SlideShare ist ein Scribd-Unternehmen logo
1 von 23
dEv ops: decoding the da Vinci code using
PANCHATANTRA OF DEVOPS
BY DR SHANKAR RAMAMOORTHY
Quality business partner
Amdocs testing services
2
Information Security Level 2 – Sensitive
© 2016 – Proprietary and Confidential Information of Amdocs
Da Vinci Code
• Da Vinci Code is a 2003 mystery detective novel by Dan Brown. It follows symbologist Robert
Langdon and cryptologist Sophie Neveu after a murder in the Louvre Museum in Paris, when
they become involved in a battle between the Priory of Sion and Opus Dei over the possibility of
Jesus Christ having been married to Mary Mary Magdalene The title of the novel refers, among
other things, to the finding of the first murder victim in the Grand Gallery of the Louvre, naked and
posed like Leonardo da Vinci 's famous drawing, the Vitruvian Man with a cryptic message written
beside his body and a pentagram drawn on his chest in his own blood.
• DevOps in this presentation is being seen as complicated as Da Vinci Code in this presentation.
Cracking the code needs a story telling which has been attempted in the form of Panchatantra
where fables of Panchatantra are compared to the journey of DeVOps.
• Creating a delivery system( Systems Thinking) , with business value and delivery pipeline,
amplifying the feedback loops and learning and experimenting continuously using the pillars of
Devops namely Culture, processes and technology starts with a common story line
• Customer requirements come at short intervals, developer codes requirements and commit
changes, ongoing and automatic build in 2 hours, automatic deployments and testing on E2E prod
like environment and deploying of package on UAT E2E environment with seamless deployment to
production. Where is the mystery, I cracked this and found
“ Everything is automatic, Everything is versioned and Everything is Code AND that is the DaVinci
Code for unlocking the DevOps approach.
3
Information Security Level 2 – Sensitive
© 2016 – Proprietary and Confidential Information of Amdocs
Da Vinci Code
• Gartner predicts that by 2017, 75% of large enterprise IT organizations will go BiModal and run on
two engines, engine of stability and fluidity.One will move fast and another will have to move slow.
• With DevOps everyone is a developer and everything is code and that is the Da Vinci Code
• DevOps is quickly becoming one of the most valuable disciplines for your business. It’s focused on
improving the quality and speed of delivering new apps to market. And it’s about tightly integrating
development and operations in order to do so. The average organization adopting DevOps sees a
20 percent improvement in time-to-market, a 22 percent improvement in software quality, and a 17
percent improvement in frequency of application deployments—all leading to 22 percent more
customers and a19 percent increase in revenue
• Right from commiting a code and using P4 for version control, to Jenkins/Maestro for Orchestrator
and CI server, to using Apache Maven and Gradle for Build and using of Junit/Mockito/PowerMock
and Jasmine to test, to using Nexus for artifacts repository to SonarQube for Code metrics, Check
Marx for Security to roaring Tiger for Database and Xpi for Deployment with a Vmware serving
Environment As A Service, a whole set of CI ecosystem has challenged the old order and
Continous Delivery Model ( CDM) challenging our GDM( Global Delivery Model )
• In an application economy, every business is software business and everything is code.
4
Information Security Level 2 – Sensitive
© 2016 – Proprietary and Confidential Information of Amdocs
Panchatantra of DevOps
• The Panchatantra is a series of inter-woven colourful tales, mostly fables. According to its
introductory narration, these inter-woven tales are meant to illustrate, for the benefit of three
ignorant princes, the primary Hindu principles of nïti - "the wise conduct of life" or "prudent worldly
conduct". The three ignorant princes were DeV, QA, Ops.
• In a brief introductory narrative - Vishnu Sharma, is introduced as reciting and explaining the rest
of the work to the three young princes. The book is then divided into five parts - each of which
revolves around a main frame story, with several stories "emboxed" in it, sometimes three or four
levels deep, as one character narrating a story to another. Often, these emboxed stories snap from
each other, unexpectedly and irregularly at times, to sustain attention. Apart from the stories, the
characters are noted to quote various epigrammatic verses to illustrate their objectives.
• The journey of DevOps can be traced similar to Panchatantra where the main actors as in Dev,
QA and Ops can marry, divorce and then re marry per “ Niti” – Wise conduct of Life.
• Panchantra also explains that Niti and Sandarb ( Context) are conjoint twins and best explained by
the author as “ a new race of Context Imperial Developers and Testers”
5
Information Security Level 2 – Sensitive
© 2016 – Proprietary and Confidential Information of Amdocs
Panchatantra 1- Mitra Bheda
• The Separation of Friends (The Lion and the Bull)
The first book, which is the longest of the five books, illustrates the incidents that frequently lead to
separation of friends. It begins with a friendship between a lion king, Pingalaka, and a bull,
Sanjivaka. Two jackals, Karataka and Damanaka, are ministers of the lion who lead to breaking up
the friendship. The jackals narrate most of the thirty stories contained in this part. This book
accounts for roughly 45% of the work's length.
• Corollory: Dev and QA were together 30 years ago in EDP Departments or MIS departments of
various Government and Industrial Enterprises. Here too, the COBOL code was written, tested
and productionized into vast array of Legacy Systems. The closed systems. IV&V practice, TCOE
practice and Test Factory and Managed Test Services separated the friends.
6
Information Security Level 2 – Sensitive
© 2016 – Proprietary and Confidential Information of Amdocs
Panchatantra 2 – Mitra Labha or Mitra Samprapti
• The Gaining of Friends (The Dove, Crow, Mouse, Tortoise and Deer)
• This second book illustrates the making or gaining of friends through the friendship between a rat
and a crow, which later includes a turtle and a fawn. They collaborate to save each other to
illustrate the essence of unity and friendship. This book accounts for roughly 22% of the total
work's length.
• Corollory : Agile Practices , Agile Manifesto, Agile Culture made the warring factions colloborate to
present to customer as a single entity interwoven by spirits of Quality and Excellence
7
Information Security Level 2 – Sensitive
© 2016 – Proprietary and Confidential Information of Amdocs
Panchatantra 3: Kakolukiyam
• Of Crows and Owls (War and Peace)
The third book illustrates the art of war and the importance of peace through traditional enemies -
the crows and the owls. The book showcases the weaker crows overcoming the mightier owls by
tactfully gaining access to their secrets and vulnerabilities. This book accounts for roughly 26% of
the total work's length.
• Corollory: The testers learning scripts, Testers shifting left, Testers becoming pseudo developers.
8
Information Security Level 2 – Sensitive
© 2016 – Proprietary and Confidential Information of Amdocs
Panchatantra 4: Labdhapranasam
• Loss of Gains (The Monkey and the Crocodile)
The fourth book enlightens how gains achieved may be lost through a symbiotic friendship
between a monkey and a crocodile, who conspires to acquire the heart of the monkey. However,
the monkey gets to know of this and uses wisdom to avoid the grim fate.
• Corollory : Symbiotic friendship of Dev and QA can result in loosing of identity of Testers as a
separate species and no one knows when the “ monkey” in a tester will come to know or when the
wisdom prevails, we can see Loss of Gains taking place.
9
Information Security Level 2 – Sensitive
© 2016 – Proprietary and Confidential Information of Amdocs
Panchatantra 5: Apariksitakarakam
• ILL-Considered Actions (The Brahmani and the Mongoose)
• The fifth book revolves around the cases that are considered unacceptable through a Brahmani
and her pet mongoose. The mongoose defends her child albeit injuries, but gets punished due to
the Brahmani's misunderstanding. She later regrets having killed her friend, and her child's
saviour.
10
Information Security Level 2 – Sensitive
© 2016 – Proprietary and Confidential Information of Amdocs
Panchatantra of Success using Dev Ops
DevOps is not a product, or even a particular technology. DevOps is a methodology that unites the
often separate functions of software development (Dev) and production and operations (Ops) into a
single, integrated, and continuous process. DevOps is about breaking down the barriers between
Dev and Ops. It leverages people, processes, and technology to stimulate collaboration and
innovation across the entire software development and release process. Dev and Ops must act and
feel like they are a single team.
S.No Problem Statement Response
1
One does not discover software defects until late in
