SlideShare a Scribd company logo
What is Exactly Anti-Fragile
in DevOps?
Asher Sterkin
Distinguished Engineer, SPVSS, Cisco Video Systems, Israel
September 30, 2013

© 2013 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

1
© 2013 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

2
© 2013 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

3
Antifragile
Some things benefit from shocks…
volatility, randomness, disorder,
and stressors and love adventure,
risk, and uncertainty… there is no
word for the exact opposite of
fragile. Let’s call it antifragile.
Nassim N. Taleb, “Antifragile. Things that gain from
disorder”

© 2013 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

4
The Book and Reactions
I think this concept is incredibly
powerful when applied to systems
and organizational architecture.
Jez Humble, “On Antifragility in Systems and
Organizational Structure”

© 2013 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

5
The Book and Reactions
The Netflix cloud architecture is
anti-fragile… The Netflix culture is
anti-fragile… Getting stronger
through failure is the basis of antifragility. Avoiding failure at all costs
… makes you brittle and
vulnerable...
Adrian Cockcroft, “Looking back at 2012 with
pointers to 2013”

© 2013 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

6
The Book and Reactions
If the idea is nice and neat,
however, the book that houses it
is just the opposite. It is a big,
baggy, sprawling mess.
David Runciman, review of the book in Guardian
November 21, 2012

© 2013 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

7
Larger Body of Knowledge
•

•

Highly-Optimized Tolerance

•

Technology Development Cycle

•

Disruptive Innovations

•

Product Development Flow

•

© 2013 Cisco and/or its affiliates. All rights reserved.

Complex Adaptive Systems

Lean Start Up

Cisco Confidential

8
For Today
• De-fragilization
• Skin in the Game

• Barbell
• Asymmetric Pay-off

© 2013 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

9
DevOps Areas
Area 3: embed project knowledge into operations
Area 1: extend delivery to
production

DEV

Area 2: extend operations
feedback to project

OPS

Area 4: embed operations knowledge into project

© 2013 Cisco and/or its affiliates. All rights reserved.

Patrick Debois: “Codifying devops practices”

Cisco Confidential

10
De-Fragilization

© 2013 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

11
“Beauty plus pity-that is the closest we can
get to a definition of art. Where there is
beauty there is pity for the simple reason
that beauty must die: beauty always dies,
the manner dies with the matter, the world
dies with the individual.”
V. Nabokov, “Lecture on Metamorphosis”

© 2013 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

12
DevOps Areas
Area 3: embed project knowledge into operations
Area 1: extend delivery to
production

DEV

Area 2: extend operations
feedback to project

OPS

Area 4: embed operations knowledge into project

© 2013 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

13
Continuous Delivery
... to exert a constant stress on
your delivery and deployment
process to reduce its fragility so
that releasing becomes a
boring, low-risk activity.
Jez Humble, “On Antifragility in Systems and
Organizational Structure”

© 2013 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

14
Large batches increase variability in flow

John Allspaw: “Ops Meta-Metrics”,
slides 103-109

Large batches increase cycle time
© 2013 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

15
Reducing batch size reduces risk

Reducing batch size reduces overhead
Reducing batch size accelerates feedback
© 2013 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

16
Batch size and Bottlenecks
Reduce batch
size before you
attack
bottlenecks

© 2013 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

17
DevOps Areas
Area 3: embed project knowledge into operations
Area 1: extend delivery to
production

DEV

Area 2: extend operations
feedback to project

OPS

Area 4: embed operations knowledge into project

© 2013 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

18
“Resilience through Failure”

© 2013 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

19
© 2013 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

20
© 2013 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

21
Culture of Continuous Learning
Resilience to failure is a
lofty goal. It enables a
system to survive and
withstand failure. There's an
even higher peak to strive
for, however: making the
system stronger and better
with each failure.
A. Tseitlin, “The Antifragile Organization”
© 2013 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

22
“Confusing common
causes with special
causes will only make
things worse
E. Deming, “Out of Crisis”
© 2013 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

23
Resilience, Reliability, Robustness
Normal Operation

Failure!

