Welcome!

If everyone is thinking the same, someone isn't thinking

Lori MacVittie

Subscribe to Lori MacVittie: eMailAlertsEmail Alerts
Get Lori MacVittie via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Latest Blogs from Lori MacVittie
If you’ve ever developed for an enterprise IT department, and had to please the end user, you know very well that they don’t care about what your technical limitations are, they care about getting a tool that helps them do their job better. Oh some will commiserate with you about your...
When it comes to talking IT operations and financial considerations I tend to stay away from deep economic theories. I'm not Joe Weinman, after all. But I happened upon (no, I don't recall how so don't even ask. The Internets, you see) an 1850s essay on political economics written by ...
#devops #cloud #SDN On that which is seen and that which is not seen ... When it comes to talking IT operations and financial considerations I tend to stay away from deep economic theories. I'm not Joe Weinman, after all. But I happened upon (no, I don't recall how so don'...
DNS, like any public service, is vulnerable. Not in the sense that it has vulnerabilities but vulnerable in the sense that it must, by its nature and purpose, be publicly available. It can't hide behind access control lists or other traditional security mechanisms because the whole poi...
#infosec #dns #ddos Smurfs aren't just for ICMP anymore...     DNS, like any public service, is vulnerable. Not in the sense that it has vulnerabilities but vulnerable in the sense that it must, by its nature and purpose, be publicly available. It can't hide behind...
Yes, I'm about to say something that's on the order of heresy in the church of virtualization. But it has to be said and I'm willing to say it because, well, as General Patton said, "If everyone is thinking the same... someone isn't thinking." The original NFV white paper cited in t...
Driving tacks in carpentry is just that – putting small nails in to hold something (normally carpet) in place. It is a task that is easily accomplished by the most novice of carpenters, and heck, even a non-carpenter like myself can get it right most of the time. A repeated process of ...
It is not uncommon today to click an interesting link you see on Facebook only to be confronted by a "social loginwall". If you aren't familiar with that term it's probably because I just made it up to describe the use of CSS overlays to "hide" the content you want with a second overla...
If you're immersed in the world of service providers (sometimes called carriers, telecoms, or carrier service providers) then you've probably heard the term "traffic steering." Traffic steering is the ability to control and direct data and voice traffic to the best suitable cell layer a...
Don’t forget: Integration is not free. #Android #Dev #F5 Many things are intended to work together, but require specific knowledge to get the outcome you desire. Automobiles and trailers, for example, require a trailer hitch, and not just any trailer hitch, but one with a ball the co...
The explosive growth of systems in the data center has led to a password problem. There's just too darn many of them. Even consumers are fatigued by password overload according to a Janrain study in 2012: "58 percent of online adults have five or more unique passwords associ...
One of the primary reasons node.js is currently ascending in the data center is because of its core model: event-driven, non-blocking processing. Historically, developers write applications based on connections and requests. It's blocking; it's not asynchronous; it's not fire and forg...
We (as in the industry) talk a lot about federating cloud. Usually solutions for federating cloud (aka hybrid cloud) are presented from the perspective of the end-user. We want to make it easier to transition between applications in the cloud and focus on identity management, single-si...
It's time to get serious about managing hybrid #cloud We (as in the industry) talk a lot about federating cloud. Usually solutions for federating cloud (aka hybrid cloud) are presented from the perspective of the end-user. We want to make it easier to transition between applicati...
Connecting via #SSL in #Android. Correctly and securely. Mimic browser functionality with untrusted certs and hostname mismatches. #f5 Okay, for those of you who’ve been waiting, this is the blog. For those who haven’t, welcome, we’re going to talk about https connections (specifical...
It's interesting - and almost amusing - to watch the circle of technology run around best practices with respect to performance over time. Back in the day caching was the ultimate means by which web application performance was improved and there was no lack of solutions and techniques ...
It's the "do not disturb" sign on the hotel door.... I admit it. I'm guilty of using self-referential definitions when discussing the topic of programmable networks. Somehow, while trying to define what a programmable network is, I end up using the term "programmable". Because that s...
We’ve all known the person that believed they knew everything there was to know about topic X. In IT this person is so commonplace that I have wondered if there isn’t an advanced cloning device that spits them out on a daily basis. While this self confidence (or bravado, whichever) in...
When first you build a bookshelf from raw wood, on your own, you learn a lot. While the first may be the only one you ever want to build, by the time you’re done, you know you could have done X, Y, or Z better. This is true of so many crafts. You get better by doing, in large part bec...
Finally! It all makes sense now! Thanks to cloud and the very generic "sticky sessions", many more people are aware of persistence as it relates to load balancing. It's a critical capability of load balancing without which stateful applications (which is most of them in...
