SlideShare uma empresa Scribd logo
1 de 15
DevOps, Agile, and the Story of
Stone Soup
I love the old folk tail about “Stone
Soup.”
Hungry travelers with nothing more than a cooking
pot, water and a large stone manage to get stingy
townsfolk to contribute ingredients to the “stone
soup” they were cooking.
As the soup was cooking, it always seemed to be
missing something each time it was tasted. A
villager would “remember” that they had a carrot
or an onion at home, then run and get it.
Finally, after all the villagers had each contributed
something to the soup pot, everyone shared a great
meal.
It’s a perfect example of
crowdsourcing …
but the idea of “stone soup” also provides
valuable lessons for agile development and
DevOps.
Let me tell my IT version of the story.
Once upon a time, there was a hungry
business …
… with a CIO under pressure to feed the business
with innovative new applications and services. All
while doing more with less.
Undaunted, she shakes things up by introducing
agile development into the organization.
“No more long cycle times and infrequent change.
It will be a continuous flow of value to the business
from the IT organization.”
But it was not so simple …
Compliance holds up a release because of serious
control breaches.
Call center operators are also being flooded with
complaints about the reliability of a new mobile
app.
IT Operations insist that every production change
go through a rigorous change management process.
“Where is the problem?” the CIO asks.
“No issues on our watch,” claims the IT Operations
manager. “We’re just tired of picking up the pieces after
shonky releases, especially when we’re constantly being
called in after hours to figure out application outages.”
In Security, the manager’s response is similar: “We’re just
doing our job. The last release had to be halted because
the exposures in the new code base were off the charts.
“If only they had called us earlier.”
Suddenly, the light goes on for one of
the development teams.
“What if we involve folks earlier in helping make
our agile soup?
“What if we accept that while being brilliant
code chefs and super at cooking apps, we’re
lousy at providing complete, secure and resilient
services?”
And so the teams start to invite other
groups to their soup-making IT
sessions.
IT Operations gets involved.
The development team tells IT Ops that they’re cooking up a
new set of apps based on microservices-style architecture.
This includes a new programming language and NoSQL
database, and asynchronous messaging over Restful APIs, but
there are performance concerns …
Happy to participate, the Ops team gets involved, providing
advice on network latency issues and modern monitoring
requirements …
… so a “resilience carrot” gets added to the soup.
Over in Security, analysts are asked for
advice.
“We suck at security,” admits the development
team. “Can you provide some guidance on securing
these new applications and the open source
components we’re using?”
“No problemo,” says Security – providing solid
advice on data encryption, mobile gateway security,
and security auditing, giving the dev team API
access to a range of security features they can easily
stir into the app.
Pretty soon, word about the tasty
‘application soup’ starts spreading,
and more groups want to get involved.
The API team gets advice from the Web team on
how to use service virtualization and test data
management tools to simulate constrained systems
and speed development.
The App Support group is invited to discuss how
establishing monitoring in pre-production will give
developers early warning into code-related defects.
Both teams agree that supportability should be
major design consideration … especially when folks
are dragged out of bed at 3:00 a.m.
Over time many other groups get to
add key ingredients to the soup.
In heavily regulated industries, that could be the
compliance team, or in an Internet of Things
project, industrial designers and plant engineers.
Even vendors with experience in implementing agile
at scale could be called in as “trusted advisors” –
your soup tasters.
Plus of course – finance, the call center, the IT
service team and HR could get involved to improve
the business potential, quality, reliability and
supportability of new applications.
… and so our intrepid CIO and her
business colleagues loves the new
Agile and DevOps soup.
Apps are delivered faster, with increased quality
and a better customer experience.
Business grows because the company can now
engage customers at scale.
The soup is fuel for their digital transformation.
The moral of the Agile Soup Story:
It’s not how agile you
are at cooking stones,
but how you get others
to contribute to the broth.
Get cooking with your own Agile and
DevOps Soup.
Read the eBook:
DevOps and Agile Operations: Insights from the
Experts

Mais conteúdo relacionado

Destaque

Marcia Conner: Stone Soup
Marcia Conner: Stone SoupMarcia Conner: Stone Soup
Marcia Conner: Stone SoupLearnTrends
 
Seoul Test Conference - Agile in Europe, The way its done.
Seoul Test Conference - Agile in Europe, The way its done.Seoul Test Conference - Agile in Europe, The way its done.
Seoul Test Conference - Agile in Europe, The way its done.Derk-Jan de Grood
 
