The DevOps handbook how to create world-class agility, reliability, & security in technology organizations
Material type: Computer fileOriginal language: English Publisher: Portland It Revolution 2021Edition: 2a edDescription: 720 pISBN: 9781950508433Subject(s): Tecnología | Organización de información | Arquitectura de la información | Seguridad de la informaciónOnline resources: Solicitar acceso a snaveda@smv.gob.pe
Contiene: Introduction.-- I. The Three ways: 1. Agile, continuous delivery, and the three ways.- 2. The firs way: the principles of flow.- 3. The second way: the principles of feedbaak.- 4. The third way: the principles of continual learning and experimentation.-- II. Where to start: 5. Selecting which value stream to start with.- 6. Understanding the work in our value stream, making it visible, and expanding it across the organition.- 7. How to design our organization and architecture with conway's law in mind.- 8. How to get great outcomez by integrating operations into the daily work of development.-- III. The first way: the technical practices of flow: 9. Create the foundations of our deployment pipeline.- 10. Enable fast and reliable automated testing.- 11. Enable and practice continuous integration.- 12. Automate and enable low-risk releases.- 13. Architect for low risk releases.-- IV. The second way: the technical practices of feedback: 14. Create telemetry to enable seeing and solving problems.- 15. Analyze telemetry to better anticipate problems and achieve goals.- 16. Enable feedback so development and operations can safely deploycode.- 17. Integrate hypothesis driven development and A/B testing into our daily work.- 18. Create review and coordination processes to increase quality of our current work.-- V. The third way: the technical practices of continual learning and experimentation: 19. Enable and inject learning into daily work.- 20. Convert local discoveries into global improvements.- 21. Reserve time to create organizational learning and improvement.-- IV. The technological practices of integrating information security, change management, and compliance: 22. Information security is everyone's job every day.- 23. Protecting the deployment pipeline.
There are no comments on this title.