Normal Operation

Max Downtime
MTBF

MTTD

MTTR

MTBF

Max Data
Lost
© 2013 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

24
“Obsessive protection of the
system against extremely rare
events makes it more fragile.
Resilience comes before the
last percentiles of reliability.
It’s me
© 2013 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

25
© 2013 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

26
DevOps Areas
Area 3: embed project knowledge into operations
Area 1: extend delivery to
production

DEV

Area 2: extend operations
feedback to project

OPS

Area 4: embed operations knowledge into project

© 2013 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

27
Give ‘em pagers!

© 2013 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

28
“DevOps: architects,
developers, QA/QC,
system engineers, and IT
cooperate to maximize
the company value
It’s me again
© 2013 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

29
Barbell

© 2013 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

30
DevOps Areas
Area 3: embed project knowledge into operations
Area 1: extend delivery to
production

DEV

Area 2: extend operations
feedback to project

OPS

Area 4: embed operations knowledge into project

© 2013 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

31
© 2013 Cisco and/or its affiliates. All rights reserved.

John Alsspaw, “Dev and Ops Collaboration”
Cisco Confidential

32
© 2013 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

33
John Allspaw, “Reply to NoOps @ Netflix”

Developers

Operations

•

Responding to outages, takes
on-call

•

Responding to outages, takes
on-call

•

Alerting systems thresholding,
design

•

Alerting systems thresholding,
design

•

Architecture design and review

•

Architecture design and review

•

Building metrics collection

•

Building metrics collection

•

Application configuration

•

Application configuration

•

Shipping public-facing code

•

Infrastructure
buildout/management

© 2013 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

34
DevOps Areas
Area 3: embed project knowledge into operations
Area 1: extend delivery to
production

DEV

Area 2: extend operations
feedback to project

Area 4: embed operations knowledge into project

© 2013 Cisco and/or its affiliates. All rights reserved.

OPS
No, not really

Cisco Confidential

35
Every analogy has its limit.
One just needs to learn where
to stop.

© 2013 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

36
“ The first step to anti-fragility
consists in decreasing
downside…This brings us to the
solution in the form of barbell …
Away from Golden Middle.
N. Taleb, “Antifragile”
© 2013 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

37
Risk
Aversion

Risk
Loving

Away from golden Middle
© 2013 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

38
© 2013 Cisco and/or its affiliates. All rights reserved.

Niek Bartholomeus,
“DevOps For Dinosaurs”

Cisco Confidential

39
Risk Aversion

© 2013 Cisco and/or its affiliates. All rights reserved.

Risk Loving

Jeremy Edberg, “DevOps at Netflix”
Cisco Confidential

40
“ The downside/lost should be
known and protected, not
probability
N. Taleb, “Antifragile”
© 2013 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

41
“ You never know where from your next
outage or cyber attack will come from
and when.

The maximal downtime and maximal
data lost should be known and
guaranteed regardless of
probabilities.
It’s me
© 2013 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

42
Gain

Gain/Loss f(x)

Asymmetric Pay-Offs

Pain

x

© 2013 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

43
DevOps Areas
Area 3: embed project knowledge into operations
Area 1: extend delivery to
production

DEV

Area 2: extend operations
feedback to project

OPS

Area 4: embed operations knowledge into project

© 2013 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

44
© 2013 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

45
“ Never be sucker. Period!
N. Taleb
© 2013 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

46
Thanks

More Related Content

What's hot

Accelerating Incident Response in Organizations of Any Size
Accelerating Incident Response in Organizations of Any SizeAccelerating Incident Response in Organizations of Any Size
Accelerating Incident Response in Organizations of Any Size
Cisco Canada
 
