SlideShare a Scribd company logo
1 of 20
THE DEVOPS CENTIPEDE Ernest Mueller
ORGANIZATIONS WHICH DESIGN SYSTEMS
... ARE CONSTRAINED TO PRODUCE
DESIGNS WHICH ARE COPIES OF THE
COMMUNICATION STRUCTURES OF THESE
ORGANIZATIONS.
—MEL CONWAY
Dev Team 1
Dev Team 2
Dev Team 3
Dev Team 4
Operations
QA
Development
UI Dev Team 1 UI Dev Team 2 UI Dev Team 4UI Dev Team 3
QA Team 1 QA Team 2
UNIX Admin
App Admin
Storage Admin
Datacenter
Admin
Database
Admin
Network
Admin
Web Admin
Windows
Admin
Backend Dev
Team 1
Backend Dev
Team 2
Backend Dev
Team 4
Backend Dev
Team 3
Application #2
DevelopmentQAOperations
Web Dev
Team 1
Web Dev
Team 2
App Dev
Team 4
App Dev
Team 3
Web QA
Team
App QA
Team
UNIX Admin
App Admin
Storage Admin
Datacenter
Admin
Database
Admin
Network
Admin
Web Admin
Windows
Admin
DevelopmentQAOperations
UI Dev Team 1 UI Dev Team 2 UI Dev Team 4UI Dev Team 3
QA Team 1 QA Team 2
UNIX Admin
App Admin
Storage Admin
Datacenter
Admin
Database
Admin
Network
Admin
Web Admin
Windows
Admin
Backend Dev
Team 1
Backend Dev
Team 2
Backend Dev
Team 4
Backend Dev
Team 3
Application #2
DevelopmentQAOperations
UI Dev 1-n
UI QA 1-n
Ops 1-n
Backend Dev
1-n
Product #2
DBA 1-n
QA 1-n
UI Dev 1-n
UI QA 1-n
Ops 1-n
Backend Dev
1-n
QA 1-n
UI Dev 1-n
UI QA 1-n
Ops 1-n Ops 1-n
Backend Dev
1-n
DBA 1-n
QA 1-n
UI Dev 1-n
UI QA 1-n
Ops 1-n
Backend Dev
1-n
Product #2
DevelopmentQAOperations
DBA 1-n
QA 1-n
UI Dev 1-n
UI QA 1-n
Ops 1-n
Backend Dev
1-n
QA 1-n
UI Dev 1-n
UI QA 1-n
Ops 1-n Ops 1-n
Backend Dev
1-n
DBA 1-n
QA 1-n
UI Dev 1-n
UI QA 1-n
Ops 1-n
Backend Dev
1-n
Product #2
DevelopmentQAOperations
DBA 1-n
QA 1-n
UI Dev 1-n
UI QA 1-n
Ops 1-n
Backend Dev
1-n
QA 1-n
UI Dev 1-n
UI QA 1-n
Ops 1-n Ops 1-n
Backend Dev
1-n
DBA 1-n
QA 1-n
UI Dev 1-n
UI QA 1-n
Ops 1-n
Backend Dev
1-n
Product TeamsDevelopmentQAOperations
DBA 1-n
QA 1-n
UI Dev 1-n
UI QA 1-n
Ops 1-n
Backend Dev
1-n
QA 1-n
UI Dev 1-n
UI QA 1-n
Ops 1-n
Data Store
DevOps Tooling
Other Service
or Tool
Platform Teams
Project #2
UI Dev
UI QA
Ops
Backend Dev
QA
DBA
UI Dev
Backend Dev
UI QA
UI QA
UI QA
QA
QA
Ops
Ops
UI Dev
UI Dev 1-n
UI QA 1-n
Ops 1-n
Backend Dev
1-n
Product TeamsDevelopmentQAOperations
DBA 1-n
QA 1-n
UI Dev 1-n
UI QA 1-n
Ops 1-n
Backend Dev
1-n
QA 1-n
UI Dev 1-n
UI QA 1-n
Ops 1-n
Sustaining
Team(s)
THEAGILEADMIN.COM @ernestmueller

