SlideShare a Scribd company logo
1 of 20
How build and deployment
  should shape software
      architectures
Matthew Skelton CEng | thetrainline.com
 IASA UK Ignite 2, London | #iasaignite
          10 September 2012
Systems engineering
      (robotics, control theory, sensors, neuroscience)




            Software
          development
(finance, insurance, travel, pharma, media, medical imaging)




                            now


Build & Deployment
at thetrainline.com
                 @matthewpskelton
architecture
= f (build & deploy)
                (for some systems)
“HERESY!”
RELIABLE
REPEATABLE
  RAPID
RECURRING
Web-based

Frequently-
 changing

Public-facing

High-volume
‘R-R-R-R’
BUILD AND DEPLOYMENT


Helps to avoid the Ball of Mud
BUILDABLE




Small pipelined builds on generic build machines
         Seconds, not minutes or hours
              Short feedback cycles
        (Dan Worthington-Bodart, @danielbodart - http://bit.ly/M85wsX)
TESTABLE
Test (separation, harnesses, points)

         IDENTIFIABLE
  Meaningful versions, packages,
  defined dependencies, artefact
           management
       (think component boundaries)
DEPLOYABLE
   Rapid, scriptable, simple failure modes

              MONITORABLE
    Logging, metrics, transaction tracing

               CONFIGURABLE
      Inject settings – no ‘black boxes’

              LIGHTWEIGHT
Keep things small and easily comprehendible
INSTANTIABLE
   No snowflakes or singletons



        RECOVERABLE
 No nasty zombies after failures
MTTR more important than MTBF*
                          * for most kinds of F
RELIABLE
REPEATABLE
  RAPID
RECURRING
Lightweight, Testable,
     Monitorable,
     Configurable,
Recoverable, Identifiable
component architecture
LOAD BALANCING
  HIGH AVAILABILITY
       SCALING
ELASTIC ARCHITECTURES
   RAPID RECOVERY
architecture
= f (build & deploy)
                                                                                                                                 (for some systems)

                                                          thank you

                            IASA: www.iasaglobal.org
                     matthewskelton.net | @matthewpskelton
                                Thanks to: Attila S, Jack R and Owain P for feedback.



                                                             Picture credits:
 Petra: Wikimedia/Berthold Werner; army engineers: US DoD; ball of mud: pwern.blogspot.co.uk; sports car: xarj.net; zombie: bjj.org; feather:
         Wikipedia; punch: thelegalblitz.com; passport: coverpalace.com; dogs: reluctantmemsahib.wordpress.com; Meccano: dalefield.com

More Related Content

Viewers also liked

Project, Program & Portfolio Management
Project, Program & Portfolio ManagementProject, Program & Portfolio Management
Project, Program & Portfolio Management
Anand Subramaniam
 
Solution Architecture Concept Workshop
Solution Architecture Concept WorkshopSolution Architecture Concept Workshop
Solution Architecture Concept Workshop
Alan McSweeney
 
Forget Big Data. It's All About Smart Data
Forget Big Data. It's All About Smart DataForget Big Data. It's All About Smart Data
Forget Big Data. It's All About Smart Data
Alan McSweeney
 
Digital Transformation And Enterprise Architecture
Digital Transformation And Enterprise ArchitectureDigital Transformation And Enterprise Architecture
Digital Transformation And Enterprise Architecture
Alan McSweeney
 

Viewers also liked (16)

The Role of the Software Architect
The Role of the Software ArchitectThe Role of the Software Architect
The Role of the Software Architect
 
Outsourcing And Cloud Computing
Outsourcing And Cloud ComputingOutsourcing And Cloud Computing
Outsourcing And Cloud Computing
 
Enterprise Architecture & Project Portfolio Management 1/2
Enterprise Architecture & Project Portfolio Management 1/2Enterprise Architecture & Project Portfolio Management 1/2
Enterprise Architecture & Project Portfolio Management 1/2
 
Introduction to project, program & portfolio management
Introduction to project, program & portfolio managementIntroduction to project, program & portfolio management
Introduction to project, program & portfolio management
 
IT Portfolio Management Using Enterprise Architecture and ITIL® Service Strategy
IT Portfolio Management Using Enterprise Architecture and ITIL® Service StrategyIT Portfolio Management Using Enterprise Architecture and ITIL® Service Strategy
IT Portfolio Management Using Enterprise Architecture and ITIL® Service Strategy
 
Introduction to Enterprise Architecture and TOGAF 9.1
Introduction to Enterprise Architecture and TOGAF 9.1Introduction to Enterprise Architecture and TOGAF 9.1
Introduction to Enterprise Architecture and TOGAF 9.1
 
Project, Program & Portfolio Management
Project, Program & Portfolio ManagementProject, Program & Portfolio Management
Project, Program & Portfolio Management
 
