Suche senden
Hochladen
What is exactly anti fragile in dev ops - v3
•
3 gefällt mir
•
1,340 views
Asher Sterkin
Folgen
Technologie
Bildung
Melden
Teilen
Melden
Teilen
1 von 47
Jetzt herunterladen
Downloaden Sie, um offline zu lesen
Empfohlen
The New Ways of Chaos, Security, and DevOps
The New Ways of Chaos, Security, and DevOps
James Wickett
From resilient to antifragile - Chaos Engineering Primer DevSecCon
From resilient to antifragile - Chaos Engineering Primer DevSecCon
Sergiu Bodiu
The Seven Habits of the Highly Effective DevSecOp
The Seven Habits of the Highly Effective DevSecOp
James Wickett
A Way to Think about DevSecOps: MEASURE
A Way to Think about DevSecOps: MEASURE
James Wickett
DevSecOps and the New Path Forward
DevSecOps and the New Path Forward
James Wickett
MOSSCon 2013, Cisco Open Source talk
MOSSCon 2013, Cisco Open Source talk
Jeff Squyres
CODE BLUE 2014 : [Keynote] The 5 biggest problems of cyber security - and how...
CODE BLUE 2014 : [Keynote] The 5 biggest problems of cyber security - and how...
CODE BLUE
The Security, DevOps, and Chaos Playbook to Change the World
The Security, DevOps, and Chaos Playbook to Change the World
James Wickett
Empfohlen
The New Ways of Chaos, Security, and DevOps
The New Ways of Chaos, Security, and DevOps
James Wickett
From resilient to antifragile - Chaos Engineering Primer DevSecCon
From resilient to antifragile - Chaos Engineering Primer DevSecCon
Sergiu Bodiu
The Seven Habits of the Highly Effective DevSecOp
The Seven Habits of the Highly Effective DevSecOp
James Wickett
A Way to Think about DevSecOps: MEASURE
A Way to Think about DevSecOps: MEASURE
James Wickett
DevSecOps and the New Path Forward
DevSecOps and the New Path Forward
James Wickett
MOSSCon 2013, Cisco Open Source talk
MOSSCon 2013, Cisco Open Source talk
Jeff Squyres
CODE BLUE 2014 : [Keynote] The 5 biggest problems of cyber security - and how...
CODE BLUE 2014 : [Keynote] The 5 biggest problems of cyber security - and how...
CODE BLUE
The Security, DevOps, and Chaos Playbook to Change the World
The Security, DevOps, and Chaos Playbook to Change the World
James Wickett
DevOps for Defenders in the Enterprise
DevOps for Defenders in the Enterprise
James Wickett
To dev secops or not to devsecops is that a question ?
To dev secops or not to devsecops is that a question ?
🙃 Mario Platt
Cisco Connect 2018 Indonesia - Cybersecurity Strategy
Cisco Connect 2018 Indonesia - Cybersecurity Strategy
NetworkCollaborators
After the Catastrophe: IP Resiliency In the Post-Disaster Environment
After the Catastrophe: IP Resiliency In the Post-Disaster Environment
Cisco Crisis Response
A Tale of Woe, Chaos, and Business
A Tale of Woe, Chaos, and Business
James Wickett
The Network Enabled EOC
The Network Enabled EOC
Cisco Crisis Response
[Cisco Connect 2018 - Vietnam] Brian cotaz cyber security strategy
[Cisco Connect 2018 - Vietnam] Brian cotaz cyber security strategy
Nur Shiqim Chok
Pragmatic Security and Rugged DevOps - SXSW 2015
Pragmatic Security and Rugged DevOps - SXSW 2015
James Wickett
Cisco Connect 2018 Malaysia - SDNNFV telco data center transformation
Cisco Connect 2018 Malaysia - SDNNFV telco data center transformation
NetworkCollaborators
Securing Humanitarian Connectivity
Securing Humanitarian Connectivity
Cisco Crisis Response
Cisco Connect 2018 Indonesia - software-defined access-a transformational ap...
