Forget the kids. We need this for IT Automation.

F5 Ecosystem | August 31, 2017
IMG_0212

Our youngest is nine (AND A HALF! DON’T FORGET THE HALF!) and he’s currently enthralled with robots. Not just playing with them, but programming them. With both parents holding advanced degrees in computer science, you can image we’re thrilled and encouraging of this particular trend.

So of course robots that offer easy-to-learn programming models is a thing in our house right now. One of the toys for this summer was from Wonder Workshop, whose robots can be programmed via a “block” like language.

This is the norm for kids today. This child plays with a number of ‘games’ on his various devices, all which use the same “block” like model for constructing programs. Even his Lego Mindstorms Ev3 robot uses a similar mechanism, where programming constructs are blocks you wire together. Variables and conditions are set by selecting them, and there’s no actual “code” displayed on the screen.

But you know it’s there.

Back in the day when I was evaluating BPM (Business Process Management) solutions, they used a similar paradigm to enable business stakeholders to define processes. Its interface reflected the nature of processes, which is to say you built a flowchart using a drag-n-drop model, but much of the construction of the orchestration was accomplished via an easier-to-learn interface. Like those my youngest uses today, only more Visio like. A lot more Visio like now that I think about it.

Forget the kids. This is the direction IT automation needs to go. There is no reason for the complexity inherent in IT automation today other than no one has yet to recognize that if we want to encourage more of it – and by folks who aren’t naturally coders – we need to find a better way to construct the workflows that represent the IT processes used to deploy, manage, and configure IT infrastructure.

it workflows eniac

The first thing we need to agree on is that programmatic doesn’t necessarily mean “you can do anything you want cause, code.” That’s true, in the most liberal sense of the word, but it also means the ability to change or define behavior programmatically. There are a limited set of actions required to execute a workflow in IT, and most are enabled today by the (other) API economy. By providing an interface that encapsulates those limited set of actions and provides clear and easy to understand logic constructs (if/then, while, iterative functions), we could ostensibly eliminate the tendency toward the unstructured scripting mechanisms that introduce far more technical debt into IT operations than most software developed in enterprises in the past. This level of constrained abstraction would also enable non-native coders (network and storage engineers and architects) to produce well-constructed workflows that are highly maintainable (a significant driver of standardization). When coupled with a serverless backbone to execute workflows, this model reduces the investment required to create, maintain, and execute workflows appropriate to IT operations.

That’s important, because as we need to approach IT automation with an eye toward sustainability. A script today works great, but can it scale along with people and processes in the future?

Now, maybe we don’t need a solution quite this simple (or colorful) but the premise on which the interface is designed is important, I think, to adapt as we look toward the future of IT automation and how we build (and maintain) the code that will eventually make IT go. Sadly, we tend to transfer the complexity in the underlying systems to the design of systems (and thus interfaces) that interact and control them. We want to expose every knob and button possible. At a minimum, an API broker that provides a way to aggregate the natural complexity of CLIs turned APIs into more comprehensible operational tasks would be a boon for those tasked with automating IT networks and app services. Logging in can be a complex process comprising multiple steps that are repeated every time. Composing them into a single “service” makes them repeatable and infinitely more auditable in addition to consistent. Combine that with a (more) intuitive interface and we’ve got ourselves an IT automation winner.

The interfaces for kids “coding” apps today proves that you can do that without making their users feel like they’re staring at an ENIAC with no manual to guide them. We can do better, and if we’re going to scale internal digital transformation to keep up with the business, we need to.

Share
Tags: 2017

About the Author

Lori Mac Vittie
Lori Mac VittieDistinguished Engineer and Chief Evangelist

More blogs by Lori Mac Vittie

Related Blog Posts

The everywhere attack surface: EDR in the network is no longer optional
F5 Ecosystem | 11/12/2025

The everywhere attack surface: EDR in the network is no longer optional

All endpoints can become an attacker’s entry point. That’s why your network needs true endpoint detection and response (EDR), delivered by F5 and CrowdStrike.

F5 NGINX Gateway Fabric is a certified solution for Red Hat OpenShift
F5 Ecosystem | 11/11/2025

F5 NGINX Gateway Fabric is a certified solution for Red Hat OpenShift

F5 collaborates with Red Hat to deliver a solution that combines the high-performance app delivery of F5 NGINX with Red Hat OpenShift’s enterprise Kubernetes capabilities.

F5 accelerates and secures AI inference at scale with NVIDIA Cloud Partner reference architecture
F5 Ecosystem | 10/28/2025

F5 accelerates and secures AI inference at scale with NVIDIA Cloud Partner reference architecture

F5’s inclusion within the NVIDIA Cloud Partner (NCP) reference architecture enables secure, high-performance AI infrastructure that scales efficiently to support advanced AI workloads.

F5 Silverline Mitigates Record-Breaking DDoS Attacks
F5 Ecosystem | 08/26/2021

F5 Silverline Mitigates Record-Breaking DDoS Attacks

Malicious attacks are increasing in scale and complexity, threatening to overwhelm and breach the internal resources of businesses globally. Often, these attacks combine high-volume traffic with stealthy, low-and-slow, application-targeted attack techniques, powered by either automated botnets or human-driven tools.

Volterra and the Power of the Distributed Cloud (Video)
F5 Ecosystem | 04/15/2021

Volterra and the Power of the Distributed Cloud (Video)

How can organizations fully harness the power of multi-cloud and edge computing? VPs Mark Weiner and James Feger join the DevCentral team for a video discussion on how F5 and Volterra can help.

Phishing Attacks Soar 220% During COVID-19 Peak as Cybercriminal Opportunism Intensifies
F5 Ecosystem | 12/08/2020

Phishing Attacks Soar 220% During COVID-19 Peak as Cybercriminal Opportunism Intensifies

David Warburton, author of the F5 Labs 2020 Phishing and Fraud Report, describes how fraudsters are adapting to the pandemic and maps out the trends ahead in this video, with summary comments.

Deliver and Secure Every App
F5 application delivery and security solutions are built to ensure that every app and API deployed anywhere is fast, available, and secure. Learn how we can partner to deliver exceptional experiences every time.
Connect With Us