More Related Content

Similar to The DevOps Centipede

Top 5 DevSecOps Tools- You Need to Know About
Top 5 DevSecOps Tools- You Need to Know AboutTop 5 DevSecOps Tools- You Need to Know About
Top 5 DevSecOps Tools- You Need to Know AboutDev Software
 
Database Applications Lifecycle Management
Database Applications Lifecycle ManagementDatabase Applications Lifecycle Management
Database Applications Lifecycle ManagementMarcelo Ochoa
 
Deployit - Overview & concepts
Deployit - Overview & conceptsDeployit - Overview & concepts
Deployit - Overview & conceptsXebiaLabs
 
Tech days 2014 från kod till produktion på 60 minuter
Tech days 2014   från kod till produktion på 60 minuterTech days 2014   från kod till produktion på 60 minuter
Tech days 2014 från kod till produktion på 60 minuterSolidify
 
SUGCON 2015: Docker Containers and Sitecore
SUGCON 2015: Docker Containers and Sitecore SUGCON 2015: Docker Containers and Sitecore
SUGCON 2015: Docker Containers and Sitecore Vasiliy Fomichev
 
DCSF19 How To Build Your Containerization Strategy
DCSF19 How To Build Your Containerization Strategy  DCSF19 How To Build Your Containerization Strategy
DCSF19 How To Build Your Containerization Strategy Docker, Inc.
 
DevOps y Continuos Delivery con Visual Studio Team Services y Azure Container...
DevOps y Continuos Delivery con Visual Studio Team Services y Azure Container...DevOps y Continuos Delivery con Visual Studio Team Services y Azure Container...
DevOps y Continuos Delivery con Visual Studio Team Services y Azure Container...Roberto Sanz Ciriano
 
Top 5 DevOps Tools You Should Know In 2022.pdf
Top 5 DevOps Tools You Should Know In 2022.pdfTop 5 DevOps Tools You Should Know In 2022.pdf
Top 5 DevOps Tools You Should Know In 2022.pdfmithranmithran1
 
DCEU 18: How To Build Your Containerization Strategy
DCEU 18: How To Build Your Containerization StrategyDCEU 18: How To Build Your Containerization Strategy
DCEU 18: How To Build Your Containerization StrategyDocker, Inc.
 
Application deployment automation (XebiaLabs)
Application deployment automation (XebiaLabs)Application deployment automation (XebiaLabs)
Application deployment automation (XebiaLabs)XebiaLabs
 
manu_resume
manu_resumemanu_resume
manu_resumeManu VS
 
Lessons on Building Design Systems at DoorDash
Lessons on Building Design Systems at DoorDashLessons on Building Design Systems at DoorDash
Lessons on Building Design Systems at DoorDashKathryn Gonzalez
 
Tech foundations-slides
Tech foundations-slidesTech foundations-slides
Tech foundations-slidestranquynh93
 

Similar to The DevOps Centipede (20)

Top 5 DevSecOps Tools- You Need to Know About
Top 5 DevSecOps Tools- You Need to Know AboutTop 5 DevSecOps Tools- You Need to Know About
Top 5 DevSecOps Tools- You Need to Know About
 
Design System.pdf
Design System.pdfDesign System.pdf
Design System.pdf
 
Database Applications Lifecycle Management
Database Applications Lifecycle ManagementDatabase Applications Lifecycle Management
Database Applications Lifecycle Management
 
Microservice architecture
Microservice architectureMicroservice architecture
Microservice architecture
 
Deployit - Overview & concepts
Deployit - Overview & conceptsDeployit - Overview & concepts
Deployit - Overview & concepts
 
Tech days 2014 från kod till produktion på 60 minuter
Tech days 2014   från kod till produktion på 60 minuterTech days 2014   från kod till produktion på 60 minuter
Tech days 2014 från kod till produktion på 60 minuter
 
SUGCON 2015: Docker Containers and Sitecore
SUGCON 2015: Docker Containers and Sitecore SUGCON 2015: Docker Containers and Sitecore
SUGCON 2015: Docker Containers and Sitecore
 
