SlideShare una empresa de Scribd logo
1 de 10
Descargar para leer sin conexión
GOING BIG AND F*#&#*G UP
A Cautionary Tale
@mikebaukes

1
THE BUSINESS

s
p d
O e
v Disruption
MarketWide ov
e r
D p
p
A

A History of Success

A New Market in 9 months 

2
THE PROJECT
Funding a DevOps initiative using "risk”

y
t
i
r s
What do we have? cu p
e O
S ev
/ of production?
k
Is it representative D
is e
R v
lo
Are we at risk?

3
COMPANY CULTURE
Teams Spread across Geographies and Organization Charts

Average Request fulfillment was around 2 weeks

Rife with process debt

4
TEAM CULTURE
We recruited the best
Immediately Caused Tension
Elitism & Arrogance began to grow

5
THE PROCESSES
Risk = MS/DE Sign-offs
Project Managers = Test Results/Environment Documentation
SDLC = VC Inf/Repeatable Env

ITIL = DSL/DML/CMDB & ST

Architecture = TRM/Enterprise Continuum
Automation using Chef

6
TECHNICAL DEBT
10 Environments, Multiple Stage Gates (2 weeks)
90% on Writing Code, 10% on education
Split in 2 groups (newbies/old-school)
Knowledge Vacuum

7
PROGRESSION/REGRESSION

8
LESSONS
1. Empathy
2. Get the Data!
3. DevOps is an HCM issue WTF?
4. In production and not in dev means #fail

9
@mikebaukes
THANKS

@scriptrock

@devops

10

Más contenido relacionado

Similar a Cautionary tale of going big with DevOps too fast

Similar a Cautionary tale of going big with DevOps too fast (20)

Critical Chain Basics
Critical Chain BasicsCritical Chain Basics
Critical Chain Basics
 
Artem Shapoval. Delivery Manager: Myths and Facts
Artem Shapoval. Delivery Manager: Myths and FactsArtem Shapoval. Delivery Manager: Myths and Facts
Artem Shapoval. Delivery Manager: Myths and Facts
 
CV-Lite_Ugo Gregorio LACOPO vJuly 17
CV-Lite_Ugo Gregorio LACOPO vJuly 17CV-Lite_Ugo Gregorio LACOPO vJuly 17
CV-Lite_Ugo Gregorio LACOPO vJuly 17
 
Sivaprasad_resume
Sivaprasad_resumeSivaprasad_resume
Sivaprasad_resume
 
From 0 To Cross-Device by Vytautas Jakštys | Product Management Vilnius
From 0 To Cross-Device by Vytautas Jakštys | Product Management VilniusFrom 0 To Cross-Device by Vytautas Jakštys | Product Management Vilnius
From 0 To Cross-Device by Vytautas Jakštys | Product Management Vilnius
 
GOWTHAM_resume
GOWTHAM_resumeGOWTHAM_resume
GOWTHAM_resume
 
brian callan curriculum vitae
brian callan curriculum vitaebrian callan curriculum vitae
brian callan curriculum vitae
 
GK CV-ELV ENGR.
GK CV-ELV ENGR.GK CV-ELV ENGR.
GK CV-ELV ENGR.
 
Boat enviromentalist
Boat enviromentalistBoat enviromentalist
Boat enviromentalist
 
CV-Lite_Ugo Gregorio LACOPO 2016
CV-Lite_Ugo Gregorio LACOPO 2016CV-Lite_Ugo Gregorio LACOPO 2016
CV-Lite_Ugo Gregorio LACOPO 2016
 
CV-LauriTihinen-Base-03
CV-LauriTihinen-Base-03CV-LauriTihinen-Base-03
CV-LauriTihinen-Base-03
 
Ajay_Resume
Ajay_ResumeAjay_Resume
Ajay_Resume
 
Escaping the Waterfall: Reducing Risk with Agile Development with Scrum
Escaping the Waterfall: Reducing Risk with Agile Development with ScrumEscaping the Waterfall: Reducing Risk with Agile Development with Scrum
Escaping the Waterfall: Reducing Risk with Agile Development with Scrum
 
Shashank_Gupta_05
Shashank_Gupta_05Shashank_Gupta_05
Shashank_Gupta_05
 
Agile at enterprice level
Agile at enterprice levelAgile at enterprice level
Agile at enterprice level
 