Delivering Applications Continuously to Cloud
Delivering Applications Continuously to CloudDelivering Applications Continuously to Cloud
Delivering Applications Continuously to CloudIBM UrbanCode Products
 
Pre-Con Education: CA Service Operations Insight Power User Crash Course
Pre-Con Education: CA Service Operations Insight Power User Crash CoursePre-Con Education: CA Service Operations Insight Power User Crash Course
Pre-Con Education: CA Service Operations Insight Power User Crash CourseCA Technologies
 
Intro to dev ops and cloud services
Intro to dev ops and cloud servicesIntro to dev ops and cloud services
Intro to dev ops and cloud serviceshardwyrd
 
Tech Talk: CA Project and Portfolio Management Team Member Experience
Tech Talk: CA Project and Portfolio Management Team Member ExperienceTech Talk: CA Project and Portfolio Management Team Member Experience
Tech Talk: CA Project and Portfolio Management Team Member ExperienceCA Technologies
 
Tech Talk: CA Project and Portfolio Management All About Resources
Tech Talk: CA Project and Portfolio Management All About ResourcesTech Talk: CA Project and Portfolio Management All About Resources
Tech Talk: CA Project and Portfolio Management All About ResourcesCA Technologies
 
Case Study: U.S. Cellular Shares Its Playbook for Efficient IT Monitoring
Case Study: U.S. Cellular Shares Its Playbook for Efficient IT MonitoringCase Study: U.S. Cellular Shares Its Playbook for Efficient IT Monitoring
Case Study: U.S. Cellular Shares Its Playbook for Efficient IT MonitoringCA Technologies
 

Destaque (9)

Marcia Conner: Stone Soup
Marcia Conner: Stone SoupMarcia Conner: Stone Soup
Marcia Conner: Stone Soup
 
Seoul Test Conference - Agile in Europe, The way its done.
Seoul Test Conference - Agile in Europe, The way its done.Seoul Test Conference - Agile in Europe, The way its done.
Seoul Test Conference - Agile in Europe, The way its done.
 
DevOps is Scaling Agile too
DevOps is Scaling Agile tooDevOps is Scaling Agile too
DevOps is Scaling Agile too
 
Delivering Applications Continuously to Cloud
Delivering Applications Continuously to CloudDelivering Applications Continuously to Cloud
Delivering Applications Continuously to Cloud
 
Pre-Con Education: CA Service Operations Insight Power User Crash Course
Pre-Con Education: CA Service Operations Insight Power User Crash CoursePre-Con Education: CA Service Operations Insight Power User Crash Course
Pre-Con Education: CA Service Operations Insight Power User Crash Course
 
Intro to dev ops and cloud services
Intro to dev ops and cloud servicesIntro to dev ops and cloud services
Intro to dev ops and cloud services
 
Tech Talk: CA Project and Portfolio Management Team Member Experience
Tech Talk: CA Project and Portfolio Management Team Member ExperienceTech Talk: CA Project and Portfolio Management Team Member Experience
Tech Talk: CA Project and Portfolio Management Team Member Experience
 
Tech Talk: CA Project and Portfolio Management All About Resources
Tech Talk: CA Project and Portfolio Management All About ResourcesTech Talk: CA Project and Portfolio Management All About Resources
Tech Talk: CA Project and Portfolio Management All About Resources
 
Case Study: U.S. Cellular Shares Its Playbook for Efficient IT Monitoring
Case Study: U.S. Cellular Shares Its Playbook for Efficient IT MonitoringCase Study: U.S. Cellular Shares Its Playbook for Efficient IT Monitoring
Case Study: U.S. Cellular Shares Its Playbook for Efficient IT Monitoring
 

Mais de CA Technologies

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Technologies
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceCA Technologies
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...CA Technologies
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCA Technologies
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...CA Technologies
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCA Technologies
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...CA Technologies
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCA Technologies
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramCA Technologies
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageCA Technologies
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementCA Technologies
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...CA Technologies
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...CA Technologies
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...CA Technologies
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...CA Technologies
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentCA Technologies
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseCA Technologies
 

Mais de CA Technologies (20)

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource Intelligence
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on Time
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital Government
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive Advantage
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access Management
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of Deployment
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
 

