by, my laptop. Because writing a blog post on my tablet or smart phone just isn’t my ...
The conflation of “pay-as-you-grow” with “on-demand” tends to cause confusion in the realm of networking and hardware. This is because of the way in which networking vendors have attempted to address the demand of organizations to pay only for what you use and to expand on-demand. The ...
#cloud Today’s post is brought to you by the Law of Diminishing Returns The conflation of “pay-as-you-grow” with “on-demand” tends to cause confusion in the realm of networking and hardware. This is because of the way in which networking vendors have attempted to address the demand o...
#mwc12 #traffix #mobile Strategic points of control are critical to managing the convergence of technology in any network - enterprise or carrier What happens when technology converges? When old meets new? A fine example of what might happen is what has happened in the carrier spac...
#centaur #40gbe Pop quiz time – and you get +100 geek points if you get this one right. What was the main difference between a 386SX and a 386DX? If you answered (without using Google) the data bus (16-bit for an SX and 32-bit for a DX) then award yourself 100 geek points and a pat...
#centaur #40gbe Pop quiz time – and you get +100 geek points if you get this one right. What was the main difference between a 386SX and a 386DX? If you answered (without using Google) the data bus (16-bit for an SX and 32-bit for a DX) then award yourself 100 geek points and a pat...
#F5 does #VDI, and it does it better. There are three core vendors and protocols supporting VDI today. Microsoft with RDP, Citrix with ICA, and VMware with PCoIP. For most organizations a single vendor approach has been necessary, primarily because the costs associated with the suppo...
#centaur #40GBE Data center transformation discussions too often overlook the impact on the network – and its necessary transformation. For many of the same reasons IPv6 migration is moving slower than perhaps it should given the urgent need for more IP addresses (to support all thos...
#HTML5 #infosec A multitude of security-related solutions rely upon the ability to extract and examine mime-objects from web-content. HTML5 may significantly impair their ability to do so. The trade off between security and performance has long been a known issue across IT organizati...
There are – according to about a bazillion studies - 4 billion mobile devices in use around the globe. It is interesting to note that nearly everyone who notes this statistic and then attempts to break it down into useful data (usually for marketing) that they almost always do so base...
We tend to assume characteristics upon hearing the term #mobile. We probably shouldn’t… There are – according to about a bazillion studies - 4 billion mobile devices in use around the globe. It is interesting to note that nearly everyone who notes this statistic and then attempts ...
What do these two vulnerabilities have in common? Apache Killer. Post of Doom. Right, they’re platform-based vulnerabilities. Meaning they are vulnerabilities peculiar to the web or application server platform upon which applications are deployed. Mitigations for such vulnerabilit...
Is it Linux? Is it third-party? Is it proprietary? Isn’t #vcmp just a #virtualization platform? Just what is inside an F5 BIG-IP that makes it go vroom? Over the years I’ve seen some pretty wild claims about what, exactly, is “inside” a BIG-IP that makes it go. I’ve read articles t...
Is it Linux? Is it third-party? Is it proprietary? Isn’t #vcmp just a #virtualization platform? Just what is inside an F5 BIG-IP that makes it go vroom? Over the years I’ve seen some pretty wild claims about what, exactly, is “inside” a BIG-IP that makes it go. I’ve read articles t...
The reaction in IT when there’s something wrong with a core router is to avoid disruption and its associated costs to the business. The reaction in IT when a user has problems is to embrace disruption and its associated costs to the business...
The reaction in IT when there’s something wrong with a core router is to avoid disruption and its associated costs to the business. The reaction in IT when a user has problems is to embrace disruption and its associated costs to the business...
Considering the innate differences between just the two most popular mobile operating systems – Android and iOS – gives rise to understanding how costly and complex an infrastructure might need to be to support both. It’s not at all unlike the issues with server virtualization. Managem...
#VDI #quasar #mobile The proliferation of mobile devices is pushing VDI closer to being “the solution” of the year to resolve the increasing complexity – and costs – associated with consumerization. Considering the innate differences between just the two most popular mobile operating...
I get by with a little help from my friends… While cloud and virtualization primarily focus on improving the provisioning process, there is a lot more to managing a data center and its critical components than just deployment. There’s upgrades – both software and hardware – and mig...
I get by with a little help from my friends… While cloud and virtualization primarily focus on improving the provisioning process, there is a lot more to managing a data center and its critical components than just deployment. There’s upgrades – both software and hardware – and mig...
One of the benefits of web applications is that they are generally transported via TCP, which is a connection-oriented protocol designed to assure delivery. TCP has a variety of native mechanisms through which delivery issues can be addressed – from window sizes to selective acks to id...
In most cases, the use of the term “consolidation” implies the aggregation (and subsequently elimination) of like devices. Application delivery consolidation, for example, is used to describe a process of scaling up infrastructure that often occurs during upgrade cycles. Many little bo...
It’s about operational efficiency and consistency, emulated in the cloud by an API to create the appearance of a converged platform In most cases, the use of the term “consolidation” implies the aggregation (and subsequently elimination) of like devices. Application delivery consolid...
Over the past few years we’ve seen firewalls fail repeatedly. We’ve seen business disrupted, security thwarted, and reputations damaged by the failure of the very devices meant to prevent such catastrophes from happening. These failures have been caused by a change in tactics from inva...
#fasterapp #ccevent While web applications aren’t sensitive to jitter, business processes are. One of the benefits of web applications is that they are generally transported via TCP, which is a connection-oriented protocol designed to assure delivery. TCP has a variety of native me...