Lori MacVittie

Lori MacVittie

De Pere, Wisconsin, United States
120K followers 500+ connections

About

Lori Mac Vittie is a Distinguished Engineer in F5’s Office of the CTO with an emphasis on…

Publications

  • Enterprise Architecture for Digital Business

    O'Reilly

    Digital transformation has accelerated nearly tenfold in recent years as both a business and technology journey. Yet, most white papers and how-to guides still focus solely on the business side, rather than include methods for optimizing the technology behind it. This handbook shows CIOs, IT directors, and architects how to balance these two concerns successfully.

    Other authors
    See publication
  • Web Application Security is a Stack (Fundamentals)

    ITGP

    The web application stack - a growing threat vector Understand the threat and learn how to defend your organisation This book is intended for application developers, system administrators and operators, as well as networking professionals who need a comprehensive top level view of web application security in order to better defend and protect both the "web" and the "application" against potential attacks. This book examines the most common, fundamental attack vectors and shows readers the…

    The web application stack - a growing threat vector Understand the threat and learn how to defend your organisation This book is intended for application developers, system administrators and operators, as well as networking professionals who need a comprehensive top level view of web application security in order to better defend and protect both the "web" and the "application" against potential attacks. This book examines the most common, fundamental attack vectors and shows readers the defence techniques used to combat them

    See publication
  • The Cloud Security Rules

    Roer

    The Cloud Security Rules explains the different aspects of cloud security to business leaders, CxO's, IT-managers and decision makers. The security principles are the same as before while the implementation and the risks involved are dramatically changed. The book is co-authored by some of the most recognized security specialists and bloggers in the world. The authors are gathered from USA, Europe and Africa, sharing their great knowledge of implementing and securing the cloud. This book is…

    The Cloud Security Rules explains the different aspects of cloud security to business leaders, CxO's, IT-managers and decision makers. The security principles are the same as before while the implementation and the risks involved are dramatically changed. The book is co-authored by some of the most recognized security specialists and bloggers in the world. The authors are gathered from USA, Europe and Africa, sharing their great knowledge of implementing and securing the cloud. This book is made to help it easier for you to choose the right cloud supplier as well as setting up and running your critical services in the cloud. Questions you will find answers about include: - Do I have to accept that standard SLA? - What should an SLA include? - What standards should I be paying attention to, if any? - How do I treat mobile workers, and how do they fit into the cloud? - Do I really need to care about logging? - Many more! Since the cloud computing is global, you risk using service providers in other countries than your own - even if you only operate in your own country. The Cloud Security Rules aims at helping you understand the risks involved, and help you determine the best strategy for your organization.

    Other authors
    See publication
  • The Cloud Security Rules

    Roer

    The Cloud Security Rules explains the different aspects of cloud security to business leaders, CxO's, IT-managers and decision makers. The security principles are the same as before while the implementation and the risks involved are dramatically changed. The book is co-authored by some of the most recognized security specialists and bloggers in the world. The authors are gathered from USA, Europe and Africa, sharing their great knowledge of implementing and securing the cloud. This book is…

    The Cloud Security Rules explains the different aspects of cloud security to business leaders, CxO's, IT-managers and decision makers. The security principles are the same as before while the implementation and the risks involved are dramatically changed. The book is co-authored by some of the most recognized security specialists and bloggers in the world. The authors are gathered from USA, Europe and Africa, sharing their great knowledge of implementing and securing the cloud. This book is made to help it easier for you to choose the right cloud supplier as well as setting up and running your critical services in the cloud. Questions you will find answers about include: - Do I have to accept that standard SLA? - What should an SLA include? - What standards should I be paying attention to, if any? - How do I treat mobile workers, and how do they fit into the cloud? - Do I really need to care about logging? - Many more! Since the cloud computing is global, you risk using service providers in other countries than your own - even if you only operate in your own country. The Cloud Security Rules aims at helping you understand the risks involved, and help you determine the best strategy for your organization.