the lifecycle—or worse, in production. “Get Ops Involved Early”
2
All use Agile to speed development, but any gains
evaporate once the app goes into production.
“Automate the release of new
code into production, which
include documentation”
3
Our developers and testers are constantly waiting
to access the resources they need, causing delays.
- Dispel the mindset
“Development’s Job Is Finished
Once the App Is in Production”
4
We always pinpoint problems across development,
testing, and production operations. “Connect the three parties”
5
One sees simple human errors wreaking havoc
during development and deployment. “Carry out Service Virtualization”
11
Information Security Level 2 – Sensitive
© 2016 – Proprietary and Confidential Information of Amdocs
The value of Adopting DevOps can be
Significant
12
Information Security Level 2 – Sensitive
© 2016 – Proprietary and Confidential Information of Amdocs
To Deploy DevOps in a two-Speed IT
environment, company needs to pay attention to
13
Information Security Level 2 – Sensitive
© 2016 – Proprietary and Confidential Information of Amdocs
Case study @NetFlix-Running at two speeds
Netflix, for instance, has created a cloud-based IT architecture that allows its
developers to launch hundreds of software changes a day. Its website comprises
hundreds of micro services hosted in the cloud, and each service is maintained by
a dedicated DevOps team. Developers don’t need to request resources from the IT
operations team; instead they can automatically build pieces of code into
deployable web images. As those images are updated with new features or
services, they can be integrated with Netflix’s existing infrastructure using a
custom-built, web-based platform on which infrastructure clusters are created.
Testing is carefully done in the production environment with a subset of users. Once
the web images are live, a load-balancing technology routes part of the traffic to
them from older versions. Automated monitoring ensures that if something goes
wrong with the deployment of new images, traffic is routed back to older versions,
and the new images are rolled back. Because of this level of automation, Netflix
can deploy new code into its production environment within hours, where most
companies would need months.
14
Information Security Level 2 – Sensitive
© 2016 – Proprietary and Confidential Information of Amdocs
Managing a two-speed IT architecture
A two-speed IT architecture allows large-scale companies to accelerate the
release of innovative products and applications that could make a substantial
difference to customers while maintaining legacy IT systems that are less
innovative but still necessary for the stability of the business. This sort of
architecture emphasizes tight integration between the software applications
being developed and the hardware infrastructure supporting them. Historically
the IT operations teams maintaining software and hardware have been kept
entirely separate. But with the increasing prevalence of vertical enterprise-
resource-planning systems, the advent of network virtualization, and the
emergence of software-as-a-service models, the two sides have moved closer to
one another. These technology trends have had the effect of removing
complexity from hardware stacks and making them more accessible to software
developers.
15
Information Security Level 2 – Sensitive
© 2016 – Proprietary and Confidential Information of Amdocs
Managing a two-speed IT architecture
A two-speed environment requires that companies introduce automation tools to
support continuous delivery of software—especially in the testing and production
phases. Automation can allow for better management of, among other things,
the release of software updates, the porting of new code, and the general
processing environment. Most important, automation tools and cloud-based
technologies can serve as the bridge between legacy IT systems on the back
end and consumer-facing applications on the front end, allowing companies to
pursue seamless testing, provisioning, deployment, governance, and security of
servers and new software releases
16
Information Security Level 2 – Sensitive
© 2016 – Proprietary and Confidential Information of Amdocs
IT is possible to deploy a new code on a site
within an hour
17
Information Security Level 2 – Sensitive
© 2016 – Proprietary and Confidential Information of Amdocs
IT is possible to deploy a new code on a site
within an hour
A two-speed IT architecture conveys a number of critical advantages, but it takes
time, careful consideration, and commitment to establish. Netflix, for instance,
developed most of its cloud and automation technologies in-house, but companies
have any number of products and packages (some open source) to choose from
that can allow them to achieve similar dual-speed performance.
The most critical factor in establishing a two-speed architecture is for IT leaders to
adopt a capabilities-based view of the IT architecture, rather than a system- or
process-oriented view.
Instead, IT leaders could allocate resources toward “fast” and “slow” applications
as required—gaining the critical benefits of the DevOps approach where it is
possible to do so.
18
Information Security Level 2 – Sensitive
© 2016 – Proprietary and Confidential Information of Amdocs
Managing a two-speed IT organization
The DevOps approach challenges the established product-development
norms in most IT organizations.
Additionally, IT leaders adopting DevOps organizational models may
need to reconsider how technology partners are integrated into their
software-delivery processes—a trend that is forcing some system
vendors to consider ways to make their platforms available as a
service.
19
Information Security Level 2 – Sensitive
© 2016 – Proprietary and Confidential Information of Amdocs
Managing a two-speed IT organization
The biggest task for IT leaders is to identify those parts of the company
where the use of DevOps would make most sense—likely focusing on
those parts of the business where speed is at a premium, and where
there is a significant opportunity for the company to differentiate its
customer experience from the competition. (Think of a retailer using
DevOps to improve its website checkout experiences, or a bank offering
new fund-tracking capabilities at its site.) For those parts of the
business where DevOps might make less sense—where reliability and
resilience of software is more important than speed to market—IT
leaders will need to determine how to maintain the split between
software development and IT operations, and which roles and
processes to adapt for a culture of continuous delivery.
20
Information Security Level 2 – Sensitive
© 2016 – Proprietary and Confidential Information of Amdocs
Cross-functional teams of application-development, infrastructure-
management, and operations professionals should be convened to
streamline the ownership of stacks across the application-delivery
pipeline.
In the case of continuous delivery, for instance, a joint team would
oversee all processes (and associated tools) relating to this
development activity, such as application building, testing, and
deployment; performance management and monitoring; and
virtualization and configuration management.
Redefined roles- A generalizing Specialist
21
Information Security Level 2 – Sensitive
© 2016 – Proprietary and Confidential Information of Amdocs
Redefined Culture and Talent
In a DevOps environment they will be held responsible for the quality of their
code. They will need to know operating-system basics and must show strong
collaboration skills as they work jointly with operations engineers to determine
how best to solve application-development or deployment problems.
As a result, many companies are already modifying their recruiting practices to
hire “full stack” engineers—professionals who understand all aspects of
computing, including user interfaces, databases, and networks.
22
Information Security Level 2 – Sensitive
© 2016 – Proprietary and Confidential Information of Amdocs
Redefined processes and governance
Companies may want to look across the entire spectrum of software-delivery
processes to determine which will need to be redefined or fully automated so
that development teams can take advantage of infrastructure as a service, as
needed, and so that code can be ported into testing and production
environments in a standardized way.
For instance, Internet companies enforce “self service” for developers; teams
can test, promote, and deploy code in production environments without
requiring constant hands-on involvement from infrastructure-operations teams,
although both teams share responsibility for code performance.
23
Information Security Level 2 – Sensitive
© 2016 – Proprietary and Confidential Information of Amdocs
Thank you
• The value of implementing DevOps can
be significant with respect to both
productivity and time to market.
Knowing the Panchatantra and two
speed engine is key for driving this
vehicle to achieve Quality Goals and
better Customer Experience and
Loyalty drivers