Último

What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Visualising and forecasting stocks using Dash
Visualising and forecasting stocks using DashVisualising and forecasting stocks using Dash
Visualising and forecasting stocks using Dashnarutouzumaki53779
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate AgentsRyan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate AgentsRyan Mahoney
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 

Último (20)

What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Visualising and forecasting stocks using Dash
Visualising and forecasting stocks using DashVisualising and forecasting stocks using Dash
Visualising and forecasting stocks using Dash
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate AgentsRyan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 

DevOps, Agile and the Story of Stone Soup

  • 1. DevOps, Agile, and the Story of Stone Soup
  • 2. I love the old folk tail about “Stone Soup.” Hungry travelers with nothing more than a cooking pot, water and a large stone manage to get stingy townsfolk to contribute ingredients to the “stone soup” they were cooking. As the soup was cooking, it always seemed to be missing something each time it was tasted. A villager would “remember” that they had a carrot or an onion at home, then run and get it. Finally, after all the villagers had each contributed something to the soup pot, everyone shared a great meal.
  • 3. It’s a perfect example of crowdsourcing … but the idea of “stone soup” also provides valuable lessons for agile development and DevOps. Let me tell my IT version of the story.
  • 4. Once upon a time, there was a hungry business … … with a CIO under pressure to feed the business with innovative new applications and services. All while doing more with less. Undaunted, she shakes things up by introducing agile development into the organization. “No more long cycle times and infrequent change. It will be a continuous flow of value to the business from the IT organization.”
  • 5. But it was not so simple … Compliance holds up a release because of serious control breaches. Call center operators are also being flooded with complaints about the reliability of a new mobile app. IT Operations insist that every production change go through a rigorous change management process.
  • 6. “Where is the problem?” the CIO asks. “No issues on our watch,” claims the IT Operations manager. “We’re just tired of picking up the pieces after shonky releases, especially when we’re constantly being called in after hours to figure out application outages.” In Security, the manager’s response is similar: “We’re just doing our job. The last release had to be halted because the exposures in the new code base were off the charts. “If only they had called us earlier.”
  • 7. Suddenly, the light goes on for one of the development teams. “What if we involve folks earlier in helping make our agile soup? “What if we accept that while being brilliant code chefs and super at cooking apps, we’re lousy at providing complete, secure and resilient services?”
  • 8. And so the teams start to invite other groups to their soup-making IT sessions.
  • 9. IT Operations gets involved. The development team tells IT Ops that they’re cooking up a new set of apps based on microservices-style architecture. This includes a new programming language and NoSQL database, and asynchronous messaging over Restful APIs, but there are performance concerns … Happy to participate, the Ops team gets involved, providing advice on network latency issues and modern monitoring requirements … … so a “resilience carrot” gets added to the soup.
  • 10. Over in Security, analysts are asked for advice. “We suck at security,” admits the development team. “Can you provide some guidance on securing these new applications and the open source components we’re using?” “No problemo,” says Security – providing solid advice on data encryption, mobile gateway security, and security auditing, giving the dev team API access to a range of security features they can easily stir into the app.
  • 11. Pretty soon, word about the tasty ‘application soup’ starts spreading, and more groups want to get involved. The API team gets advice from the Web team on how to use service virtualization and test data management tools to simulate constrained systems and speed development. The App Support group is invited to discuss how establishing monitoring in pre-production will give developers early warning into code-related defects. Both teams agree that supportability should be major design consideration … especially when folks are dragged out of bed at 3:00 a.m.
  • 12. Over time many other groups get to add key ingredients to the soup. In heavily regulated industries, that could be the compliance team, or in an Internet of Things project, industrial designers and plant engineers. Even vendors with experience in implementing agile at scale could be called in as “trusted advisors” – your soup tasters. Plus of course – finance, the call center, the IT service team and HR could get involved to improve the business potential, quality, reliability and supportability of new applications.
  • 13. … and so our intrepid CIO and her business colleagues loves the new Agile and DevOps soup. Apps are delivered faster, with increased quality and a better customer experience. Business grows because the company can now engage customers at scale. The soup is fuel for their digital transformation.
  • 14. The moral of the Agile Soup Story: It’s not how agile you are at cooking stones, but how you get others to contribute to the broth.
  • 15. Get cooking with your own Agile and DevOps Soup. Read the eBook: DevOps and Agile Operations: Insights from the Experts