After the Catastrophe: IP Resiliency In the Post-Disaster Environment
After the Catastrophe: IP Resiliency In the Post-Disaster Environment After the Catastrophe: IP Resiliency In the Post-Disaster Environment
After the Catastrophe: IP Resiliency In the Post-Disaster Environment
Cisco Crisis Response
 
Security at the Breaking Point: Rethink Security in 2013
Security at the Breaking Point: Rethink Security in 2013Security at the Breaking Point: Rethink Security in 2013
Security at the Breaking Point: Rethink Security in 2013 Skybox Security
 
A Tale of Woe, Chaos, and Business
A Tale of Woe, Chaos, and BusinessA Tale of Woe, Chaos, and Business
A Tale of Woe, Chaos, and Business
James Wickett
 
The Network Enabled Emergency Operations Center (EOC)
The Network Enabled Emergency Operations Center (EOC)The Network Enabled Emergency Operations Center (EOC)
The Network Enabled Emergency Operations Center (EOC)
Cisco Crisis Response
 
The Network Enabled EOC
The Network Enabled EOCThe Network Enabled EOC
The Network Enabled EOC
Cisco Crisis Response
 
Cisco Connect 2018 Indonesia - Cybersecurity Strategy
Cisco Connect 2018 Indonesia - Cybersecurity StrategyCisco Connect 2018 Indonesia - Cybersecurity Strategy
Cisco Connect 2018 Indonesia - Cybersecurity Strategy
NetworkCollaborators
 
Securing Humanitarian Connectivity
Securing Humanitarian ConnectivitySecuring Humanitarian Connectivity
Securing Humanitarian Connectivity
Cisco Crisis Response
 
How secure are your IT systems? (Darrell Burkey, CASE)
How secure are your IT systems? (Darrell Burkey, CASE)How secure are your IT systems? (Darrell Burkey, CASE)
How secure are your IT systems? (Darrell Burkey, CASE)
makinglinks
 
Pragmatic Security and Rugged DevOps - SXSW 2015
Pragmatic Security and Rugged DevOps - SXSW 2015Pragmatic Security and Rugged DevOps - SXSW 2015
Pragmatic Security and Rugged DevOps - SXSW 2015
James Wickett
 
Are you ready for the next attack? Reviewing the SP Security Checklist
Are you ready for the next attack? Reviewing the SP Security ChecklistAre you ready for the next attack? Reviewing the SP Security Checklist
Are you ready for the next attack? Reviewing the SP Security Checklist
APNIC
 
Hastily Formed Networks (HFN) at the Waldo Canyon Fire
Hastily Formed Networks (HFN) at the Waldo Canyon FireHastily Formed Networks (HFN) at the Waldo Canyon Fire
Hastily Formed Networks (HFN) at the Waldo Canyon Fire
Rakesh Bharania
 
[Cisco Connect 2018 - Vietnam] Brian cotaz cyber security strategy
[Cisco Connect 2018 - Vietnam] Brian cotaz   cyber security strategy [Cisco Connect 2018 - Vietnam] Brian cotaz   cyber security strategy
[Cisco Connect 2018 - Vietnam] Brian cotaz cyber security strategy
Nur Shiqim Chok
 
Defense-Oriented DevOps for Modern Software Development
Defense-Oriented DevOps for Modern Software DevelopmentDefense-Oriented DevOps for Modern Software Development
Defense-Oriented DevOps for Modern Software Development
James Wickett
 
2015 ISA Calgary Show: IACS Cyber Incident Preparation
2015 ISA Calgary Show: IACS Cyber Incident Preparation2015 ISA Calgary Show: IACS Cyber Incident Preparation
2015 ISA Calgary Show: IACS Cyber Incident Preparation
Cimation
 
Deployment Review: Carlton Complex Wildfire
Deployment Review: Carlton Complex WildfireDeployment Review: Carlton Complex Wildfire
Deployment Review: Carlton Complex Wildfire
Cisco Crisis Response
 
