Welcome!

If everyone is thinking the same, someone isn't thinking

Lori MacVittie

Subscribe to Lori MacVittie: eMailAlertsEmail Alerts
Get Lori MacVittie via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Latest Blogs from Lori MacVittie
In the context of cloud computing we often mention the driving force behind many of its financial benefits is commoditization. Commoditization drives standardization which reduces costs of the product itself as well as the management systems needed to interact with them. Commoditizatio...
Way back when,Don was the Scoutmaster for our local Boy Scout Troop. He’d been a Scout and earned his Eagle and, as we had a son entering scouting age, it was a great opportunity for Don to give back and for me to get involved. I helped out in many ways, not the least of which was to h...
Accelerating protocols via optimization is actually very different from accelerating the transfer of data. It is often the case that we, as an industry, use the terms “optimization” and “acceleration” interchangeably. Consider that solutions designed to improve the transfer of data ...
Variable latency is a Very Bad Thing™ – that’s why we build core networks based on hardware, not software. One of the key components to a successful scaling strategy is recognizing when more (or less) capacity is required and then acting upon that information. We call cloud and aut...
Like beauty, sometimes it is all about the view from the eye of the beholder. Technorati Tags: MacVittie,F5,cloud computing,1024 Words
If by “caffeine and sugar” you mean one way operations can optimize application and application delivery network performance. The benefits of a successfully executed centralized infrastructure management strategy are well-understood. We all know that being able to monitor and subse...
One of the key components of a successful architecture designed to mitigate operational risk is the ability to measure, monitor and make decisions based on collected “management” data. Whether it’s simple load balancing decisions based on availability of an application or more complex ...
If integrated web applications and services were cars…   Technorati Tags: MacVittie,performance,application,1024 Words,application delivery
When an article regarding cloud performance and an associated average $1M in loss as a result appeared it caused an uproar in the Twittersphere, at least amongst the Clouderati.There was much gnashing of teeth and pounding of fists that ultimately led to questioning the methodology and...
It’s not enough to have a strategic point of control; you’ve got to use it, too. One of the primary threats to the positive operational posture of an organization is that of extremely heavy load. Whether it’s from a concerted effort to take down the site (DDoS) or simply an unantic...
What distinguishes these three models of cloud computing are the business and operational goals for which they were implemented and the benefits derived. A brief Twitter conversation recently asked the question how one would distinguish between the three emerging dominant cloud comp...
When your data center is constantly under pressure to address operational risks, try leveraging some ancient wisdom from King Leonidas and William Wallace. The Battle of Thermopylae is most often remembered for the valiant stand of the "300". In case you aren't familiar, three hundred...
What’s worse than the big bad SSL wolf? Bad certificates certifying badder content… Connect with Lori: Connect with F5:           Related blogs & articles: s/1024 words/1 picture/g IT Se...
Of course not, because sometimes it is about the hardware.  If the rise of Massively multiplayer online role-playing game (MMORPG) like WoW (World of Warcraft) taught us anything it's the lag kills. What we technically know as latency is known to the PC gaming community as "lag". It'...
We’re still arguing over what the word means… Connect with Lori: Connect with F5:             Related blogs & articles: s/1024 words/1 picture/g IT Security Flowchart This post inten...
Let me ‘splain. No, there is too much, let me sum up. I occasionally get in a snit about, well, just about anything related to technology. Sometimes I take my #snark as we call it on Twitter and put into a graphic form because it’s so much easier to represent sarcasm and #snark with ...
It is certainly true that everyone who has an e-mail address has received some message claiming that something bad is going on, or someone said something they didn’t, or that someone influential wrote a letter that turns out to be wishful thinking. I often point the propagators of such...
But rather it is the ability to compensate for it. Redundancy. It’s standard operating procedure for everyone who deals with technology – even consumers. Within IT we’re a bit more stringent about how much redundancy we build into the data center. Before commoditization and the ad...
 Desktops aren’t GPS-enabled but don’t let that stop you from providing hyperlocal information to all your fans. IMAGE from macmillan buzzword dictionary   Two people are sitting in an Internet-enabled café. Let’s call the café Starbucks. One of them is using an iPhone or iPa...
Which was distilled down to: APIs need to be more than a service-enabled SDK. Nothing new there, I’ve made that assertion before (and so have many, many, many other pundits, experts, and architects). What Patrick is saying, I think, is that today it is often the case that an infrastruc...