One of the ramifications of relying on off-premise cloud infrastructure is that you're necessarily stuck with some of the idiosyncrasies that come with it. For example, it's not your network, and thus topologically-related identifiers such as host names and IP address are not within yo...
There's been a growing focus on scalability as the Internet of Things has continued its rapid growth. Perhaps due in part to large online failures during periodic or individual events, perhaps due in part to simple growth, the reason is less important than the reality that scalability ...
It is interesting, talking with people about what they read, and seeing how what they read is reflected in their daily lives. Even the occasional reader of this blog would not be surprised to find that I spend some amount of time with my nose buried in epic fantasy books and military ...
You keep using that word. I do not think it means what you think it means... An interesting and almost ancillary point was made during a recent #cloudtalk hosted by VMware vCloud with respect to the definition of "hybrid" cloud. Sure, it implies some level of integration, but how muc...
#f5 #BareMetalBlog Time to take a break, let the laggards catch up on reading, and talk about topics other than hardware for a bit. You do not have to be a top-flight auto mechanic to appreciate the precision with which some cars are made. From Rolls Royce on down, there are some cars ...
If you’re like most people, when you notice something really odd about your body, the first thought to enter your brain is not “I need to call the doctor”. Of course let me clarify, if you look down after a fall, and think “My arm really shouldn’t bend like that”, then yeah, you call ...
#F5 Perhaps I was a bit hasty talking about no new paradigm shifts in AppDev… “We have achieved peace for our time” The Honorable Neville Chamberlain It is often the case that when you look at things a certain way, they become filtered over time, and you see what you...
Prioritization. It's something that's built into nearly every technology, particularly that which services network traffic. Rate shaping. Queuing. Coloring bits. We do a lot of interesting gyrations with technology to ensure that some user traffic and requests are more equal than othe...
#BareMetalBlog #f5 performance report ADC Performance Envelopes. A new way to look at traditional test data. In the history of technology, we have found time and time again that there are multiple variables to define any given problem domain. As a military became more and more reliant...
Quiescence, in a nutshell, is your mom telling you to "finish what you're doing but don't start anything new, we're getting ready to go". It's an integral capability of load balancers (of enterprise-class load balancers, at least) that enables the graceful shutdown of application in...
#BareMetalBlog #F5 releases a new iteration of the ADC industry’s repeatable, transparent performance report. For those of you new to the Bare Metal Blog series, the entire list of posts can be found here. This week F5 released the 2013 Performance report. This is an important ...
#BareMetalBlog #F5 MTBF has meaning well beyond storage. If you are new to the Bare Metal Blog series, find them all here When assembling a model – any model, from a highly detailed functional replica of an engine to a mass produced plastic model of an airplane – there are several p...
Despite the slow descent into irrelevance of SOA and its core standards, several of its ancillary standards remain steadfastly alive and in some cases are growing in relevance. In particular, SAML is gaining steam thanks in large part to the explosive adoption of SaaS. SAML (Security ...
#webperf #infosec #ado #SDN #cloud Service chaining is a popular term today to describe a process in the network that's been done in the land of application integration for a long time. Service chaining in a nutshell is basically orchestration of network services. This concept is ...
Since SDN became the darling du jour of the networking industry, there's been a lot of head nodding and ancillary mention of L4-7 services eventually becoming part of the overall fabric. What there hasn't been is a lot of discussion on the challenges inherent in bringing those services...
Unifying identity and access management has been a stretch goal for IT for nearly a decade. At first it was merely the need to have a single, authoritative source of corporate identity such that risks like orphaned or unauthorized accounts could be addressed within the enterprise. But...
Scott Bils has a post on the "Five Mistakes that Enterprise Cloud Service Providers are Making" over on Leverhawk. Points four and five were particularly interesting because it seems there's a synergistic opportunity there. Point number four from Scott: Omitting SaaS and PaaS: Cloud ...
#BareMetalBlog talking about quality testing of hardware, in all its forms. #F5 does a great job in this space. For those of you new to the Bare Metal Blog series, find them all right here. In all critical systems – from home heating units to military firearms – the failure...
The success of SOA, which grew out of the popular Object Oriented development paradigm, was greatly hampered by the inability of architects to enforce its central premise of reuse. But it wasn't just the lack of reusing services that caused it to fail to achieve the greatness predicted...
One of the premises of SDN and cloud scalability is that it's easy to simply replicate services - whether they be application or network focused - and distribute traffic across them to scale infinitely. In theory, this is absolutely the case. In theory, one can continue to add capac...