DCSF19 How To Build Your Containerization Strategy
DCSF19 How To Build Your Containerization Strategy  DCSF19 How To Build Your Containerization Strategy
DCSF19 How To Build Your Containerization Strategy
 
wadebuchanan
wadebuchananwadebuchanan
wadebuchanan
 
DevOps y Continuos Delivery con Visual Studio Team Services y Azure Container...
DevOps y Continuos Delivery con Visual Studio Team Services y Azure Container...DevOps y Continuos Delivery con Visual Studio Team Services y Azure Container...
DevOps y Continuos Delivery con Visual Studio Team Services y Azure Container...
 
Top 5 DevOps Tools You Should Know In 2022.pdf
Top 5 DevOps Tools You Should Know In 2022.pdfTop 5 DevOps Tools You Should Know In 2022.pdf
Top 5 DevOps Tools You Should Know In 2022.pdf
 
DCEU 18: How To Build Your Containerization Strategy
DCEU 18: How To Build Your Containerization StrategyDCEU 18: How To Build Your Containerization Strategy
DCEU 18: How To Build Your Containerization Strategy
 
Resume 2015b
Resume 2015bResume 2015b
Resume 2015b
 
Application deployment automation (XebiaLabs)
Application deployment automation (XebiaLabs)Application deployment automation (XebiaLabs)
Application deployment automation (XebiaLabs)
 
manu_resume
manu_resumemanu_resume
manu_resume
 
Lessons on Building Design Systems at DoorDash
Lessons on Building Design Systems at DoorDashLessons on Building Design Systems at DoorDash
Lessons on Building Design Systems at DoorDash
 
Resume_tanmay
Resume_tanmayResume_tanmay
Resume_tanmay
 
Tech foundations-slides
Tech foundations-slidesTech foundations-slides
Tech foundations-slides
 
B875.pptx
B875.pptxB875.pptx
B875.pptx
 
Build Time Hacking
Build Time HackingBuild Time Hacking
Build Time Hacking
 

More from Ernest Mueller

AlienVault USM Anywhere: Building a Security SaaS in AWS in Six Months
AlienVault USM Anywhere: Building a Security SaaS in AWS in Six MonthsAlienVault USM Anywhere: Building a Security SaaS in AWS in Six Months
AlienVault USM Anywhere: Building a Security SaaS in AWS in Six MonthsErnest Mueller
 
The DevOps Panel - Innotech Austin CD Summit
The DevOps Panel - Innotech Austin CD SummitThe DevOps Panel - Innotech Austin CD Summit
The DevOps Panel - Innotech Austin CD SummitErnest Mueller
 
Lean Security - OWASP Austin March 2016
Lean Security - OWASP Austin March 2016Lean Security - OWASP Austin March 2016
Lean Security - OWASP Austin March 2016Ernest Mueller
 
Lean Security - RSA 2016
Lean Security - RSA 2016Lean Security - RSA 2016
Lean Security - RSA 2016Ernest Mueller
 
DevOps State of the Union 2015
DevOps State of the Union 2015DevOps State of the Union 2015
DevOps State of the Union 2015Ernest Mueller
 
App Assessments Reloaded
App Assessments ReloadedApp Assessments Reloaded
App Assessments ReloadedErnest Mueller
 
2012 - A Release Odyssey
2012 - A Release Odyssey2012 - A Release Odyssey
2012 - A Release OdysseyErnest Mueller
 
CloudAustin Black Friday 2013
CloudAustin Black Friday 2013CloudAustin Black Friday 2013
CloudAustin Black Friday 2013Ernest Mueller
 
DevOps and Cloud at NI
DevOps and Cloud at NIDevOps and Cloud at NI
DevOps and Cloud at NIErnest Mueller
 
Business model driven cloud adoption - what NI is doing in the cloud
Business model driven cloud adoption -  what  NI is doing in the cloudBusiness model driven cloud adoption -  what  NI is doing in the cloud
Business model driven cloud adoption - what NI is doing in the cloudErnest Mueller
 