Weitere ähnliche Inhalte

Andere mochten auch

Patterns of a "Good" Test Automation Framework, Locators & Data
Patterns of a "Good" Test Automation Framework, Locators & DataPatterns of a "Good" Test Automation Framework, Locators & Data
Patterns of a "Good" Test Automation Framework, Locators & DataAgile Testing Alliance
 
WiKi Based Automation Testing: Fitness & DevOps
WiKi Based Automation Testing: Fitness & DevOpsWiKi Based Automation Testing: Fitness & DevOps
WiKi Based Automation Testing: Fitness & DevOpsAgile Testing Alliance
 
Automation Testing Approach for Responsive Web Design
Automation Testing Approach for Responsive Web DesignAutomation Testing Approach for Responsive Web Design
Automation Testing Approach for Responsive Web DesignAgile Testing Alliance
 
50+ ways to improve tester - programmer relationship
50+ ways to improve tester - programmer relationship50+ ways to improve tester - programmer relationship
50+ ways to improve tester - programmer relationshipAgile Testing Alliance
 
The New Gives and Takes in a testers role
The New Gives and Takes in a testers role The New Gives and Takes in a testers role
The New Gives and Takes in a testers role Agile Testing Alliance
 
Amalgamation of BDD, parallel execution and mobile automation
Amalgamation of BDD, parallel execution and mobile automationAmalgamation of BDD, parallel execution and mobile automation
Amalgamation of BDD, parallel execution and mobile automationAgile Testing Alliance
 
Big Data - Hadoop and MapReduce - Aditya Garg
Big Data - Hadoop and MapReduce - Aditya GargBig Data - Hadoop and MapReduce - Aditya Garg
Big Data - Hadoop and MapReduce - Aditya GargAgile Testing Alliance
 

Andere mochten auch (19)

Patterns of a "Good" Test Automation Framework, Locators & Data
Patterns of a "Good" Test Automation Framework, Locators & DataPatterns of a "Good" Test Automation Framework, Locators & Data
Patterns of a "Good" Test Automation Framework, Locators & Data
 
Test Engagement - Vishal Prasad
Test Engagement - Vishal PrasadTest Engagement - Vishal Prasad
Test Engagement - Vishal Prasad
 
WiKi Based Automation Testing: Fitness & DevOps
WiKi Based Automation Testing: Fitness & DevOpsWiKi Based Automation Testing: Fitness & DevOps
WiKi Based Automation Testing: Fitness & DevOps
 
Automation Testing Approach for Responsive Web Design
Automation Testing Approach for Responsive Web DesignAutomation Testing Approach for Responsive Web Design
Automation Testing Approach for Responsive Web Design
 
Yahya Devqaops updated
Yahya Devqaops updated Yahya Devqaops updated
Yahya Devqaops updated
 
Using Docker for Testing - Mukta
Using Docker for Testing - MuktaUsing Docker for Testing - Mukta
Using Docker for Testing - Mukta
 
Service Virtualization - Kalpna
Service Virtualization - KalpnaService Virtualization - Kalpna
Service Virtualization - Kalpna
 
50+ ways to improve tester - programmer relationship
50+ ways to improve tester - programmer relationship50+ ways to improve tester - programmer relationship
50+ ways to improve tester - programmer relationship
 
BDD along with Continuous Integration
BDD along with Continuous IntegrationBDD along with Continuous Integration
BDD along with Continuous Integration
 
The New Gives and Takes in a testers role
The New Gives and Takes in a testers role The New Gives and Takes in a testers role
The New Gives and Takes in a testers role
 
Amalgamation of BDD, parallel execution and mobile automation
Amalgamation of BDD, parallel execution and mobile automationAmalgamation of BDD, parallel execution and mobile automation
Amalgamation of BDD, parallel execution and mobile automation
 
Big Data - Hadoop and MapReduce - Aditya Garg
Big Data - Hadoop and MapReduce - Aditya GargBig Data - Hadoop and MapReduce - Aditya Garg
Big Data - Hadoop and MapReduce - Aditya Garg
 
Digital Assurance - Today & Tomorrow
Digital Assurance - Today & TomorrowDigital Assurance - Today & Tomorrow
Digital Assurance - Today & Tomorrow
 
Demystifying Devops - Uday kumar
Demystifying Devops - Uday kumarDemystifying Devops - Uday kumar
Demystifying Devops - Uday kumar
 
Mind Wave In Testing
Mind Wave In TestingMind Wave In Testing
Mind Wave In Testing
 
#ATAGTR2016 Twitter Action
#ATAGTR2016 Twitter Action #ATAGTR2016 Twitter Action
#ATAGTR2016 Twitter Action
 
Introduction - #ATAGTR2016
Introduction - #ATAGTR2016Introduction - #ATAGTR2016
Introduction - #ATAGTR2016
 
Testing AS A Container - Irfan Ahmad
Testing AS A Container - Irfan AhmadTesting AS A Container - Irfan Ahmad
Testing AS A Container - Irfan Ahmad
 
Fidelity Test Data Management
Fidelity Test Data ManagementFidelity Test Data Management
Fidelity Test Data Management
 

Ähnlich wie Dr. shankar-dev ops-davinci_code_GTR

Breathing Data, Competing on Code
Breathing Data, Competing on CodeBreathing Data, Competing on Code
Breathing Data, Competing on CodeVenkatesh Rao
 
Hacking the Company : Risks with carbon-based lifeforms using vulnerable systems
Hacking the Company : Risks with carbon-based lifeforms using vulnerable systemsHacking the Company : Risks with carbon-based lifeforms using vulnerable systems
Hacking the Company : Risks with carbon-based lifeforms using vulnerable systemskhalavak
 
Web appc pentesting_05_2012__teasers
Web appc pentesting_05_2012__teasersWeb appc pentesting_05_2012__teasers
Web appc pentesting_05_2012__teasersAmiga Utomo
 
Honeypot seminar report
Honeypot seminar reportHoneypot seminar report
Honeypot seminar reportInder NeGi
 
WHITE PAPER▶ The Evolution of Ransomware
WHITE PAPER▶ The Evolution of RansomwareWHITE PAPER▶ The Evolution of Ransomware
WHITE PAPER▶ The Evolution of RansomwareSymantec
 
ELIMRINGI MOSHI-The Dining freemasonry (Security Protocols for Secret Societies)
ELIMRINGI MOSHI-The Dining freemasonry (Security Protocols for Secret Societies)ELIMRINGI MOSHI-The Dining freemasonry (Security Protocols for Secret Societies)
ELIMRINGI MOSHI-The Dining freemasonry (Security Protocols for Secret Societies)Elimringi Moshi
 
Ten security product categories you've (probably) never heard of
Ten security product categories you've (probably) never heard ofTen security product categories you've (probably) never heard of
Ten security product categories you've (probably) never heard ofAdrian Sanabria
 