    Other authors
    See publication
  • XAML in a Nutshell

    O'Reilly Media

    When Microsoft releases Windows Vista, the new operating system will support applications that employ graphics now used by computer games--clear, stunning, and active. The cornerstone for building these new user interfaces is XAML ("Zammel"), the XML-based markup language that works with Windows Presentation Foundation (WPF), Vista's new graphics subsystem.

    An acronym for Extensible Application Markup Language, XAML offers a wealth of new controls and elements with exciting capabilities,…

    When Microsoft releases Windows Vista, the new operating system will support applications that employ graphics now used by computer games--clear, stunning, and active. The cornerstone for building these new user interfaces is XAML ("Zammel"), the XML-based markup language that works with Windows Presentation Foundation (WPF), Vista's new graphics subsystem.

    An acronym for Extensible Application Markup Language, XAML offers a wealth of new controls and elements with exciting capabilities, including animation and rendering of 3D graphics. Windows developers are already jazzed by the possibilities of using XAML for fixed and flow format documents like PDF and HTML, 2D and 3D vector-based graphics, form development, animation, audio and video, transparent layering, and a lot more. Many feel that XAML will eliminate the need for multiple file formats or plug-ins (read: Flash), while lowering development costs and reducing time to market.

    The problem is, most developers don't know XAML. While it is fairly easy to understand, you still need a quick guide to bring you up to speed before Vista's release, and that's where this book's simple, no nonsense approach comes in.

    XAML in a Nutshell covers everything necessary to design user interfaces and .NET applications that take advantage of WPF. Prerequisites such as Microsoft's new unified build system, MSBuild, and core XAML constructs and syntax--including shortcuts--are all presented with plenty of examples to get you started. The Core XAML Reference section lets you dig even deeper into syntax rules and attributes for all XAML elements with a series of quick-reference chapters. This section divides XAML elements into logical categories of elements, controls, shapes and geometry, layout, animations, and transformations for easy reference.

    XAML in a Nutshell helps you learn, firsthand, how to use this XML-based markup language to implement the new generation of user interface graphics.

    See publication
  • Object-Oriented Programming: A New Way of Thinking

    CBM Books

    Explaining what object-oriented programming is and how structured programmers are increasing their productivity by switching to 00 programming, this book is an excellent guide for anyone considering the switch to 00 programming and for current 00 programmers who need a clear, easy-to-use guide to object technology.

    Other authors
    See publication

Patents

  • Methods for provisioning application delivery service and devices thereof

    Issued US 9,578,090

    A method, non-transitory computer readable medium and an application delivery controller for receiving a notification from a client computing device when an application is selected. A configuration file including one or more instructions is identified from one or more memory locations. One or more instructions within the application delivery controller is updated with the one or more instructions present within the identified configuration file to provision the selected application. The…

    A method, non-transitory computer readable medium and an application delivery controller for receiving a notification from a client computing device when an application is selected. A configuration file including one or more instructions is identified from one or more memory locations. One or more instructions within the application delivery controller is updated with the one or more instructions present within the identified configuration file to provision the selected application. The selected application is provisioned to the requesting client computing device using the updated one or more instructions.

    See patent

Honors & Awards

  • Top 100 Cloud Computing Experts on Twitter

    Huffington Post

    A list of the top 100 cloud computing pioneers and advocates on Twitter.

  • Top 10 Women in Cloud

    CloudNOW

    The Top 10 Women in Cloud is presented to 10 outstanding women in cloud computing for their contributions, accomplishments and thought leadership.

  • Top 10 Women in Cloud

    CloudNOW

    The Top 10 Women in Cloud is presented to 10 outstanding women in cloud computing for their contributions, accomplishments and thought leadership.

Recommendations received

View Lori’s full profile

  • See who you know in common
  • Get introduced
  • Contact Lori directly
Join to view full profile

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Add new skills with these courses