Inside Microsoft Azure
Inside Microsoft AzureInside Microsoft Azure
Inside Microsoft AzureErnest Mueller
 
PIE - The Programmable Infrastructure Environment
PIE - The Programmable Infrastructure EnvironmentPIE - The Programmable Infrastructure Environment
PIE - The Programmable Infrastructure EnvironmentErnest Mueller
 
Why the cloud is more secure than your existing systems
Why the cloud is more secure than your existing systemsWhy the cloud is more secure than your existing systems
Why the cloud is more secure than your existing systemsErnest Mueller
 

More from Ernest Mueller (18)

DevOps at a Distance
DevOps at a DistanceDevOps at a Distance
DevOps at a Distance
 
AlienVault USM Anywhere: Building a Security SaaS in AWS in Six Months
AlienVault USM Anywhere: Building a Security SaaS in AWS in Six MonthsAlienVault USM Anywhere: Building a Security SaaS in AWS in Six Months
AlienVault USM Anywhere: Building a Security SaaS in AWS in Six Months
 
Intro to DevOps
Intro to DevOpsIntro to DevOps
Intro to DevOps
 
The DevOps Panel - Innotech Austin CD Summit
The DevOps Panel - Innotech Austin CD SummitThe DevOps Panel - Innotech Austin CD Summit
The DevOps Panel - Innotech Austin CD Summit
 
Lean Security - OWASP Austin March 2016
Lean Security - OWASP Austin March 2016Lean Security - OWASP Austin March 2016
Lean Security - OWASP Austin March 2016
 
Lean Security - RSA 2016
Lean Security - RSA 2016Lean Security - RSA 2016
Lean Security - RSA 2016
 
DevOps State of the Union 2015
DevOps State of the Union 2015DevOps State of the Union 2015
DevOps State of the Union 2015
 
DevOps 101
DevOps 101DevOps 101
DevOps 101
 
App Assessments Reloaded
App Assessments ReloadedApp Assessments Reloaded
App Assessments Reloaded
 
2012 - A Release Odyssey
2012 - A Release Odyssey2012 - A Release Odyssey
2012 - A Release Odyssey
 
Mobile and the Cloud
Mobile and the CloudMobile and the Cloud
Mobile and the Cloud
 
CloudAustin Black Friday 2013
CloudAustin Black Friday 2013CloudAustin Black Friday 2013
CloudAustin Black Friday 2013
 
Cloud Monitoring
Cloud MonitoringCloud Monitoring
Cloud Monitoring
 
DevOps and Cloud at NI
DevOps and Cloud at NIDevOps and Cloud at NI
DevOps and Cloud at NI
 
Business model driven cloud adoption - what NI is doing in the cloud
Business model driven cloud adoption -  what  NI is doing in the cloudBusiness model driven cloud adoption -  what  NI is doing in the cloud
Business model driven cloud adoption - what NI is doing in the cloud
 
Inside Microsoft Azure
Inside Microsoft AzureInside Microsoft Azure
Inside Microsoft Azure
 
PIE - The Programmable Infrastructure Environment
PIE - The Programmable Infrastructure EnvironmentPIE - The Programmable Infrastructure Environment
PIE - The Programmable Infrastructure Environment
 
Why the cloud is more secure than your existing systems
Why the cloud is more secure than your existing systemsWhy the cloud is more secure than your existing systems
Why the cloud is more secure than your existing systems
 

Recently uploaded

Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 

Recently uploaded (20)

Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 

The DevOps Centipede

  • 1. THE DEVOPS CENTIPEDE Ernest Mueller
  • 2. ORGANIZATIONS WHICH DESIGN SYSTEMS ... ARE CONSTRAINED TO PRODUCE DESIGNS WHICH ARE COPIES OF THE COMMUNICATION STRUCTURES OF THESE ORGANIZATIONS. —MEL CONWAY
  • 3. Dev Team 1 Dev Team 2 Dev Team 3 Dev Team 4
  • 4.
  • 6.
  • 7. UI Dev Team 1 UI Dev Team 2 UI Dev Team 4UI Dev Team 3 QA Team 1 QA Team 2 UNIX Admin App Admin Storage Admin Datacenter Admin Database Admin Network Admin Web Admin Windows Admin Backend Dev Team 1 Backend Dev Team 2 Backend Dev Team 4 Backend Dev Team 3 Application #2 DevelopmentQAOperations
  • 8. Web Dev Team 1 Web Dev Team 2 App Dev Team 4 App Dev Team 3 Web QA Team App QA Team UNIX Admin App Admin Storage Admin Datacenter Admin Database Admin Network Admin Web Admin Windows Admin DevelopmentQAOperations
  • 9. UI Dev Team 1 UI Dev Team 2 UI Dev Team 4UI Dev Team 3 QA Team 1 QA Team 2 UNIX Admin App Admin Storage Admin Datacenter Admin Database Admin Network Admin Web Admin Windows Admin Backend Dev Team 1 Backend Dev Team 2 Backend Dev Team 4 Backend Dev Team 3 Application #2 DevelopmentQAOperations
  • 10.
  • 11. UI Dev 1-n UI QA 1-n Ops 1-n Backend Dev 1-n Product #2 DBA 1-n QA 1-n UI Dev 1-n UI QA 1-n Ops 1-n Backend Dev 1-n QA 1-n UI Dev 1-n UI QA 1-n Ops 1-n Ops 1-n Backend Dev 1-n DBA 1-n QA 1-n
  • 12. UI Dev 1-n UI QA 1-n Ops 1-n Backend Dev 1-n Product #2 DevelopmentQAOperations DBA 1-n QA 1-n UI Dev 1-n UI QA 1-n Ops 1-n Backend Dev 1-n QA 1-n UI Dev 1-n UI QA 1-n Ops 1-n Ops 1-n Backend Dev 1-n DBA 1-n QA 1-n
  • 13. UI Dev 1-n UI QA 1-n Ops 1-n Backend Dev 1-n Product #2 DevelopmentQAOperations DBA 1-n QA 1-n UI Dev 1-n UI QA 1-n Ops 1-n Backend Dev 1-n QA 1-n UI Dev 1-n UI QA 1-n Ops 1-n Ops 1-n Backend Dev 1-n DBA 1-n QA 1-n
  • 14. UI Dev 1-n UI QA 1-n Ops 1-n Backend Dev 1-n Product TeamsDevelopmentQAOperations DBA 1-n QA 1-n UI Dev 1-n UI QA 1-n Ops 1-n Backend Dev 1-n QA 1-n UI Dev 1-n UI QA 1-n Ops 1-n Data Store DevOps Tooling Other Service or Tool Platform Teams
  • 15. Project #2 UI Dev UI QA Ops Backend Dev QA DBA UI Dev Backend Dev UI QA UI QA UI QA QA QA Ops Ops UI Dev
  • 16.
  • 17.
  • 18. UI Dev 1-n UI QA 1-n Ops 1-n Backend Dev 1-n Product TeamsDevelopmentQAOperations DBA 1-n QA 1-n UI Dev 1-n UI QA 1-n Ops 1-n Backend Dev 1-n QA 1-n UI Dev 1-n UI QA 1-n Ops 1-n Sustaining Team(s)
  • 19.