Stranded on Infosec Island: Defending the Enterprise with Nothing but Windows...
Stranded on Infosec Island: Defending the Enterprise with Nothing but Windows...Stranded on Infosec Island: Defending the Enterprise with Nothing but Windows...
Stranded on Infosec Island: Defending the Enterprise with Nothing but Windows...Adrian Sanabria
 
pbc_devsecops_eastereggs.2022oct06.jt.pptx
pbc_devsecops_eastereggs.2022oct06.jt.pptxpbc_devsecops_eastereggs.2022oct06.jt.pptx
pbc_devsecops_eastereggs.2022oct06.jt.pptxJulie Tsai
 
us-15-Zadeh-From-False-Positives-To-Actionable-Analysis-Behavioral-Intrusion-...
us-15-Zadeh-From-False-Positives-To-Actionable-Analysis-Behavioral-Intrusion-...us-15-Zadeh-From-False-Positives-To-Actionable-Analysis-Behavioral-Intrusion-...
us-15-Zadeh-From-False-Positives-To-Actionable-Analysis-Behavioral-Intrusion-...jzadeh
 
Essay On First Day Of School - Brain. Online assignment writing service.
Essay On First Day Of School - Brain. Online assignment writing service.Essay On First Day Of School - Brain. Online assignment writing service.
Essay On First Day Of School - Brain. Online assignment writing service.Simar Neasy
 
Ransomware all locked up book
Ransomware all locked up bookRansomware all locked up book
Ransomware all locked up bookDiego Souza
 
EverSec + Cyphort: Big Trends in Cybersecurity
EverSec + Cyphort: Big Trends in CybersecurityEverSec + Cyphort: Big Trends in Cybersecurity
EverSec + Cyphort: Big Trends in CybersecurityCyphort
 
Object Oriented Programming
Object Oriented ProgrammingObject Oriented Programming
Object Oriented ProgrammingPatricia Viljoen
 
Basho and Riak at GOTO Stockholm: "Don't Use My Database."
Basho and Riak at GOTO Stockholm:  "Don't Use My Database."Basho and Riak at GOTO Stockholm:  "Don't Use My Database."
Basho and Riak at GOTO Stockholm: "Don't Use My Database."Basho Technologies
 
Grudging monkeys and microservices
Grudging monkeys and microservicesGrudging monkeys and microservices
Grudging monkeys and microservicesCarlo Sciolla
 
wp-understanding-ransomware-strategies-defeat
wp-understanding-ransomware-strategies-defeatwp-understanding-ransomware-strategies-defeat
wp-understanding-ransomware-strategies-defeatRobert Leong
 
Metasploit
MetasploitMetasploit
Metasploitninguna
 
Opsec for security researchers
Opsec for security researchersOpsec for security researchers
Opsec for security researchersvicenteDiaz_KL
 

Ähnlich wie Dr. shankar-dev ops-davinci_code_GTR (20)

Breathing Data, Competing on Code
Breathing Data, Competing on CodeBreathing Data, Competing on Code
Breathing Data, Competing on Code
 
Hacking the Company : Risks with carbon-based lifeforms using vulnerable systems
Hacking the Company : Risks with carbon-based lifeforms using vulnerable systemsHacking the Company : Risks with carbon-based lifeforms using vulnerable systems
Hacking the Company : Risks with carbon-based lifeforms using vulnerable systems
 
Web appc pentesting_05_2012__teasers
Web appc pentesting_05_2012__teasersWeb appc pentesting_05_2012__teasers
Web appc pentesting_05_2012__teasers
 
Honeypot seminar report
Honeypot seminar reportHoneypot seminar report
Honeypot seminar report
 
WHITE PAPER▶ The Evolution of Ransomware
WHITE PAPER▶ The Evolution of RansomwareWHITE PAPER▶ The Evolution of Ransomware
WHITE PAPER▶ The Evolution of Ransomware
 
ELIMRINGI MOSHI-The Dining freemasonry (Security Protocols for Secret Societies)
ELIMRINGI MOSHI-The Dining freemasonry (Security Protocols for Secret Societies)ELIMRINGI MOSHI-The Dining freemasonry (Security Protocols for Secret Societies)
ELIMRINGI MOSHI-The Dining freemasonry (Security Protocols for Secret Societies)
 
Ten security product categories you've (probably) never heard of
Ten security product categories you've (probably) never heard ofTen security product categories you've (probably) never heard of
Ten security product categories you've (probably) never heard of
 
Stranded on Infosec Island: Defending the Enterprise with Nothing but Windows...
Stranded on Infosec Island: Defending the Enterprise with Nothing but Windows...Stranded on Infosec Island: Defending the Enterprise with Nothing but Windows...
Stranded on Infosec Island: Defending the Enterprise with Nothing but Windows...
 
pbc_devsecops_eastereggs.2022oct06.jt.pptx
pbc_devsecops_eastereggs.2022oct06.jt.pptxpbc_devsecops_eastereggs.2022oct06.jt.pptx
pbc_devsecops_eastereggs.2022oct06.jt.pptx
 
us-15-Zadeh-From-False-Positives-To-Actionable-Analysis-Behavioral-Intrusion-...
us-15-Zadeh-From-False-Positives-To-Actionable-Analysis-Behavioral-Intrusion-...us-15-Zadeh-From-False-Positives-To-Actionable-Analysis-Behavioral-Intrusion-...
us-15-Zadeh-From-False-Positives-To-Actionable-Analysis-Behavioral-Intrusion-...
 
Essay On First Day Of School - Brain. Online assignment writing service.
Essay On First Day Of School - Brain. Online assignment writing service.Essay On First Day Of School - Brain. Online assignment writing service.
Essay On First Day Of School - Brain. Online assignment writing service.
 
Ransomware all locked up book
Ransomware all locked up bookRansomware all locked up book
Ransomware all locked up book
 
Ka3118541860
Ka3118541860Ka3118541860
Ka3118541860
 
EverSec + Cyphort: Big Trends in Cybersecurity
EverSec + Cyphort: Big Trends in CybersecurityEverSec + Cyphort: Big Trends in Cybersecurity
EverSec + Cyphort: Big Trends in Cybersecurity
 
Object Oriented Programming
Object Oriented ProgrammingObject Oriented Programming
Object Oriented Programming
 
Basho and Riak at GOTO Stockholm: "Don't Use My Database."
Basho and Riak at GOTO Stockholm:  "Don't Use My Database."Basho and Riak at GOTO Stockholm:  "Don't Use My Database."
Basho and Riak at GOTO Stockholm: "Don't Use My Database."
 
Grudging monkeys and microservices
Grudging monkeys and microservicesGrudging monkeys and microservices
Grudging monkeys and microservices
 
wp-understanding-ransomware-strategies-defeat
wp-understanding-ransomware-strategies-defeatwp-understanding-ransomware-strategies-defeat
wp-understanding-ransomware-strategies-defeat
 
Metasploit
MetasploitMetasploit
Metasploit
 
Opsec for security researchers
Opsec for security researchersOpsec for security researchers
Opsec for security researchers
 

Mehr von Agile Testing Alliance

#Interactive Session by Anindita Rath and Mahathee Dandibhotla, "From Good to...
#Interactive Session by Anindita Rath and Mahathee Dandibhotla, "From Good to...#Interactive Session by Anindita Rath and Mahathee Dandibhotla, "From Good to...
#Interactive Session by Anindita Rath and Mahathee Dandibhotla, "From Good to...Agile Testing Alliance
 
#Interactive Session by Ajay Balamurugadas, "Where Are The Real Testers In T...
#Interactive Session by  Ajay Balamurugadas, "Where Are The Real Testers In T...#Interactive Session by  Ajay Balamurugadas, "Where Are The Real Testers In T...
#Interactive Session by Ajay Balamurugadas, "Where Are The Real Testers In T...Agile Testing Alliance
 
