One hundred and twenty-two years ago German physics professor Wilhelm Conrad Roentgen discovered the power of X-rays with the “X” signifying “unknown”. The hand on left on the image below is the first X-ray “radiograph” that Roentgen created of his wife’s hand in 1895. In today’s modern society it’s easy to take things for granted but prior to the invention of X-Ray machines, broken bones, tumors, or the location of shrapnel were all diagnosed by physical examination. Yikes! Exams involved guess-work, were prone to error, and were dangerous to the patient. I am grateful to live in today’s world of modern medicine where physicians have improved tools to diagnose and help treat illness and trauma without as much guesswork.
The tech stack has a problem. It’s serious. It’s pervasive. And it’s insidiously hard to spot.
Topics: Application Centric
We all can agree that cyber attacks are on rise. Be it Yahoo's data leak in 2013 where 1 billion user accounts were compromised or the more recent Equifax data leak which affected its 143 million customers, these events show the increased risk each web application is facing. Web applications are the bones and flesh of today’s businesses, and are often soft targets for damaging attacks. Unfortunately, applications need to access, collect, process, and relay sensitive data to execute business logic. Web application security is paramount for businesses that provide services using sensitive data. To understand the problem in more detail, we should examine what occurred in the case of Equifax—the attack is mind boggling in its scale and damage.
Without good APIs Google would fall to the likes of Amazon, Microsoft, and Facebook, claimed Steve Yegge in his seminal 2011 internal memo. Although the intention was to emphasize the importance of APIs for webscale service providers, the need for robust, scalable, and secure APIs has increasingly gained traction among today’s enterprises seeking to “digitize” their organization.
Citrix NetScaler’s recently exposed security exploit, which allows attackers to bypass authentication and take full control of the load balancing infrastructure, is frightening. But it is hardly a standalone incident. Every product from every company may eventually succumb to a critical vulnerability. This raises some good questions around security. How does a vendor test the security of their product? If vulnerabilities are inevitable, what is the vendor response and customer strategy?
More specifically, virtual load balancers are just legacy load balancers trying to find a home in your data center or the cloud.
This week I came across my still functioning iPod Classic “click wheel”. This was my exercise companion for many years and I still marvel at the engineering innovation (holds thousands of songs!) and simple elegance of the intuitive user interface (click wheel!). In today’s consumer society we expect our electronics to be intuitive. When announced in 2003 the “click-wheel” was years ahead at a time most electronics still came with detailed instruction manuals. Launching a consumer product with a click wheel was a radical approach, pushing the end-user experience to the very limits of engineering.
A growing share of Fortune 500 companies are selecting Avi Networks to be part of their cloud migration strategy. These leading enterprise IT organizations realize that they need application delivery services that are born in the cloud to produce results in the cloud. In short, lifting and shifting applications from the data center to the cloud requires more than lifting and shifting legacy appliances from the data center to the cloud.
You can't work in enterprise IT without hearing the phrase "digital transformation". This trend usually refers to the adoption of the cloud, containers, and microservices, or the use of automation and modern approaches. While initiatives to explore and implement these technologies abound, few are experiencing the promise of digital transformation.
They say a picture speaks a thousand words, and the same is true of video. This week we decided to parody Apple’s famous “Get A Mac” ad campaign by applying it to the load balancing and ADC industry.