Guide to Project Portfolio Management
Guide to Project Portfolio ManagementGuide to Project Portfolio Management
Guide to Project Portfolio Management
 
portfolio management PPT
portfolio management PPTportfolio management PPT
portfolio management PPT
 
Introduction portfolio management
Introduction portfolio managementIntroduction portfolio management
Introduction portfolio management
 
Solution Architecture Concept Workshop
Solution Architecture Concept WorkshopSolution Architecture Concept Workshop
Solution Architecture Concept Workshop
 
Project Portfolio Management
Project Portfolio ManagementProject Portfolio Management
Project Portfolio Management
 
Forget Big Data. It's All About Smart Data
Forget Big Data. It's All About Smart DataForget Big Data. It's All About Smart Data
Forget Big Data. It's All About Smart Data
 
Digital Transformation And Enterprise Architecture
Digital Transformation And Enterprise ArchitectureDigital Transformation And Enterprise Architecture
Digital Transformation And Enterprise Architecture
 
Structured Approach to Solution Architecture
Structured Approach to Solution ArchitectureStructured Approach to Solution Architecture
Structured Approach to Solution Architecture
 
Project Management KPIs
Project Management KPIsProject Management KPIs
Project Management KPIs
 

Similar to How build-and-deploy-affects-architecture

From ci to cd - LavaJug 2012
From ci to cd  - LavaJug 2012From ci to cd  - LavaJug 2012
From ci to cd - LavaJug 2012
Henri Gomez
 
Data center pov 2017 v3
Data center pov 2017 v3Data center pov 2017 v3
Data center pov 2017 v3
Jeff Green
 
Data center network reference pov jeff green 2016 v2
Data center network reference pov jeff green 2016 v2Data center network reference pov jeff green 2016 v2
Data center network reference pov jeff green 2016 v2
Jeff Green
 
Extreme Spine Leaf Design
Extreme Spine Leaf DesignExtreme Spine Leaf Design
Extreme Spine Leaf Design
Jeff Green
 

Similar to How build-and-deploy-affects-architecture (20)

How build and deploy shapes software architecture at thetrainline.com
How build and deploy shapes software architecture at thetrainline.comHow build and deploy shapes software architecture at thetrainline.com
How build and deploy shapes software architecture at thetrainline.com
 
How build and deploy affects architecture at thetrainline.com - akqa anoraks
How build and deploy affects architecture at thetrainline.com - akqa anoraksHow build and deploy affects architecture at thetrainline.com - akqa anoraks
How build and deploy affects architecture at thetrainline.com - akqa anoraks
 
From ci to cd - LavaJug 2012
From ci to cd  - LavaJug 2012From ci to cd  - LavaJug 2012
From ci to cd - LavaJug 2012
 
Reactive IoT, Java One 2016
Reactive IoT, Java One 2016Reactive IoT, Java One 2016
Reactive IoT, Java One 2016
 
Data center pov 2017 v3
Data center pov 2017 v3Data center pov 2017 v3
Data center pov 2017 v3
 
OpenStack at Scale Inside NetApp
OpenStack at Scale Inside NetAppOpenStack at Scale Inside NetApp
OpenStack at Scale Inside NetApp
 
Ionic 4 + capacitor + angular 7
Ionic 4 +  capacitor + angular 7 Ionic 4 +  capacitor + angular 7
Ionic 4 + capacitor + angular 7
 
Shmoocon 2013 - OpenStack Security Brief
Shmoocon 2013 - OpenStack Security BriefShmoocon 2013 - OpenStack Security Brief
Shmoocon 2013 - OpenStack Security Brief
 
Contrail Enabler for agile cloud services
Contrail Enabler for agile cloud servicesContrail Enabler for agile cloud services
Contrail Enabler for agile cloud services
 
Gute Nachrichten, Schlechte Nachrichten
Gute Nachrichten, Schlechte NachrichtenGute Nachrichten, Schlechte Nachrichten
Gute Nachrichten, Schlechte Nachrichten
 
SDN and Security: A Marriage Made in Heaven. Or Not.
SDN and Security: A Marriage Made in Heaven. Or Not.SDN and Security: A Marriage Made in Heaven. Or Not.
SDN and Security: A Marriage Made in Heaven. Or Not.
 