#Interactive Session by Jishnu Nambiar and Mayur Ovhal, "Monitoring Web Per...
#Interactive Session by  Jishnu Nambiar and  Mayur Ovhal, "Monitoring Web Per...#Interactive Session by  Jishnu Nambiar and  Mayur Ovhal, "Monitoring Web Per...
#Interactive Session by Jishnu Nambiar and Mayur Ovhal, "Monitoring Web Per...Agile Testing Alliance
 
#Interactive Session by Pradipta Biswas and Sucheta Saurabh Chitale, "Navigat...
#Interactive Session by Pradipta Biswas and Sucheta Saurabh Chitale, "Navigat...#Interactive Session by Pradipta Biswas and Sucheta Saurabh Chitale, "Navigat...
#Interactive Session by Pradipta Biswas and Sucheta Saurabh Chitale, "Navigat...Agile Testing Alliance
 
#Interactive Session by Apoorva Ram, "The Art of Storytelling for Testers" at...
#Interactive Session by Apoorva Ram, "The Art of Storytelling for Testers" at...#Interactive Session by Apoorva Ram, "The Art of Storytelling for Testers" at...
#Interactive Session by Apoorva Ram, "The Art of Storytelling for Testers" at...Agile Testing Alliance
 
#Interactive Session by Nikhil Jain, "Catch All Mail With Graph" at #ATAGTR2023.
#Interactive Session by Nikhil Jain, "Catch All Mail With Graph" at #ATAGTR2023.#Interactive Session by Nikhil Jain, "Catch All Mail With Graph" at #ATAGTR2023.
#Interactive Session by Nikhil Jain, "Catch All Mail With Graph" at #ATAGTR2023.Agile Testing Alliance
 
#Interactive Session by Ashok Kumar S, "Test Data the key to robust test cove...
#Interactive Session by Ashok Kumar S, "Test Data the key to robust test cove...#Interactive Session by Ashok Kumar S, "Test Data the key to robust test cove...
#Interactive Session by Ashok Kumar S, "Test Data the key to robust test cove...Agile Testing Alliance
 
#Interactive Session by Seema Kohli, "Test Leadership in the Era of Artificia...
#Interactive Session by Seema Kohli, "Test Leadership in the Era of Artificia...#Interactive Session by Seema Kohli, "Test Leadership in the Era of Artificia...
#Interactive Session by Seema Kohli, "Test Leadership in the Era of Artificia...Agile Testing Alliance
 
#Interactive Session by Ashwini Lalit, RRR of Test Automation Maintenance" at...
#Interactive Session by Ashwini Lalit, RRR of Test Automation Maintenance" at...#Interactive Session by Ashwini Lalit, RRR of Test Automation Maintenance" at...
#Interactive Session by Ashwini Lalit, RRR of Test Automation Maintenance" at...Agile Testing Alliance
 
#Interactive Session by Srithanga Aishvarya T, "Machine Learning Model to aut...
#Interactive Session by Srithanga Aishvarya T, "Machine Learning Model to aut...#Interactive Session by Srithanga Aishvarya T, "Machine Learning Model to aut...
#Interactive Session by Srithanga Aishvarya T, "Machine Learning Model to aut...Agile Testing Alliance
 
#Interactive Session by Kirti Ranjan Satapathy and Nandini K, "Elements of Qu...
#Interactive Session by Kirti Ranjan Satapathy and Nandini K, "Elements of Qu...#Interactive Session by Kirti Ranjan Satapathy and Nandini K, "Elements of Qu...
#Interactive Session by Kirti Ranjan Satapathy and Nandini K, "Elements of Qu...Agile Testing Alliance
 
#Interactive Session by Sudhir Upadhyay and Ashish Kumar, "Strengthening Test...
#Interactive Session by Sudhir Upadhyay and Ashish Kumar, "Strengthening Test...#Interactive Session by Sudhir Upadhyay and Ashish Kumar, "Strengthening Test...
#Interactive Session by Sudhir Upadhyay and Ashish Kumar, "Strengthening Test...Agile Testing Alliance
 
#Interactive Session by Sayan Deb Kundu, "Testing Gen AI Applications" at #AT...
#Interactive Session by Sayan Deb Kundu, "Testing Gen AI Applications" at #AT...#Interactive Session by Sayan Deb Kundu, "Testing Gen AI Applications" at #AT...
#Interactive Session by Sayan Deb Kundu, "Testing Gen AI Applications" at #AT...Agile Testing Alliance
 
#Interactive Session by Dinesh Boravke, "Zero Defects – Myth or Reality" at #...
#Interactive Session by Dinesh Boravke, "Zero Defects – Myth or Reality" at #...#Interactive Session by Dinesh Boravke, "Zero Defects – Myth or Reality" at #...
#Interactive Session by Dinesh Boravke, "Zero Defects – Myth or Reality" at #...Agile Testing Alliance
 
#Interactive Session by Saby Saurabh Bhardwaj, "Redefine Quality Assurance –...
#Interactive Session by  Saby Saurabh Bhardwaj, "Redefine Quality Assurance –...#Interactive Session by  Saby Saurabh Bhardwaj, "Redefine Quality Assurance –...
#Interactive Session by Saby Saurabh Bhardwaj, "Redefine Quality Assurance –...Agile Testing Alliance
 
#Keynote Session by Sanjay Kumar, "Innovation Inspired Testing!!" at #ATAGTR2...
#Keynote Session by Sanjay Kumar, "Innovation Inspired Testing!!" at #ATAGTR2...#Keynote Session by Sanjay Kumar, "Innovation Inspired Testing!!" at #ATAGTR2...
#Keynote Session by Sanjay Kumar, "Innovation Inspired Testing!!" at #ATAGTR2...Agile Testing Alliance
 
#Keynote Session by Schalk Cronje, "Don’t Containerize me" at #ATAGTR2023.
#Keynote Session by Schalk Cronje, "Don’t Containerize me" at #ATAGTR2023.#Keynote Session by Schalk Cronje, "Don’t Containerize me" at #ATAGTR2023.
#Keynote Session by Schalk Cronje, "Don’t Containerize me" at #ATAGTR2023.Agile Testing Alliance
 
#Interactive Session by Chidambaram Vetrivel and Venkatesh Belde, "Revolution...
#Interactive Session by Chidambaram Vetrivel and Venkatesh Belde, "Revolution...#Interactive Session by Chidambaram Vetrivel and Venkatesh Belde, "Revolution...
#Interactive Session by Chidambaram Vetrivel and Venkatesh Belde, "Revolution...Agile Testing Alliance
 
#Interactive Session by Aniket Diwakar Kadukar and Padimiti Vaidik Eswar Dat...
#Interactive Session by Aniket Diwakar Kadukar and  Padimiti Vaidik Eswar Dat...#Interactive Session by Aniket Diwakar Kadukar and  Padimiti Vaidik Eswar Dat...
#Interactive Session by Aniket Diwakar Kadukar and Padimiti Vaidik Eswar Dat...Agile Testing Alliance
 
#Interactive Session by Vivek Patle and Jahnavi Umarji, "Empowering Functiona...
#Interactive Session by Vivek Patle and Jahnavi Umarji, "Empowering Functiona...#Interactive Session by Vivek Patle and Jahnavi Umarji, "Empowering Functiona...
#Interactive Session by Vivek Patle and Jahnavi Umarji, "Empowering Functiona...Agile Testing Alliance
 

Mehr von Agile Testing Alliance (20)

#Interactive Session by Anindita Rath and Mahathee Dandibhotla, "From Good to...
#Interactive Session by Anindita Rath and Mahathee Dandibhotla, "From Good to...#Interactive Session by Anindita Rath and Mahathee Dandibhotla, "From Good to...
#Interactive Session by Anindita Rath and Mahathee Dandibhotla, "From Good to...
 