Cisco Connect 2018 Indonesia - software-defined access-a transformational ap...
NetworkCollaborators
Security at the Breaking Point: Rethink Security in 2013
Security at the Breaking Point: Rethink Security in 2013
Skybox Security
Cisco Connect 2018 Malaysia - Cisco services-guiding your digital transformation
Cisco Connect 2018 Malaysia - Cisco services-guiding your digital transformation
NetworkCollaborators
Compliance what does security have to do with it
Compliance what does security have to do with it
nCircle - a Tripwire Company
Deployment Review: Carlton Complex Wildfire
Deployment Review: Carlton Complex Wildfire
Cisco Crisis Response
The Network Enabled Emergency Operations Center (EOC)
The Network Enabled Emergency Operations Center (EOC)
Cisco Crisis Response
Hastily Formed Networks (HFN) at the Waldo Canyon Fire
Hastily Formed Networks (HFN) at the Waldo Canyon Fire
Rakesh Bharania
Connecting Syria's Refugees
Connecting Syria's Refugees
Cisco Crisis Response
Dev(Sec)Ops - Architecture for Security and Compliance
Dev(Sec)Ops - Architecture for Security and Compliance
Yi-Feng Tzeng
טלפונים חכמים ואתם
טלפונים חכמים ואתם
Idan ofek
Code quality as a built-in process
Code quality as a built-in process
Elad Maimon
1953 and all that. A tale of two sciences (Kitcher, 1984)
1953 and all that. A tale of two sciences (Kitcher, 1984)
Yoav Francis
Weitere ähnliche Inhalte
Was ist angesagt?
DevOps for Defenders in the Enterprise
DevOps for Defenders in the Enterprise
James Wickett
To dev secops or not to devsecops is that a question ?
To dev secops or not to devsecops is that a question ?
🙃 Mario Platt
Cisco Connect 2018 Indonesia - Cybersecurity Strategy
Cisco Connect 2018 Indonesia - Cybersecurity Strategy
NetworkCollaborators
After the Catastrophe: IP Resiliency In the Post-Disaster Environment
After the Catastrophe: IP Resiliency In the Post-Disaster Environment
Cisco Crisis Response
A Tale of Woe, Chaos, and Business
A Tale of Woe, Chaos, and Business
James Wickett
The Network Enabled EOC
The Network Enabled EOC
Cisco Crisis Response
[Cisco Connect 2018 - Vietnam] Brian cotaz cyber security strategy
[Cisco Connect 2018 - Vietnam] Brian cotaz cyber security strategy
Nur Shiqim Chok
Pragmatic Security and Rugged DevOps - SXSW 2015
Pragmatic Security and Rugged DevOps - SXSW 2015
James Wickett
Cisco Connect 2018 Malaysia - SDNNFV telco data center transformation
Cisco Connect 2018 Malaysia - SDNNFV telco data center transformation
NetworkCollaborators
Securing Humanitarian Connectivity
Securing Humanitarian Connectivity
Cisco Crisis Response
Cisco Connect 2018 Indonesia - software-defined access-a transformational ap...
Cisco Connect 2018 Indonesia - software-defined access-a transformational ap...
NetworkCollaborators
Security at the Breaking Point: Rethink Security in 2013
Security at the Breaking Point: Rethink Security in 2013
Skybox Security
Cisco Connect 2018 Malaysia - Cisco services-guiding your digital transformation
Cisco Connect 2018 Malaysia - Cisco services-guiding your digital transformation
NetworkCollaborators
Compliance what does security have to do with it
Compliance what does security have to do with it
nCircle - a Tripwire Company
Deployment Review: Carlton Complex Wildfire
Deployment Review: Carlton Complex Wildfire
Cisco Crisis Response
The Network Enabled Emergency Operations Center (EOC)
The Network Enabled Emergency Operations Center (EOC)
Cisco Crisis Response
Hastily Formed Networks (HFN) at the Waldo Canyon Fire
Hastily Formed Networks (HFN) at the Waldo Canyon Fire
Rakesh Bharania
Connecting Syria's Refugees
Connecting Syria's Refugees
Cisco Crisis Response
Dev(Sec)Ops - Architecture for Security and Compliance
Dev(Sec)Ops - Architecture for Security and Compliance
Yi-Feng Tzeng
Was ist angesagt?