Data center network reference pov jeff green 2016 v2
Data center network reference pov jeff green 2016 v2Data center network reference pov jeff green 2016 v2
Data center network reference pov jeff green 2016 v2
 
Extreme Spine Leaf Design
Extreme Spine Leaf DesignExtreme Spine Leaf Design
Extreme Spine Leaf Design
 
The Enterprise Cloud
The Enterprise CloudThe Enterprise Cloud
The Enterprise Cloud
 
CloudStack Build A Cloud Day (SCaLE 2013)
CloudStack Build A Cloud Day (SCaLE 2013)CloudStack Build A Cloud Day (SCaLE 2013)
CloudStack Build A Cloud Day (SCaLE 2013)
 
Anomaly Detection at Scale
Anomaly Detection at ScaleAnomaly Detection at Scale
Anomaly Detection at Scale
 
Reliability & Scale in AWS while letting you sleep through the night
Reliability & Scale in AWS while letting you sleep through the night Reliability & Scale in AWS while letting you sleep through the night
Reliability & Scale in AWS while letting you sleep through the night
 
Sled local gov pov october 2016 v2
Sled local gov pov october 2016 v2Sled local gov pov october 2016 v2
Sled local gov pov october 2016 v2
 
Codifying Devops by Gourav Shah
Codifying Devops by Gourav Shah Codifying Devops by Gourav Shah
Codifying Devops by Gourav Shah
 
SK Telecom TACO Introduction at Berlin Summit
SK Telecom TACO Introduction at Berlin SummitSK Telecom TACO Introduction at Berlin Summit
SK Telecom TACO Introduction at Berlin Summit
 

More from Iasa UK (9)

Does my scrum look big in this
Does my scrum look big in thisDoes my scrum look big in this
Does my scrum look big in this
 
Architecture is Boring
Architecture is BoringArchitecture is Boring
Architecture is Boring
 
Iasa North Welcome
Iasa North WelcomeIasa North Welcome
Iasa North Welcome
 
Architectural considerations
Architectural considerationsArchitectural considerations
Architectural considerations
 
The windows azure story
The windows azure storyThe windows azure story
The windows azure story
 
Closing the gap business capabilities
Closing the gap business capabilitiesClosing the gap business capabilities
Closing the gap business capabilities
 
How much architecture
How much architectureHow much architecture
How much architecture
 
Iasa UK: Making an integration sandwich
Iasa UK: Making an integration sandwichIasa UK: Making an integration sandwich
Iasa UK: Making an integration sandwich
 
Iasa UK Archimate Overview
Iasa UK Archimate OverviewIasa UK Archimate Overview
Iasa UK Archimate Overview
 

Recently uploaded

TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
FIDO Alliance
 

Recently uploaded (20)

TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Navigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseNavigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern Enterprise
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 

How build-and-deploy-affects-architecture

  • 1. How build and deployment should shape software architectures Matthew Skelton CEng | thetrainline.com IASA UK Ignite 2, London | #iasaignite 10 September 2012
  • 2. Systems engineering (robotics, control theory, sensors, neuroscience) Software development (finance, insurance, travel, pharma, media, medical imaging) now Build & Deployment at thetrainline.com @matthewpskelton
  • 3. architecture = f (build & deploy) (for some systems)
  • 5.
  • 6.
  • 7.
  • 10. ‘R-R-R-R’ BUILD AND DEPLOYMENT Helps to avoid the Ball of Mud
  • 11.
  • 12. BUILDABLE Small pipelined builds on generic build machines Seconds, not minutes or hours Short feedback cycles (Dan Worthington-Bodart, @danielbodart - http://bit.ly/M85wsX)
  • 13. TESTABLE Test (separation, harnesses, points) IDENTIFIABLE Meaningful versions, packages, defined dependencies, artefact management (think component boundaries)
  • 14. DEPLOYABLE Rapid, scriptable, simple failure modes MONITORABLE Logging, metrics, transaction tracing CONFIGURABLE Inject settings – no ‘black boxes’ LIGHTWEIGHT Keep things small and easily comprehendible
  • 15. INSTANTIABLE No snowflakes or singletons RECOVERABLE No nasty zombies after failures MTTR more important than MTBF* * for most kinds of F
  • 16.
  • 18. Lightweight, Testable, Monitorable, Configurable, Recoverable, Identifiable component architecture
  • 19. LOAD BALANCING HIGH AVAILABILITY SCALING ELASTIC ARCHITECTURES RAPID RECOVERY
  • 20. architecture = f (build & deploy) (for some systems) thank you IASA: www.iasaglobal.org matthewskelton.net | @matthewpskelton Thanks to: Attila S, Jack R and Owain P for feedback. Picture credits: Petra: Wikimedia/Berthold Werner; army engineers: US DoD; ball of mud: pwern.blogspot.co.uk; sports car: xarj.net; zombie: bjj.org; feather: Wikipedia; punch: thelegalblitz.com; passport: coverpalace.com; dogs: reluctantmemsahib.wordpress.com; Meccano: dalefield.com

Editor's Notes

  1. If a component e.g. BizTalk is not {scriptable, deployable, buildable, etc.} then get rid of it