#Interactive Session by Ajay Balamurugadas, "Where Are The Real Testers In T...
#Interactive Session by  Ajay Balamurugadas, "Where Are The Real Testers In T...#Interactive Session by  Ajay Balamurugadas, "Where Are The Real Testers In T...
#Interactive Session by Ajay Balamurugadas, "Where Are The Real Testers In T...
 
#Interactive Session by Jishnu Nambiar and Mayur Ovhal, "Monitoring Web Per...
#Interactive Session by  Jishnu Nambiar and  Mayur Ovhal, "Monitoring Web Per...#Interactive Session by  Jishnu Nambiar and  Mayur Ovhal, "Monitoring Web Per...
#Interactive Session by Jishnu Nambiar and Mayur Ovhal, "Monitoring Web Per...
 
#Interactive Session by Pradipta Biswas and Sucheta Saurabh Chitale, "Navigat...
#Interactive Session by Pradipta Biswas and Sucheta Saurabh Chitale, "Navigat...#Interactive Session by Pradipta Biswas and Sucheta Saurabh Chitale, "Navigat...
#Interactive Session by Pradipta Biswas and Sucheta Saurabh Chitale, "Navigat...
 
#Interactive Session by Apoorva Ram, "The Art of Storytelling for Testers" at...
#Interactive Session by Apoorva Ram, "The Art of Storytelling for Testers" at...#Interactive Session by Apoorva Ram, "The Art of Storytelling for Testers" at...
#Interactive Session by Apoorva Ram, "The Art of Storytelling for Testers" at...
 
#Interactive Session by Nikhil Jain, "Catch All Mail With Graph" at #ATAGTR2023.
#Interactive Session by Nikhil Jain, "Catch All Mail With Graph" at #ATAGTR2023.#Interactive Session by Nikhil Jain, "Catch All Mail With Graph" at #ATAGTR2023.
#Interactive Session by Nikhil Jain, "Catch All Mail With Graph" at #ATAGTR2023.
 
#Interactive Session by Ashok Kumar S, "Test Data the key to robust test cove...
#Interactive Session by Ashok Kumar S, "Test Data the key to robust test cove...#Interactive Session by Ashok Kumar S, "Test Data the key to robust test cove...
#Interactive Session by Ashok Kumar S, "Test Data the key to robust test cove...
 
#Interactive Session by Seema Kohli, "Test Leadership in the Era of Artificia...
#Interactive Session by Seema Kohli, "Test Leadership in the Era of Artificia...#Interactive Session by Seema Kohli, "Test Leadership in the Era of Artificia...
#Interactive Session by Seema Kohli, "Test Leadership in the Era of Artificia...
 
#Interactive Session by Ashwini Lalit, RRR of Test Automation Maintenance" at...
#Interactive Session by Ashwini Lalit, RRR of Test Automation Maintenance" at...#Interactive Session by Ashwini Lalit, RRR of Test Automation Maintenance" at...
#Interactive Session by Ashwini Lalit, RRR of Test Automation Maintenance" at...
 
#Interactive Session by Srithanga Aishvarya T, "Machine Learning Model to aut...
#Interactive Session by Srithanga Aishvarya T, "Machine Learning Model to aut...#Interactive Session by Srithanga Aishvarya T, "Machine Learning Model to aut...
#Interactive Session by Srithanga Aishvarya T, "Machine Learning Model to aut...
 
#Interactive Session by Kirti Ranjan Satapathy and Nandini K, "Elements of Qu...
#Interactive Session by Kirti Ranjan Satapathy and Nandini K, "Elements of Qu...#Interactive Session by Kirti Ranjan Satapathy and Nandini K, "Elements of Qu...
#Interactive Session by Kirti Ranjan Satapathy and Nandini K, "Elements of Qu...
 
#Interactive Session by Sudhir Upadhyay and Ashish Kumar, "Strengthening Test...
#Interactive Session by Sudhir Upadhyay and Ashish Kumar, "Strengthening Test...#Interactive Session by Sudhir Upadhyay and Ashish Kumar, "Strengthening Test...
#Interactive Session by Sudhir Upadhyay and Ashish Kumar, "Strengthening Test...
 
#Interactive Session by Sayan Deb Kundu, "Testing Gen AI Applications" at #AT...
#Interactive Session by Sayan Deb Kundu, "Testing Gen AI Applications" at #AT...#Interactive Session by Sayan Deb Kundu, "Testing Gen AI Applications" at #AT...
#Interactive Session by Sayan Deb Kundu, "Testing Gen AI Applications" at #AT...
 
#Interactive Session by Dinesh Boravke, "Zero Defects – Myth or Reality" at #...
#Interactive Session by Dinesh Boravke, "Zero Defects – Myth or Reality" at #...#Interactive Session by Dinesh Boravke, "Zero Defects – Myth or Reality" at #...
#Interactive Session by Dinesh Boravke, "Zero Defects – Myth or Reality" at #...
 
#Interactive Session by Saby Saurabh Bhardwaj, "Redefine Quality Assurance –...
#Interactive Session by  Saby Saurabh Bhardwaj, "Redefine Quality Assurance –...#Interactive Session by  Saby Saurabh Bhardwaj, "Redefine Quality Assurance –...
#Interactive Session by Saby Saurabh Bhardwaj, "Redefine Quality Assurance –...
 
#Keynote Session by Sanjay Kumar, "Innovation Inspired Testing!!" at #ATAGTR2...
#Keynote Session by Sanjay Kumar, "Innovation Inspired Testing!!" at #ATAGTR2...#Keynote Session by Sanjay Kumar, "Innovation Inspired Testing!!" at #ATAGTR2...
#Keynote Session by Sanjay Kumar, "Innovation Inspired Testing!!" at #ATAGTR2...
 
#Keynote Session by Schalk Cronje, "Don’t Containerize me" at #ATAGTR2023.
#Keynote Session by Schalk Cronje, "Don’t Containerize me" at #ATAGTR2023.#Keynote Session by Schalk Cronje, "Don’t Containerize me" at #ATAGTR2023.
#Keynote Session by Schalk Cronje, "Don’t Containerize me" at #ATAGTR2023.
 
#Interactive Session by Chidambaram Vetrivel and Venkatesh Belde, "Revolution...
#Interactive Session by Chidambaram Vetrivel and Venkatesh Belde, "Revolution...#Interactive Session by Chidambaram Vetrivel and Venkatesh Belde, "Revolution...
#Interactive Session by Chidambaram Vetrivel and Venkatesh Belde, "Revolution...
 
#Interactive Session by Aniket Diwakar Kadukar and Padimiti Vaidik Eswar Dat...
#Interactive Session by Aniket Diwakar Kadukar and  Padimiti Vaidik Eswar Dat...#Interactive Session by Aniket Diwakar Kadukar and  Padimiti Vaidik Eswar Dat...
#Interactive Session by Aniket Diwakar Kadukar and Padimiti Vaidik Eswar Dat...
 
#Interactive Session by Vivek Patle and Jahnavi Umarji, "Empowering Functiona...
#Interactive Session by Vivek Patle and Jahnavi Umarji, "Empowering Functiona...#Interactive Session by Vivek Patle and Jahnavi Umarji, "Empowering Functiona...
#Interactive Session by Vivek Patle and Jahnavi Umarji, "Empowering Functiona...
 