(19)
DevOps for Defenders in the Enterprise
DevOps for Defenders in the Enterprise
To dev secops or not to devsecops is that a question ?
To dev secops or not to devsecops is that a question ?
Cisco Connect 2018 Indonesia - Cybersecurity Strategy
Cisco Connect 2018 Indonesia - Cybersecurity Strategy
After the Catastrophe: IP Resiliency In the Post-Disaster Environment
After the Catastrophe: IP Resiliency In the Post-Disaster Environment
A Tale of Woe, Chaos, and Business
A Tale of Woe, Chaos, and Business
The Network Enabled EOC
The Network Enabled EOC
[Cisco Connect 2018 - Vietnam] Brian cotaz cyber security strategy
[Cisco Connect 2018 - Vietnam] Brian cotaz cyber security strategy
Pragmatic Security and Rugged DevOps - SXSW 2015
Pragmatic Security and Rugged DevOps - SXSW 2015
Cisco Connect 2018 Malaysia - SDNNFV telco data center transformation
Cisco Connect 2018 Malaysia - SDNNFV telco data center transformation
Securing Humanitarian Connectivity
Securing Humanitarian Connectivity
Cisco Connect 2018 Indonesia - software-defined access-a transformational ap...
Cisco Connect 2018 Indonesia - software-defined access-a transformational ap...
Security at the Breaking Point: Rethink Security in 2013
Security at the Breaking Point: Rethink Security in 2013
Cisco Connect 2018 Malaysia - Cisco services-guiding your digital transformation
Cisco Connect 2018 Malaysia - Cisco services-guiding your digital transformation
Compliance what does security have to do with it
Compliance what does security have to do with it
Deployment Review: Carlton Complex Wildfire
Deployment Review: Carlton Complex Wildfire
The Network Enabled Emergency Operations Center (EOC)
The Network Enabled Emergency Operations Center (EOC)
Hastily Formed Networks (HFN) at the Waldo Canyon Fire
Hastily Formed Networks (HFN) at the Waldo Canyon Fire
Connecting Syria's Refugees
Connecting Syria's Refugees
Dev(Sec)Ops - Architecture for Security and Compliance
Dev(Sec)Ops - Architecture for Security and Compliance
Andere mochten auch
טלפונים חכמים ואתם
טלפונים חכמים ואתם
Idan ofek
Code quality as a built-in process
Code quality as a built-in process
Elad Maimon
1953 and all that. A tale of two sciences (Kitcher, 1984)
1953 and all that. A tale of two sciences (Kitcher, 1984)
Yoav Francis
Guice - dependency injection framework
Guice - dependency injection framework
Evgeny Barabanov
מכתב המלצה - לירן פרידמן
מכתב המלצה - לירן פרידמן
Liran Fridman
NUnit Features Presentation
NUnit Features Presentation
Shir Brass
Responsive Web Design
Responsive Web Design
Nir Elbaz
Work-for-hire Game Studios: Elevate Your Game
Work-for-hire Game Studios: Elevate Your Game
Gur Dotan
Hibernate caching
Hibernate caching
Alex Verdyan
Dynamo and BigTable - Review and Comparison
Dynamo and BigTable - Review and Comparison
Grisha Weintraub
Bootstrapping a Tech Community - Demi Ben-Ari
Bootstrapping a Tech Community - Demi Ben-Ari
Demi Ben-Ari
Andere mochten auch
(11)
טלפונים חכמים ואתם
טלפונים חכמים ואתם
Code quality as a built-in process
Code quality as a built-in process
1953 and all that. A tale of two sciences (Kitcher, 1984)
1953 and all that. A tale of two sciences (Kitcher, 1984)
Guice - dependency injection framework
Guice - dependency injection framework
מכתב המלצה - לירן פרידמן
מכתב המלצה - לירן פרידמן
NUnit Features Presentation
NUnit Features Presentation
Responsive Web Design
Responsive Web Design
Work-for-hire Game Studios: Elevate Your Game
Work-for-hire Game Studios: Elevate Your Game
Hibernate caching
Hibernate caching
Dynamo and BigTable - Review and Comparison
Dynamo and BigTable - Review and Comparison
Bootstrapping a Tech Community - Demi Ben-Ari
Bootstrapping a Tech Community - Demi Ben-Ari
Ähnlich wie What is exactly anti fragile in dev ops - v3
DevOps Days Tel Aviv 2013: What exactly is anti-fragile in DevOps? - Asher St...
