Welcome!

If everyone is thinking the same, someone isn't thinking

Lori MacVittie

Subscribe to Lori MacVittie: eMailAlertsEmail Alerts
Get Lori MacVittie via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Latest Blogs from Lori MacVittie
Programmability is in F5's DNA. Since 2001 when we introduced iControl SOAP to the more recent additions such as iRules and iCall. Even looking at our most recent acquisitions you can see the common theme: an architectural vision based on extensibility and programmability. BIG-IQ is ...
#ACI #SDAS #devops #SDN Because something's got to change - and change radically. According to a recent IDC report, OPEX costs are doubling every eight years. Important to consider is this data is based on historical trends, and doesn't necessarily take into consideration the ...
According to a recent IDC report, OPEX costs are doubling every eight years. Important to consider is this data is based on historical trends, and doesn't necessarily take into consideration the forthcoming explosions in applications and data resulting from technological shifts like th...
#SDAS #Devops It's all about choice. Programmability is in F5's DNA. Since 2001 when we introduced iControl SOAP to the more recent additions such as iRules and iCall. Even looking at our most recent acquisitions you can see the common theme: an architectural vision based on extensibi...
Pop quiz: Your development team is developing a new mobile application. Should they optimize it for use over a mobile network or over WiFi? Another way to ask that same question is, "Should they provide a great quality of experience for users over a mobile network or over WiFi? And y...
#OpenStack #cloud Momentum behind OpenStack continues to accelerate as the releases for the often touted open source cloud management framework mature and stabilize. Some of that momentum comes from early adopters who've put the system through its paces in real enterprise and web-sca...
#VDI Faster deployments, lower costs, better productivity.  Among the many buzzwords associated with marketing like "agile", synergy is often used to promote the notion of increasing overall IT and business effectiveness through the collaboration of one or more systems ...
It means you can't use "network" protocols to make intelligent decisions about applications any more. Back in 2000 (or 2001, I forget exactly), I got to test a variety of bandwidth management appliances. Oh, they were the bomb back then - able to identify (and classify) applications b...
How many of you actually fill out the registration cards that come with your kid's toys? Anyone? Anyone? Bueller? Bueller? That's what I thought. Me neither. Not as a parent and certainly not as an adult. After all, they were just going to use it for marketing, right? Fast forwa...
This week's "bad news" with respect to information security centers on Facebook and the exploitation of HTTP caches to affect a DDoS attack. Reported as a 'vulnerability', this exploit takes advantage of the way the application protocol is designed to work. In fact, the same author who...
How many different network protocols can you name? There are, of course, a set of staples just about everyone knows: IP, ARP, VLAN, TCP, UDP, DNS, HTTP, SSL, TLS, SMTP, FTP, SMB, CIFS, 802.1q, 802.1ad. Then there are recent additions like VXLAN, NVGRE, SPDY. But we could fill post ...
Way back in the early days of the Internet scalability was an issue (the more things change...). One of the answers to this problem was to scale out web servers using a fairly well-proven concept called load balancing. Simply put, distribute the load across web servers to make sure eve...
We've talked before about the bifurcation of the network, which is driven as much by the evolution of network services from "nice to have" to "critical" as it is by emerging architectures. The demarcation line in the network stack has traditionally been - and remains - between layers 3...
Like moving to IPv6, simply picking up your existing network architecture and moving it to a completely new one is not going to happen overnight. There will undoubtedly still be "traditional" networks hanging around even when SDN adoption is considered mainstream and fully mature. That...
Last week was a crazy week for information security. That's probably also the understatement of the year. With the public exposure of Heartbleed, everyone was talking about what to do and how to do it to help customers and the Internet, in general, deal with the ramifications of such a...
OpenStack. OpenDaylight. SDN. Cloud. It's all about abstraction, about APIs and "software-defined" (which really means software-controlled, but this is neither the time or place to get into that debate). It's about jailbreaking the network. Enabling access to features and functionalit...
There are a variety of opinions on the seriousness of Heartbleed being put forth ranging from "it's not the end of the world" to "the sky is falling, duck and cover." Usually the former cites the relatively low percentage of sites impacted by Heartbleed, pegged at about 17% or 500,000 ...
Despite claims that there exists (or will, look out!) a mythical "god box" for the enterprise data center, capable of performing every data center function imaginable, it remains, well, mythical. Efforts to effectively secure the data center and the applications it delivers therefore r...
The industry often talks about how the data center perimeter is expanding,necessarily, due to technological shifts such as cloud and mobility and BYOD. But that isn't really the case. If you look closely, you'll see that the perimeter is actually shrinking, getting tighter and tighter...
Nick Lippis, who writes the eponymously named Lippis Report, had a fascinating report on the differences between enterprise and service provider environments with respect to network virtualization. He observes, through a survey of the ONUG (Open Networking User Group) membership, t...