Kürzlich hochgeladen

The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 

Kürzlich hochgeladen (20)

The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 

Dr. shankar-dev ops-davinci_code_GTR

  • 1. dEv ops: decoding the da Vinci code using PANCHATANTRA OF DEVOPS BY DR SHANKAR RAMAMOORTHY Quality business partner Amdocs testing services
  • 2. 2 Information Security Level 2 – Sensitive © 2016 – Proprietary and Confidential Information of Amdocs Da Vinci Code • Da Vinci Code is a 2003 mystery detective novel by Dan Brown. It follows symbologist Robert Langdon and cryptologist Sophie Neveu after a murder in the Louvre Museum in Paris, when they become involved in a battle between the Priory of Sion and Opus Dei over the possibility of Jesus Christ having been married to Mary Mary Magdalene The title of the novel refers, among other things, to the finding of the first murder victim in the Grand Gallery of the Louvre, naked and posed like Leonardo da Vinci 's famous drawing, the Vitruvian Man with a cryptic message written beside his body and a pentagram drawn on his chest in his own blood. • DevOps in this presentation is being seen as complicated as Da Vinci Code in this presentation. Cracking the code needs a story telling which has been attempted in the form of Panchatantra where fables of Panchatantra are compared to the journey of DeVOps. • Creating a delivery system( Systems Thinking) , with business value and delivery pipeline, amplifying the feedback loops and learning and experimenting continuously using the pillars of Devops namely Culture, processes and technology starts with a common story line • Customer requirements come at short intervals, developer codes requirements and commit changes, ongoing and automatic build in 2 hours, automatic deployments and testing on E2E prod like environment and deploying of package on UAT E2E environment with seamless deployment to production. Where is the mystery, I cracked this and found “ Everything is automatic, Everything is versioned and Everything is Code AND that is the DaVinci Code for unlocking the DevOps approach.
  • 3. 3 Information Security Level 2 – Sensitive © 2016 – Proprietary and Confidential Information of Amdocs Da Vinci Code • Gartner predicts that by 2017, 75% of large enterprise IT organizations will go BiModal and run on two engines, engine of stability and fluidity.One will move fast and another will have to move slow. • With DevOps everyone is a developer and everything is code and that is the Da Vinci Code • DevOps is quickly becoming one of the most valuable disciplines for your business. It’s focused on improving the quality and speed of delivering new apps to market. And it’s about tightly integrating development and operations in order to do so. The average organization adopting DevOps sees a 20 percent improvement in time-to-market, a 22 percent improvement in software quality, and a 17 percent improvement in frequency of application deployments—all leading to 22 percent more customers and a19 percent increase in revenue • Right from commiting a code and using P4 for version control, to Jenkins/Maestro for Orchestrator and CI server, to using Apache Maven and Gradle for Build and using of Junit/Mockito/PowerMock and Jasmine to test, to using Nexus for artifacts repository to SonarQube for Code metrics, Check Marx for Security to roaring Tiger for Database and Xpi for Deployment with a Vmware serving Environment As A Service, a whole set of CI ecosystem has challenged the old order and Continous Delivery Model ( CDM) challenging our GDM( Global Delivery Model ) • In an application economy, every business is software business and everything is code.
  • 4. 4 Information Security Level 2 – Sensitive © 2016 – Proprietary and Confidential Information of Amdocs Panchatantra of DevOps • The Panchatantra is a series of inter-woven colourful tales, mostly fables. According to its introductory narration, these inter-woven tales are meant to illustrate, for the benefit of three ignorant princes, the primary Hindu principles of nïti - "the wise conduct of life" or "prudent worldly conduct". The three ignorant princes were DeV, QA, Ops. • In a brief introductory narrative - Vishnu Sharma, is introduced as reciting and explaining the rest of the work to the three young princes. The book is then divided into five parts - each of which revolves around a main frame story, with several stories "emboxed" in it, sometimes three or four levels deep, as one character narrating a story to another. Often, these emboxed stories snap from each other, unexpectedly and irregularly at times, to sustain attention. Apart from the stories, the characters are noted to quote various epigrammatic verses to illustrate their objectives. • The journey of DevOps can be traced similar to Panchatantra where the main actors as in Dev, QA and Ops can marry, divorce and then re marry per “ Niti” – Wise conduct of Life. • Panchantra also explains that Niti and Sandarb ( Context) are conjoint twins and best explained by the author as “ a new race of Context Imperial Developers and Testers”
  • 5. 5 Information Security Level 2 – Sensitive © 2016 – Proprietary and Confidential Information of Amdocs Panchatantra 1- Mitra Bheda • The Separation of Friends (The Lion and the Bull) The first book, which is the longest of the five books, illustrates the incidents that frequently lead to separation of friends. It begins with a friendship between a lion king, Pingalaka, and a bull, Sanjivaka. Two jackals, Karataka and Damanaka, are ministers of the lion who lead to breaking up the friendship. The jackals narrate most of the thirty stories contained in this part. This book accounts for roughly 45% of the work's length. • Corollory: Dev and QA were together 30 years ago in EDP Departments or MIS departments of various Government and Industrial Enterprises. Here too, the COBOL code was written, tested and productionized into vast array of Legacy Systems. The closed systems. IV&V practice, TCOE practice and Test Factory and Managed Test Services separated the friends.
  • 6. 6 Information Security Level 2 – Sensitive © 2016 – Proprietary and Confidential Information of Amdocs Panchatantra 2 – Mitra Labha or Mitra Samprapti • The Gaining of Friends (The Dove, Crow, Mouse, Tortoise and Deer) • This second book illustrates the making or gaining of friends through the friendship between a rat and a crow, which later includes a turtle and a fawn. They collaborate to save each other to illustrate the essence of unity and friendship. This book accounts for roughly 22% of the total work's length. • Corollory : Agile Practices , Agile Manifesto, Agile Culture made the warring factions colloborate to present to customer as a single entity interwoven by spirits of Quality and Excellence
  • 7. 7 Information Security Level 2 – Sensitive © 2016 – Proprietary and Confidential Information of Amdocs Panchatantra 3: Kakolukiyam • Of Crows and Owls (War and Peace) The third book illustrates the art of war and the importance of peace through traditional enemies - the crows and the owls. The book showcases the weaker crows overcoming the mightier owls by tactfully gaining access to their secrets and vulnerabilities. This book accounts for roughly 26% of the total work's length. • Corollory: The testers learning scripts, Testers shifting left, Testers becoming pseudo developers.
  • 8. 8 Information Security Level 2 – Sensitive © 2016 – Proprietary and Confidential Information of Amdocs Panchatantra 4: Labdhapranasam • Loss of Gains (The Monkey and the Crocodile) The fourth book enlightens how gains achieved may be lost through a symbiotic friendship between a monkey and a crocodile, who conspires to acquire the heart of the monkey. However, the monkey gets to know of this and uses wisdom to avoid the grim fate. • Corollory : Symbiotic friendship of Dev and QA can result in loosing of identity of Testers as a separate species and no one knows when the “ monkey” in a tester will come to know or when the wisdom prevails, we can see Loss of Gains taking place.
  • 9. 9 Information Security Level 2 – Sensitive © 2016 – Proprietary and Confidential Information of Amdocs Panchatantra 5: Apariksitakarakam • ILL-Considered Actions (The Brahmani and the Mongoose) • The fifth book revolves around the cases that are considered unacceptable through a Brahmani and her pet mongoose. The mongoose defends her child albeit injuries, but gets punished due to the Brahmani's misunderstanding. She later regrets having killed her friend, and her child's saviour.