DevOps Days Tel Aviv 2013: What exactly is anti-fragile in DevOps? - Asher St...
DevOpsDays Tel Aviv
Cisco - Revamping and Standardizing Global Marketing and Sales Content
Cisco - Revamping and Standardizing Global Marketing and Sales Content
Corporate Visions
Corporate Visions Conference
Corporate Visions Conference
Thierry van Herwijnen
Cisco brand-language-iabc-houston
Cisco brand-language-iabc-houston
Emily Murphy
Cisco brand-language-iabc-houston
Cisco brand-language-iabc-houston
IABC Houston
Scalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa Presentation
Scalar Decisions
Project Management at Cisco Ben Rus TIM 101 Seminar – .docx
Project Management at Cisco Ben Rus TIM 101 Seminar – .docx
woodruffeloisa
Creating the Workplace of Tomorrow
Creating the Workplace of Tomorrow
Cisco Canada
From Air Gap to Air Control
From Air Gap to Air Control
EnergySec
Next Generation Security
Next Generation Security
Cisco Canada
Winning Strategy For Hybrid Cloud Environments
Winning Strategy For Hybrid Cloud Environments
Carl De Groote
«Product Security Incident Response Team (PSIRT) - Изнутри Cisco PSIRT», Алек...
«Product Security Incident Response Team (PSIRT) - Изнутри Cisco PSIRT», Алек...
Mail.ru Group
Predictive Analytics & Visualization - Towards Data Driven Insights for Opens...
Predictive Analytics & Visualization - Towards Data Driven Insights for Opens...
Debojyoti Dutta
Security and Virtualization in the Data Center
Security and Virtualization in the Data Center
Cisco Canada
SDN Adoption Challenges
SDN Adoption Challenges
Vimal Suba
Nsc42 security knights slayer of dragons 0-5_very_short_15m_share
Nsc42 security knights slayer of dragons 0-5_very_short_15m_share
NSC42 Ltd
Will the Cloud be your disaster, or will Cloud be your disaster recovery?
Will the Cloud be your disaster, or will Cloud be your disaster recovery?
Livingstone Advisory
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver Presentation
Scalar Decisions
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
BGA Cyber Security
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
NetworkCollaborators
Ähnlich wie What is exactly anti fragile in dev ops - v3
(20)
DevOps Days Tel Aviv 2013: What exactly is anti-fragile in DevOps? - Asher St...
DevOps Days Tel Aviv 2013: What exactly is anti-fragile in DevOps? - Asher St...