Editor's Notes

  1. I’ve managed technical teams for much of my 20 year career and wanted to share some things I’ve learned along the way. If you aren’t familiar with The Human Centipede, there’s no way for me to explain it and stay within our Code of Conduct. No, don’t Google it. You’ll get the general idea.
  2. This is Conway’s Law. From my experience I believe it to be absolutely true. It states that when you design a system, it’s going to have internal boundaries along the lines of your organizational structure.
  3. The most typical example of Conway’s Law in action is when various teams create a “Frankenapp” where parts of what should be one user-facing application look or act differently from the others.
  4. And no one likes a Frankenapp. Techniques to mitigate Conway’s Law in the dev arena range from collective code ownership to Big Books of UI Standards.
  5. But from the DevOps viewpoint we know there’s another organizational dimension that often divides us. This is equally harmful to the resulting product and resembles another famous movie monster… I call it the DevOps Centipede.
  6. Organizations have tried many, many different org structures in an attempt to fulfill their mission, whatever it is (delivering working software is, strangely, not the primary supported goal in some cases). Let’s go through some that I’ve used or seen used and talk about their pros and cons.
  7. We’ll start with the DevOps Centipede models. The most typical “IT Shop” org is divided by technical discipline. To deliver a single application, you need people from ten different teams to somehow work together to deliver it, which goes wrong more often than not.
  8. One attempt to mitigate this is to create intermediary teams (some call them “DevOps!”) to add some focus and ownership. We did this at NI as a first attempt at fixing the initial problem. However, this creates brittle bottlenecks.
  9. Another mitigation is to pick specific people from those groups and give them an affinity or “ownership area” for a given scope (app, team, etc.). This works until a single person is supposed to own a whole batch of things, and then it collapses under its weight.
  10. All these are “zone” instead of “man to man” strategies. They are better when there’s uncertainty from lack of direction or when the ratio of staff to desired solutions is way less than one-to-one. They are designed more to mitigate large scale failure, not to facilitate large scale success. Let’s talk about man-to-man strategies now.
  11. Here we have teams oriented by product, or if you will, service. This is basic Agile doctrine, as well as being recommended by ITIL v3 and other IT service management methodologies. It creates great focus and ownership but team members can suffer from lack of coaching and career advancement, and a lack of standardization can have later negative effects.
  12. In this case we have people from these disciplines still reporting back to a per-discipline manager but residing semi-permanently in a product team. We did both this and the previous model at Bazaarvoice – the drawback of this model is that it can cause a reluctance to fully embed on the product teams as a primary concern and a related confusion or conflict of interest, but it helped correct the personnel management issues from the previous approach.
  13. Halfway between these two is a rapid innovation model (popularized by Spotify) where “chapters” and/or “guilds” are used as discipline-focused “user groups” across the organization. We intended to try this, since it seems like it might reduce the ‘two boss factor’ while retaining some esprit de corps for the different types of techies, but the “above and beyond” effort required to initiate maintain it always faltered.
  14. And what about standards and common elements? “Platform” teams can provide elements the products are built on – but must be careful to deliver software either as a tool or a service, and not to take on work for those teams – otherwise this reduces to the earlier zone model with bottlenecks.
  15. But what if we just have a sea of people and move them where they are needed, when they are needed? This has many downsides but the worst, and the dealkiller in my mind, is that it creates a lot of engineer dissatisfaction. Whenever we didn’t let teams get through Tuckman’s stages of development and perform together and moved individual people around frequently, engineer satisfaction plummeted. However, for some use cases like a consulting firm, the flexibility this gives might (?) be worth it.
  16. All these models have pros and cons can work for certain missions and workloads, but here’s some ways to screw any of them up.
  17. First of all, orphans. If you develop apps, or worse, services, and then just let them become “unowned”, you are deliberately introducing chaos into your org, because they always end up “wanting some more.” Have a service catalog that lists every item developed and enforce a chain of custody of ownership.
  18. So let’s have a sustaining team! This is often a very bad idea. It creates different classes of engineer, and also removes a lot of the benefits of owning your own solution, being responsible for its quality and learning from its operation. If you really are churning out a large volume of stuff you don’t care about further developing – you should stop and look at how you’re composing your application portfolio and ask yourself ‘why?’
  19. Also a chronic problem in each of these models is the manager who believes he has suddenly discovered the wisdom of Solomon and can allocate “half a person” to a team or product. Sometimes teams can share a single skilled resource (like a security engineer that works with 2-3 product teams because there’s not enough demand for him full time on just one) but by and large you should figure out how to make that work serial and not parallel – besides the usual “keep WIP low” benefits, it’s very difficult to do this and not make other mistakes in the package (overallocation, etc.)
  20. There’s not one magic org structure for all circumstances, but you should try to avoid the wrath of Conway’s Law by experimenting to get the best flow – and employee happiness – in your organization. If you’re interested in this kind of topic, I’m writing a series on the topic on the agile admin. Thanks and good afternoon!