The Effective Management of Time
The Effective Management of TimeThe Effective Management of Time
The Effective Management of Time
 
ROSEBEL_GEORGE_RESUME
ROSEBEL_GEORGE_RESUMEROSEBEL_GEORGE_RESUME
ROSEBEL_GEORGE_RESUME
 
Resume_Praneetha
Resume_PraneethaResume_Praneetha
Resume_Praneetha
 
CV-CalvinTan
CV-CalvinTanCV-CalvinTan
CV-CalvinTan
 
resume
resumeresume
resume
 

Más de CloudCheckr

Android vs. iPhone for Mobile Security
Android vs. iPhone for Mobile SecurityAndroid vs. iPhone for Mobile Security
Android vs. iPhone for Mobile SecurityCloudCheckr
 
Top 10 Windows Vulnerabilities - Infographic
Top 10 Windows Vulnerabilities - InfographicTop 10 Windows Vulnerabilities - Infographic
Top 10 Windows Vulnerabilities - InfographicCloudCheckr
 
Top 10 Windows Ten Vulnerabilities - Infographic
Top 10 Windows Ten Vulnerabilities - InfographicTop 10 Windows Ten Vulnerabilities - Infographic
Top 10 Windows Ten Vulnerabilities - InfographicCloudCheckr
 
Top 10 Java Vulnerabilities & How to Fix Them - Infographic
Top 10 Java Vulnerabilities & How to Fix Them - InfographicTop 10 Java Vulnerabilities & How to Fix Them - Infographic
Top 10 Java Vulnerabilities & How to Fix Them - InfographicCloudCheckr
 
Top 10 critical CVEs that can lead to a data breach - Infographic
Top 10 critical CVEs that can lead to a data breach - InfographicTop 10 critical CVEs that can lead to a data breach - Infographic
Top 10 critical CVEs that can lead to a data breach - InfographicCloudCheckr
 
Top 20 OWASP vulnerabilities & how to fix them - Infographic
Top 20 OWASP vulnerabilities & how to fix them - Infographic Top 20 OWASP vulnerabilities & how to fix them - Infographic
Top 20 OWASP vulnerabilities & how to fix them - Infographic CloudCheckr
 
5 Dysfunctions of a DevOps Team - Velocity Ignite 2014 - ScriptRock
5 Dysfunctions of a DevOps Team - Velocity Ignite 2014 - ScriptRock5 Dysfunctions of a DevOps Team - Velocity Ignite 2014 - ScriptRock
5 Dysfunctions of a DevOps Team - Velocity Ignite 2014 - ScriptRockCloudCheckr
 
Enterprise DevOps and the Cloud
Enterprise DevOps and the CloudEnterprise DevOps and the Cloud
Enterprise DevOps and the CloudCloudCheckr
 
4 Prerequisites for DevOps Success
4 Prerequisites for DevOps Success4 Prerequisites for DevOps Success
4 Prerequisites for DevOps SuccessCloudCheckr
 
DevOps vs The Enterprise
DevOps vs The EnterpriseDevOps vs The Enterprise
DevOps vs The EnterpriseCloudCheckr
 
What if Enterprise IT Built Race Cars?
What if Enterprise IT Built Race Cars?What if Enterprise IT Built Race Cars?
What if Enterprise IT Built Race Cars?CloudCheckr
 
Techno Arms Dealers and High Frequency Traders
Techno Arms Dealers and High Frequency TradersTechno Arms Dealers and High Frequency Traders
Techno Arms Dealers and High Frequency TradersCloudCheckr
 
10 IT Automation Conferences to Attend
10 IT Automation Conferences to Attend10 IT Automation Conferences to Attend
10 IT Automation Conferences to AttendCloudCheckr
 
Puppet vs. Chef - The Battle Wages On
Puppet vs. Chef - The Battle Wages OnPuppet vs. Chef - The Battle Wages On
Puppet vs. Chef - The Battle Wages OnCloudCheckr
 
Welcome Our Robot Overlords
Welcome Our Robot OverlordsWelcome Our Robot Overlords
Welcome Our Robot OverlordsCloudCheckr
 