Cisco - Revamping and Standardizing Global Marketing and Sales Content
Cisco - Revamping and Standardizing Global Marketing and Sales Content
Corporate Visions Conference
Corporate Visions Conference
Cisco brand-language-iabc-houston
Cisco brand-language-iabc-houston
Cisco brand-language-iabc-houston
Cisco brand-language-iabc-houston
Scalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa Presentation
Project Management at Cisco Ben Rus TIM 101 Seminar – .docx
Project Management at Cisco Ben Rus TIM 101 Seminar – .docx
Creating the Workplace of Tomorrow
Creating the Workplace of Tomorrow
From Air Gap to Air Control
From Air Gap to Air Control
Next Generation Security
Next Generation Security
Winning Strategy For Hybrid Cloud Environments
Winning Strategy For Hybrid Cloud Environments
«Product Security Incident Response Team (PSIRT) - Изнутри Cisco PSIRT», Алек...
«Product Security Incident Response Team (PSIRT) - Изнутри Cisco PSIRT», Алек...
Predictive Analytics & Visualization - Towards Data Driven Insights for Opens...
Predictive Analytics & Visualization - Towards Data Driven Insights for Opens...
Security and Virtualization in the Data Center
Security and Virtualization in the Data Center
SDN Adoption Challenges
SDN Adoption Challenges
Nsc42 security knights slayer of dragons 0-5_very_short_15m_share
Nsc42 security knights slayer of dragons 0-5_very_short_15m_share
Will the Cloud be your disaster, or will Cloud be your disaster recovery?
Will the Cloud be your disaster, or will Cloud be your disaster recovery?
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver Presentation
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
Mehr von Asher Sterkin
Essence of Requirements Engineering: Pragmatic Insights for 2024
Essence of Requirements Engineering: Pragmatic Insights for 2024
Asher Sterkin
Cloud Infrastructure from Python Code: PyCon DE-23
Cloud Infrastructure from Python Code: PyCon DE-23
Asher Sterkin
PyCascades-23.pdf
PyCascades-23.pdf
Asher Sterkin
PyConFR-23 Talk.pdf
PyConFR-23 Talk.pdf
Asher Sterkin
pyjamas22_ generic composite in python.pdf
pyjamas22_ generic composite in python.pdf
Asher Sterkin
If your computer is cloud what its Operating System look like?
If your computer is cloud what its Operating System look like?
Asher Sterkin
Serverless flow programming a new perspective (py web meetup, sept 2nd, 2019...
Serverless flow programming a new perspective (py web meetup, sept 2nd, 2019...
Asher Sterkin
Documenting serverless architectures could we do it better - o'reily sa con...
Documenting serverless architectures could we do it better - o'reily sa con...
Asher Sterkin
Developing cloud serverless components in Python: DDD Perspective
Developing cloud serverless components in Python: DDD Perspective
Asher Sterkin
Shaping serverless architecture with domain driven design patterns - py web-il
Shaping serverless architecture with domain driven design patterns - py web-il
Asher Sterkin
Shaping serverless architecture with domain driven design patterns
Shaping serverless architecture with domain driven design patterns
Asher Sterkin
Domain driven design: a gentle introduction
Domain driven design: a gentle introduction
Asher Sterkin
Strategy toolbox for startsups
Strategy toolbox for startsups
Asher Sterkin
AI as a service
AI as a service
Asher Sterkin
Serverless ddd
Serverless ddd
Asher Sterkin
Software strategy for startups
Software strategy for startups
Asher Sterkin
Mehr von Asher Sterkin
(16)
Essence of Requirements Engineering: Pragmatic Insights for 2024
Essence of Requirements Engineering: Pragmatic Insights for 2024
Cloud Infrastructure from Python Code: PyCon DE-23
Cloud Infrastructure from Python Code: PyCon DE-23
PyCascades-23.pdf
PyCascades-23.pdf
PyConFR-23 Talk.pdf
PyConFR-23 Talk.pdf
pyjamas22_ generic composite in python.pdf
pyjamas22_ generic composite in python.pdf
If your computer is cloud what its Operating System look like?
If your computer is cloud what its Operating System look like?
Serverless flow programming a new perspective (py web meetup, sept 2nd, 2019...