You've all heard the news, right? Load balancers are dead. But that doesn't mean load balancing is dead and, in fact, it's a pretty critical piece of today's emerging technologies. That's because when you look out at what's going on and what's growing like weeds in a Midwest corn fiel...
F5 believes applications are transforming business. Whether expressed through new business models, a need to deliver applications to market faster or to support the impact of new application architectures on IT, applications must also be the focus of data center infrastructures. Cisco ...
The term "service chaining" hasn't quite yet made it into the mainstream IT vernacular. It's currently viewed as a technical mechanism for directing packets, flows or messages (depending on where you sit in the network stack) around the network. Service chaining is the answer to "how ...
One of the most common phrases heard when new technology is introduced is that it's going to "bridge the gap" between X and Y. X and Y are almost always one of three IT groups: development, operations and networking. And while that goal is admirable (and indeed there are techno-cultura...
#F5 #IBMCloud #IBMSAPAlliance #Cloud #SDAS #ThoughtsOnCloud One of the concerns often cited by those migrating to or integrating with "the cloud" is that applications deployed in off-premise cloud environments will fail to meet expectations with respect to availability, perf...
#sdas #webperf Sometimes it's not whether or not you use hardware, but the hardware you choose to use Everybody talks a good game with respect to changing the economy of scale, but very few explain how that's going to actually happen. The reality in most enterprise data centers today...
This post is following up on last week's post, "The Inevitability of Idle Resources", in which I mentioned the importance of ensuring not only that resources are available when you need to provision a new service to scale but that the resources available match the needs of the service....
#sdas #virtualization Scaling virtual infrastructure is one thing, managing it is another When virtualization first took off there was a fear - and it was a valid fear - of virtual sprawl. Virtual sprawl was the end result of spawning lots and lots of virtual machines and then essenti...
Proponents of pure software infrastructures often point to rapid provisioning (like right now, push a button and blam! Instant scale) as one of the reasons to "go software." Superficially this is true. If your infrastructure is all software (or virtual, if you prefer) then when you nee...
LIn 1974 a specification was developed that would, eventually, launch what we know of as "The Internet." That specification was TCP and though it is often overshadowed by HTTP as the spark that lit the fire under the Internet, without TCP HTTP wouldn't have a (transport) leg to stand o...
#sdas #webperf New TCP algorithms and protocols in a platform net improved performance for apps The original RFC for TCP (793) was written in September of 1981. Let's pause for a moment and reflect on that date. When TCP was introduced applications on "smart" devices was relegated to...
It's that time of the year, when resolutions promising grand changes in our lives are made - and more often than we'd like to admit, broken. Along with the resolutions comes advice on how to make them "stick." In other words, how to make them habitual. Many folks still cite the old ...
Application developers are aware (you are aware, aren't you?) that when applications are scaled using most modern load balancing services that the IP address of the application requests actually belong to the load balancing service. Application developers are further aware that this me...
A lot of security-minded folks immediately pack up their bags and go home when you start talking about automating anything in the security infrastructure. Automating changes to data center firewalls, for example, seem to elicit a reaction akin not unlike that to a suggestion to putting...
#infosec #DDoS #webperf NTP is rarely mentioned as a protocol of importance, but without it, high availability would be nigh unto impossible and performance enhancing services would be crippled Krebs (on Security) writes about the recent NTP-based DDoS attacks in "The New Normal: 200...
#sdas #infosec #ssl #DDoS #webperf SSL, like all cryptographic-based systems (and much to our chagrin, many security solutions) consumes a lot of resources. The longer the key lengths, the most complicated the key exchange, the more resources must be allocated to accomplishing both th...
#virtualization #cloud #sdas The release of Synthesis 1.5 brings more virtual edition options to the table. Most organizations are in transit between running a traditional data centers and managing a more flexible, cloud-enabled model. Their transformation continues to follow some fa...
#RSAC #F5 #infosec #sdas #webperf Security and performance can coexist. Security is an integral part of what F5 is all about. It's our mission to deliver secure, reliable and fast applications to anyone, anywhere at any time and we take all three of those goals very seriously. From ha...
#MWC14 #F5 #mobile #sdas Consumers, like fate, are the fickle mistresses of the service provider world. When the multitude of applications they increasingly use on their mobile devices perform poorly, they often blame the network provider irrespective of the real cause. Mobile network...
Estimates based on reports from Google put the number of daily activations of new Android phones at 1.3 Million. Based on reported data from Apple, there are 641 new applications per day added to the App Store. According to Cisco's Visual Networking Index, mobile video now accoun...