Top 5 CIO's of 2012
Top 5 CIO's of 2012Top 5 CIO's of 2012
Top 5 CIO's of 2012CloudCheckr
 
ScriptRock Robotics Testing
ScriptRock Robotics TestingScriptRock Robotics Testing
ScriptRock Robotics TestingCloudCheckr
 
ScriptRock Overview
ScriptRock OverviewScriptRock Overview
ScriptRock OverviewCloudCheckr
 

Más de CloudCheckr (18)

Android vs. iPhone for Mobile Security
Android vs. iPhone for Mobile SecurityAndroid vs. iPhone for Mobile Security
Android vs. iPhone for Mobile Security
 
Top 10 Windows Vulnerabilities - Infographic
Top 10 Windows Vulnerabilities - InfographicTop 10 Windows Vulnerabilities - Infographic
Top 10 Windows Vulnerabilities - Infographic
 
Top 10 Windows Ten Vulnerabilities - Infographic
Top 10 Windows Ten Vulnerabilities - InfographicTop 10 Windows Ten Vulnerabilities - Infographic
Top 10 Windows Ten Vulnerabilities - Infographic
 
Top 10 Java Vulnerabilities & How to Fix Them - Infographic
Top 10 Java Vulnerabilities & How to Fix Them - InfographicTop 10 Java Vulnerabilities & How to Fix Them - Infographic
Top 10 Java Vulnerabilities & How to Fix Them - Infographic
 
Top 10 critical CVEs that can lead to a data breach - Infographic
Top 10 critical CVEs that can lead to a data breach - InfographicTop 10 critical CVEs that can lead to a data breach - Infographic
Top 10 critical CVEs that can lead to a data breach - Infographic
 
Top 20 OWASP vulnerabilities & how to fix them - Infographic
Top 20 OWASP vulnerabilities & how to fix them - Infographic Top 20 OWASP vulnerabilities & how to fix them - Infographic
Top 20 OWASP vulnerabilities & how to fix them - Infographic
 
5 Dysfunctions of a DevOps Team - Velocity Ignite 2014 - ScriptRock
5 Dysfunctions of a DevOps Team - Velocity Ignite 2014 - ScriptRock5 Dysfunctions of a DevOps Team - Velocity Ignite 2014 - ScriptRock
5 Dysfunctions of a DevOps Team - Velocity Ignite 2014 - ScriptRock
 
Enterprise DevOps and the Cloud
Enterprise DevOps and the CloudEnterprise DevOps and the Cloud
Enterprise DevOps and the Cloud
 
4 Prerequisites for DevOps Success
4 Prerequisites for DevOps Success4 Prerequisites for DevOps Success
4 Prerequisites for DevOps Success
 
DevOps vs The Enterprise
DevOps vs The EnterpriseDevOps vs The Enterprise
DevOps vs The Enterprise
 
What if Enterprise IT Built Race Cars?
What if Enterprise IT Built Race Cars?What if Enterprise IT Built Race Cars?
What if Enterprise IT Built Race Cars?
 
Techno Arms Dealers and High Frequency Traders
Techno Arms Dealers and High Frequency TradersTechno Arms Dealers and High Frequency Traders
Techno Arms Dealers and High Frequency Traders
 
10 IT Automation Conferences to Attend
10 IT Automation Conferences to Attend10 IT Automation Conferences to Attend
10 IT Automation Conferences to Attend
 
Puppet vs. Chef - The Battle Wages On
Puppet vs. Chef - The Battle Wages OnPuppet vs. Chef - The Battle Wages On
Puppet vs. Chef - The Battle Wages On
 
Welcome Our Robot Overlords
Welcome Our Robot OverlordsWelcome Our Robot Overlords
Welcome Our Robot Overlords
 
Top 5 CIO's of 2012
Top 5 CIO's of 2012Top 5 CIO's of 2012
Top 5 CIO's of 2012
 
ScriptRock Robotics Testing
ScriptRock Robotics TestingScriptRock Robotics Testing
ScriptRock Robotics Testing
 
ScriptRock Overview
ScriptRock OverviewScriptRock Overview
ScriptRock Overview
 

Último

The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 

Último (20)

The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 

Cautionary tale of going big with DevOps too fast