Serverless flow programming a new perspective (py web meetup, sept 2nd, 2019...
Documenting serverless architectures could we do it better - o'reily sa con...
Documenting serverless architectures could we do it better - o'reily sa con...
Developing cloud serverless components in Python: DDD Perspective
Developing cloud serverless components in Python: DDD Perspective
Shaping serverless architecture with domain driven design patterns - py web-il
Shaping serverless architecture with domain driven design patterns - py web-il
Shaping serverless architecture with domain driven design patterns
Shaping serverless architecture with domain driven design patterns
Domain driven design: a gentle introduction
Domain driven design: a gentle introduction
Strategy toolbox for startsups
Strategy toolbox for startsups
AI as a service
AI as a service
Serverless ddd
Serverless ddd
Software strategy for startups
Software strategy for startups
Kürzlich hochgeladen
presentation ICT roal in 21st century education
presentation ICT roal in 21st century education
jfdjdjcjdnsjd
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Zilliz
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
Andrey Devyatkin
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
apidays
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
Sandro Moreira
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
Remote DBA Services
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
Product Anonymous
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
Remote DBA Services
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Angeliki Cooney
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
Dropbox
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
Nanddeep Nachan
Architecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
rafiqahmad00786416
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
MadyBayot
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
WSO2
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Orbitshub
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
MIND CTI
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
johnbeverley2021
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Juan lago vázquez
Kürzlich hochgeladen
(20)
presentation ICT roal in 21st century education
presentation ICT roal in 21st century education
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
Architecting Cloud Native Applications
Architecting Cloud Native Applications
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
What is exactly anti fragile in dev ops - v3
1.
Cisco Confidential© 2013
Cisco and/or its affiliates. All rights reserved. 1 What is Exactly Anti-Fragile in DevOps? Asher Sterkin Distinguished Engineer, SPVSS, Cisco Video Systems, Israel September 30, 2013
2.
Cisco Confidential© 2013
Cisco and/or its affiliates. All rights reserved. 2
3.
© 2013 Cisco
and/or its affiliates. All rights reserved. Cisco Confidential 3
4.
© 2013 Cisco
and/or its affiliates. All rights reserved. Cisco Confidential 4 Antifragile Some things benefit from shocks… volatility, randomness, disorder, and stressors and love adventure, risk, and uncertainty… there is no word for the exact opposite of fragile. Let’s call it antifragile. Nassim N. Taleb, “Antifragile. Things that gain from disorder”
5.
© 2013 Cisco
and/or its affiliates. All rights reserved. Cisco Confidential 5 The Book and Reactions I think this concept is incredibly powerful when applied to systems and organizational architecture. Jez Humble, “On Antifragility in Systems and Organizational Structure”
6.
© 2013 Cisco
and/or its affiliates. All rights reserved. Cisco Confidential 6 The Book and Reactions The Netflix cloud architecture is anti-fragile… The Netflix culture is anti-fragile… Getting stronger through failure is the basis of anti- fragility. Avoiding failure at all costs … makes you brittle and vulnerable... Adrian Cockcroft, “Looking back at 2012 with pointers to 2013”
7.
© 2013 Cisco
and/or its affiliates. All rights reserved. Cisco Confidential 7 The Book and Reactions If the idea is nice and neat, however, the book that houses it is just the opposite. It is a big, baggy, sprawling mess. David Runciman, review of the book in Guardian November 21, 2012
8.
© 2013 Cisco
and/or its affiliates. All rights reserved. Cisco Confidential 8 Larger Body of Knowledge • Complex Adaptive Systems • Highly-Optimized Tolerance • Technology Development Cycle • Disruptive Innovations • Product Development Flow • Lean Start Up
9.
© 2013 Cisco
and/or its affiliates. All rights reserved. Cisco Confidential 9 For Today • De-fragilization • Skin in the Game • Barbell • Asymmetric Pay-off
10.