The enterprise data center is, in most cases, what aquarists would call a “closed system.” This is to say that from a systems and application perspective, the enterprise has control over what goes in. The problem is, of course, those pesky parasites (viruses, trojans, worms) that find...
An article discussing a new attack on social networking applications that effectively provides an opening through which personal data can be leaked was passed around the Internets recently. If you haven’t read “Abusing HTTP Status Codes to Expose Private Information” yet please do, it...
Some interesting side conversations revolving around architecture and how cloud may or may not change the premises upon which those architectures are based. Architecture is, in the technology demesne, the “fundamental underlying design of computer hardware, software, or both.” A data c...
You’re still asking the wrong questions about cloud computing .  Tweet The city of Santa Clara is covered by a cloud this week, but not the kind of clouds most folks associate with California. CloudConnect 2011 is gearing up for a week of sessions and workshops, thought-provoking ...
A reference architecture is a solution with the “some assembly required” instructions missing.     Tweet As a developer and later an enterprise architect, I evaluated and leveraged untold number of “reference architectures.” Reference architectures, in and of themselves, are a...
We need to remember that operations isn’t just about deploying applications, it’s about deploying applications within a much larger, interdependent ecosystem. One of the key focuses of devops – that hardy movement that seeks to bridge the gap between development and operations – is on...
The claim a company is not a “true security company” because they don’t focus solely on security products is a red herring. If I ask you to define a true security company, you might tend to fall back on the most obvious answer, “Well, it’s a company that focuses on securit...
Because ‘big data’ isn’t just a problem for data at rest, it’s a problem for data being transferred. Remember when we talked about operational risk comprising more than security? One of the three core components of operational risk is availability which is defined differently based...
An almost irrefutable fact of application design today is the need for a database, or at a minimum a data store – i.e. a place to store the data generated and manipulated by the application. A second reality is that despite the existence of database access “standards”, no two database ...
Recognizing the relationship between and subsequently addressing the three core operational risks in the data center will result in a stronger operational posture. Risk is not a synonym for lack of security. Neither is managing risk a euphemism for information security. Risk – especia...
Detecting attacks is good, being able to do something about it is better. F5 and Oracle take their collaborative relationship even further into the data center, integrating web application and database firewall solutions to improve protection against web and database-focused attacks. ...
Do you really need a firewall to secure web and application services? Some organizations would say no based on their experiences while others are sure to quail at the very thought of such an unnatural suggestion. Firewalls are, in most organizations, the first line of defense for web ...
Don and I maintain a number of servers on which we run various web sites for fun. Early on we determined we really did need a firewall both because we wanted to better control our young children’s access to the Internet and to prevent unwanted visitors. We happened to have one land in...
Nokia’s brutally honest assessment of its situation identifies what is not always obvious in the data center - it’s about an ecosystem.  In what was certainly a wake-up call for many, Nokia’s CEO Stephen Elop tells his organization its “platform is burning.” In a leaked memo repri...
Database as a service is part of an emerging model that should be evaluated as an architecture, not based on where it might be deployed These days everything is being delivered “as a Service”. Compute, storage, platforms, IT, databases. The concept, of course, is sound and it is...
Legos. Nearly every child has them, and nearly every parent knows that giving a child a Lego “set” is going to end the same way: the set will be put together according to instructions exactly once (usually by the parent) and then the blocks will be incorporated into the large collectio...
Cloud is about achieving a steady state where dynamism is the norm but actions and reactions are in perfect balance. It’s called “dynamic equilibrium” and you’ll need to pass Cloud Chemistry 101 to get there.
 Migration is not going to happen overnight and it’s going to require simultaneous support for both IPv4 and IPv6 until both sides of the equation are ready. Making the switch from IPv4 to IPv6 is not a task anyone with any significant investment in infrastructure wants to undertak...
My car is eight years old this year. It has less than 30,000 miles on it. Yes, you heard that right, less than 30,000 miles. I don’t drive my car very often because, well, my commute is a short trip down two flights of stairs. I don’t need to go very far when I do drive it’s only te...
Mobile users. cloud computing . End-runs around IT security by developers. The trend has always existed, it’s just speeding up now. IT needs to take back control – and fast. But first IT needs the tools with which to do that… Let’s ignore the horrible acting by Kevin Costner in “R...