  • 10. 10 Information Security Level 2 – Sensitive © 2016 – Proprietary and Confidential Information of Amdocs Panchatantra of Success using Dev Ops DevOps is not a product, or even a particular technology. DevOps is a methodology that unites the often separate functions of software development (Dev) and production and operations (Ops) into a single, integrated, and continuous process. DevOps is about breaking down the barriers between Dev and Ops. It leverages people, processes, and technology to stimulate collaboration and innovation across the entire software development and release process. Dev and Ops must act and feel like they are a single team. S.No Problem Statement Response 1 One does not discover software defects until late in the lifecycle—or worse, in production. “Get Ops Involved Early” 2 All use Agile to speed development, but any gains evaporate once the app goes into production. “Automate the release of new code into production, which include documentation” 3 Our developers and testers are constantly waiting to access the resources they need, causing delays. - Dispel the mindset “Development’s Job Is Finished Once the App Is in Production” 4 We always pinpoint problems across development, testing, and production operations. “Connect the three parties” 5 One sees simple human errors wreaking havoc during development and deployment. “Carry out Service Virtualization”
  • 11. 11 Information Security Level 2 – Sensitive © 2016 – Proprietary and Confidential Information of Amdocs The value of Adopting DevOps can be Significant
  • 12. 12 Information Security Level 2 – Sensitive © 2016 – Proprietary and Confidential Information of Amdocs To Deploy DevOps in a two-Speed IT environment, company needs to pay attention to
  • 13. 13 Information Security Level 2 – Sensitive © 2016 – Proprietary and Confidential Information of Amdocs Case study @NetFlix-Running at two speeds Netflix, for instance, has created a cloud-based IT architecture that allows its developers to launch hundreds of software changes a day. Its website comprises hundreds of micro services hosted in the cloud, and each service is maintained by a dedicated DevOps team. Developers don’t need to request resources from the IT operations team; instead they can automatically build pieces of code into deployable web images. As those images are updated with new features or services, they can be integrated with Netflix’s existing infrastructure using a custom-built, web-based platform on which infrastructure clusters are created. Testing is carefully done in the production environment with a subset of users. Once the web images are live, a load-balancing technology routes part of the traffic to them from older versions. Automated monitoring ensures that if something goes wrong with the deployment of new images, traffic is routed back to older versions, and the new images are rolled back. Because of this level of automation, Netflix can deploy new code into its production environment within hours, where most companies would need months.
  • 14. 14 Information Security Level 2 – Sensitive © 2016 – Proprietary and Confidential Information of Amdocs Managing a two-speed IT architecture A two-speed IT architecture allows large-scale companies to accelerate the release of innovative products and applications that could make a substantial difference to customers while maintaining legacy IT systems that are less innovative but still necessary for the stability of the business. This sort of architecture emphasizes tight integration between the software applications being developed and the hardware infrastructure supporting them. Historically the IT operations teams maintaining software and hardware have been kept entirely separate. But with the increasing prevalence of vertical enterprise- resource-planning systems, the advent of network virtualization, and the emergence of software-as-a-service models, the two sides have moved closer to one another. These technology trends have had the effect of removing complexity from hardware stacks and making them more accessible to software developers.
  • 15. 15 Information Security Level 2 – Sensitive © 2016 – Proprietary and Confidential Information of Amdocs Managing a two-speed IT architecture A two-speed environment requires that companies introduce automation tools to support continuous delivery of software—especially in the testing and production phases. Automation can allow for better management of, among other things, the release of software updates, the porting of new code, and the general processing environment. Most important, automation tools and cloud-based technologies can serve as the bridge between legacy IT systems on the back end and consumer-facing applications on the front end, allowing companies to pursue seamless testing, provisioning, deployment, governance, and security of servers and new software releases
  • 16. 16 Information Security Level 2 – Sensitive © 2016 – Proprietary and Confidential Information of Amdocs IT is possible to deploy a new code on a site within an hour
  • 17. 17 Information Security Level 2 – Sensitive © 2016 – Proprietary and Confidential Information of Amdocs IT is possible to deploy a new code on a site within an hour A two-speed IT architecture conveys a number of critical advantages, but it takes time, careful consideration, and commitment to establish. Netflix, for instance, developed most of its cloud and automation technologies in-house, but companies have any number of products and packages (some open source) to choose from that can allow them to achieve similar dual-speed performance. The most critical factor in establishing a two-speed architecture is for IT leaders to adopt a capabilities-based view of the IT architecture, rather than a system- or process-oriented view. Instead, IT leaders could allocate resources toward “fast” and “slow” applications as required—gaining the critical benefits of the DevOps approach where it is possible to do so.
  • 18. 18 Information Security Level 2 – Sensitive © 2016 – Proprietary and Confidential Information of Amdocs Managing a two-speed IT organization The DevOps approach challenges the established product-development norms in most IT organizations. Additionally, IT leaders adopting DevOps organizational models may need to reconsider how technology partners are integrated into their software-delivery processes—a trend that is forcing some system vendors to consider ways to make their platforms available as a service.
  • 19. 19 Information Security Level 2 – Sensitive © 2016 – Proprietary and Confidential Information of Amdocs Managing a two-speed IT organization The biggest task for IT leaders is to identify those parts of the company where the use of DevOps would make most sense—likely focusing on those parts of the business where speed is at a premium, and where there is a significant opportunity for the company to differentiate its customer experience from the competition. (Think of a retailer using DevOps to improve its website checkout experiences, or a bank offering new fund-tracking capabilities at its site.) For those parts of the business where DevOps might make less sense—where reliability and resilience of software is more important than speed to market—IT leaders will need to determine how to maintain the split between software development and IT operations, and which roles and processes to adapt for a culture of continuous delivery.
  • 20. 20 Information Security Level 2 – Sensitive © 2016 – Proprietary and Confidential Information of Amdocs Cross-functional teams of application-development, infrastructure- management, and operations professionals should be convened to streamline the ownership of stacks across the application-delivery pipeline. In the case of continuous delivery, for instance, a joint team would oversee all processes (and associated tools) relating to this development activity, such as application building, testing, and deployment; performance management and monitoring; and virtualization and configuration management. Redefined roles- A generalizing Specialist
  • 21. 21 Information Security Level 2 – Sensitive © 2016 – Proprietary and Confidential Information of Amdocs Redefined Culture and Talent In a DevOps environment they will be held responsible for the quality of their code. They will need to know operating-system basics and must show strong collaboration skills as they work jointly with operations engineers to determine how best to solve application-development or deployment problems. As a result, many companies are already modifying their recruiting practices to hire “full stack” engineers—professionals who understand all aspects of computing, including user interfaces, databases, and networks.
  • 22. 22 Information Security Level 2 – Sensitive © 2016 – Proprietary and Confidential Information of Amdocs Redefined processes and governance Companies may want to look across the entire spectrum of software-delivery processes to determine which will need to be redefined or fully automated so that development teams can take advantage of infrastructure as a service, as needed, and so that code can be ported into testing and production environments in a standardized way. For instance, Internet companies enforce “self service” for developers; teams can test, promote, and deploy code in production environments without requiring constant hands-on involvement from infrastructure-operations teams, although both teams share responsibility for code performance.
  • 23. 23 Information Security Level 2 – Sensitive © 2016 – Proprietary and Confidential Information of Amdocs Thank you • The value of implementing DevOps can be significant with respect to both productivity and time to market. Knowing the Panchatantra and two speed engine is key for driving this vehicle to achieve Quality Goals and better Customer Experience and Loyalty drivers