© 2013 Cisco
and/or its affiliates. All rights reserved. Cisco Confidential 10 DevOps Areas OPSDEV Area 1: extend delivery to production Area 2: extend operations feedback to project Area 3: embed project knowledge into operations Area 4: embed operations knowledge into project Patrick Debois: “Codifying devops practices”
11.
Cisco Confidential© 2013
Cisco and/or its affiliates. All rights reserved. 11 De-Fragilization
12.
© 2013 Cisco
and/or its affiliates. All rights reserved. Cisco Confidential 12 “Beauty plus pity-that is the closest we can get to a definition of art. Where there is beauty there is pity for the simple reason that beauty must die: beauty always dies, the manner dies with the matter, the world dies with the individual.” V. Nabokov, “Lecture on Metamorphosis”
13.
© 2013 Cisco
and/or its affiliates. All rights reserved. Cisco Confidential 13 DevOps Areas OPSDEV Area 1: extend delivery to production Area 2: extend operations feedback to project Area 3: embed project knowledge into operations Area 4: embed operations knowledge into project
14.
© 2013 Cisco
and/or its affiliates. All rights reserved. Cisco Confidential 14 Continuous Delivery ... to exert a constant stress on your delivery and deployment process to reduce its fragility so that releasing becomes a boring, low-risk activity. Jez Humble, “On Antifragility in Systems and Organizational Structure”
15.
Cisco Confidential© 2013
Cisco and/or its affiliates. All rights reserved. 15 Large batches increase cycle time Large batches increase variability in flow John Allspaw: “Ops Meta-Metrics”, slides 103-109
16.
Cisco Confidential© 2013
Cisco and/or its affiliates. All rights reserved. 16 Reducing batch size accelerates feedback Reducing batch size reduces overhead Reducing batch size reduces risk
17.
© 2013 Cisco
and/or its affiliates. All rights reserved. Cisco Confidential 17 Batch size and Bottlenecks Reduce batch size before you attack bottlenecks
18.
© 2013 Cisco
and/or its affiliates. All rights reserved. Cisco Confidential 18 DevOps Areas OPSDEV Area 1: extend delivery to production Area 2: extend operations feedback to project Area 3: embed project knowledge into operations Area 4: embed operations knowledge into project
19.
© 2013 Cisco
and/or its affiliates. All rights reserved. Cisco Confidential 19 “Resilience through Failure”
20.
© 2013 Cisco
and/or its affiliates. All rights reserved. Cisco Confidential 20
21.
© 2013 Cisco
and/or its affiliates. All rights reserved. Cisco Confidential 21
22.
© 2013 Cisco
and/or its affiliates. All rights reserved. Cisco Confidential 22 Resilience to failure is a lofty goal. It enables a system to survive and withstand failure. There's an even higher peak to strive for, however: making the system stronger and better with each failure. A. Tseitlin, “The Antifragile Organization” Culture of Continuous Learning
23.
© 2013 Cisco
and/or its affiliates. All rights reserved. Cisco Confidential 23 E. Deming, “Out of Crisis” “Confusing common causes with special causes will only make things worse
24.
© 2013 Cisco
and/or its affiliates. All rights reserved. Cisco Confidential 24 Resilience, Reliability, Robustness Normal Operation MTBF Failure! MTTD MTTR Max Downtime Normal Operation MTBF Max Data Lost
25.
© 2013 Cisco
and/or its affiliates. All rights reserved. Cisco Confidential 25 It’s me “Obsessive protection of the system against extremely rare events makes it more fragile. Resilience comes before the last percentiles of reliability.
26.
Cisco Confidential© 2013
Cisco and/or its affiliates. All rights reserved. 26
27.
© 2013 Cisco
and/or its affiliates. All rights reserved. Cisco Confidential 27 DevOps Areas OPSDEV Area 1: extend delivery to production Area 2: extend operations feedback to project Area 3: embed project knowledge into operations Area 4: embed operations knowledge into project
28.
© 2013 Cisco
and/or its affiliates. All rights reserved. Cisco Confidential 28 Give ‘em pagers!
29.
© 2013 Cisco
and/or its affiliates. All rights reserved. Cisco Confidential 29 “DevOps: architects, developers, QA/QC, system engineers, and IT cooperate to maximize the company value It’s me again
30.
Cisco Confidential© 2013
Cisco and/or its affiliates. All rights reserved. 30 Barbell
31.
© 2013 Cisco
and/or its affiliates. All rights reserved. Cisco Confidential 31 DevOps Areas OPSDEV Area 1: extend delivery to production Area 2: extend operations feedback to project Area 3: embed project knowledge into operations Area 4: embed operations knowledge into project
32.
© 2013 Cisco
and/or its affiliates. All rights reserved. Cisco Confidential 32John Alsspaw, “Dev and Ops Collaboration”
33.
© 2013 Cisco
and/or its affiliates. All rights reserved. Cisco Confidential 33
34.
Cisco Confidential© 2013
Cisco and/or its affiliates. All rights reserved. 34 Developers • Responding to outages, takes on-call • Alerting systems thresholding, design • Architecture design and review • Building metrics collection • Application configuration • Shipping public-facing code • Responding to outages, takes on-call • Alerting systems thresholding, design • Architecture design and review • Building metrics collection • Application configuration • Infrastructure buildout/management Operations John Allspaw, “Reply to NoOps @ Netflix”
35.
© 2013 Cisco
and/or its affiliates. All rights reserved. Cisco Confidential 35 DevOps Areas OPSDEV Area 1: extend delivery to production Area 2: extend operations feedback to project Area 3: embed project knowledge into operations Area 4: embed operations knowledge into project No, not really
36.
© 2013 Cisco
and/or its affiliates. All rights reserved. Cisco Confidential 36 Every analogy has its limit. One just needs to learn where to stop.
37.
© 2013 Cisco
and/or its affiliates. All rights reserved. Cisco Confidential 37 N. Taleb, “Antifragile” “The first step to anti-fragility consists in decreasing downside…This brings us to the solution in the form of barbell … Away from Golden Middle.
38.
© 2013 Cisco
and/or its affiliates. All rights reserved. Cisco Confidential 38 Away from golden Middle Risk Aversion Risk Loving
39.
Cisco Confidential© 2013
Cisco and/or its affiliates. All rights reserved. 39 Niek Bartholomeus, “DevOps For Dinosaurs”
40.
Cisco Confidential© 2013
Cisco and/or its affiliates. All rights reserved. 40Jeremy Edberg, “DevOps at Netflix” Risk Aversion Risk Loving
41.
© 2013 Cisco
and/or its affiliates. All rights reserved. Cisco Confidential 41 N. Taleb, “Antifragile” “The downside/lost should be known and protected, not probability
42.
© 2013 Cisco
and/or its affiliates. All rights reserved. Cisco Confidential 42 It’s me “ You never know where from your next outage or cyber attack will come from and when. The maximal downtime and maximal data lost should be known and guaranteed regardless of probabilities.
43.
© 2013 Cisco
and/or its affiliates. All rights reserved. Cisco Confidential 43 Asymmetric Pay-Offs x Gain/Lossf(x) Pain Gain
44.
© 2013 Cisco
and/or its affiliates. All rights reserved. Cisco Confidential 44 DevOps Areas OPSDEV Area 1: extend delivery to production Area 2: extend operations feedback to project Area 3: embed project knowledge into operations Area 4: embed operations knowledge into project
45.
Cisco Confidential© 2013
Cisco and/or its affiliates. All rights reserved. 45
46.
© 2013 Cisco
and/or its affiliates. All rights reserved. Cisco Confidential 46 N. Taleb “Never be sucker. Period!
47.
Thanks
Jetzt herunterladen