Connecting Syria's Refugees
Connecting Syria's RefugeesConnecting Syria's Refugees
Connecting Syria's Refugees
Cisco Crisis Response
 
Cisco Connect 2018 Indonesia - software-defined access-a transformational ap...
Cisco Connect 2018 Indonesia -  software-defined access-a transformational ap...Cisco Connect 2018 Indonesia -  software-defined access-a transformational ap...
Cisco Connect 2018 Indonesia - software-defined access-a transformational ap...
NetworkCollaborators
 
Cisco Connect 2018 Malaysia - SDNNFV telco data center transformation
Cisco Connect 2018 Malaysia - SDNNFV telco data center transformationCisco Connect 2018 Malaysia - SDNNFV telco data center transformation
Cisco Connect 2018 Malaysia - SDNNFV telco data center transformation
NetworkCollaborators
 

What's hot (19)

Accelerating Incident Response in Organizations of Any Size
Accelerating Incident Response in Organizations of Any SizeAccelerating Incident Response in Organizations of Any Size
Accelerating Incident Response in Organizations of Any Size
 
After the Catastrophe: IP Resiliency In the Post-Disaster Environment
After the Catastrophe: IP Resiliency In the Post-Disaster Environment After the Catastrophe: IP Resiliency In the Post-Disaster Environment
After the Catastrophe: IP Resiliency In the Post-Disaster Environment
 
Security at the Breaking Point: Rethink Security in 2013
Security at the Breaking Point: Rethink Security in 2013Security at the Breaking Point: Rethink Security in 2013
Security at the Breaking Point: Rethink Security in 2013
 
A Tale of Woe, Chaos, and Business
A Tale of Woe, Chaos, and BusinessA Tale of Woe, Chaos, and Business
A Tale of Woe, Chaos, and Business
 
The Network Enabled Emergency Operations Center (EOC)
The Network Enabled Emergency Operations Center (EOC)The Network Enabled Emergency Operations Center (EOC)
The Network Enabled Emergency Operations Center (EOC)
 
The Network Enabled EOC
The Network Enabled EOCThe Network Enabled EOC
The Network Enabled EOC
 
Cisco Connect 2018 Indonesia - Cybersecurity Strategy
Cisco Connect 2018 Indonesia - Cybersecurity StrategyCisco Connect 2018 Indonesia - Cybersecurity Strategy
Cisco Connect 2018 Indonesia - Cybersecurity Strategy
 
Securing Humanitarian Connectivity
Securing Humanitarian ConnectivitySecuring Humanitarian Connectivity
Securing Humanitarian Connectivity
 
How secure are your IT systems? (Darrell Burkey, CASE)
How secure are your IT systems? (Darrell Burkey, CASE)How secure are your IT systems? (Darrell Burkey, CASE)
How secure are your IT systems? (Darrell Burkey, CASE)
 
Pragmatic Security and Rugged DevOps - SXSW 2015
Pragmatic Security and Rugged DevOps - SXSW 2015Pragmatic Security and Rugged DevOps - SXSW 2015
Pragmatic Security and Rugged DevOps - SXSW 2015
 
Are you ready for the next attack? Reviewing the SP Security Checklist
Are you ready for the next attack? Reviewing the SP Security ChecklistAre you ready for the next attack? Reviewing the SP Security Checklist
Are you ready for the next attack? Reviewing the SP Security Checklist
 
Hastily Formed Networks (HFN) at the Waldo Canyon Fire
Hastily Formed Networks (HFN) at the Waldo Canyon FireHastily Formed Networks (HFN) at the Waldo Canyon Fire
Hastily Formed Networks (HFN) at the Waldo Canyon Fire
 
[Cisco Connect 2018 - Vietnam] Brian cotaz cyber security strategy
[Cisco Connect 2018 - Vietnam] Brian cotaz   cyber security strategy [Cisco Connect 2018 - Vietnam] Brian cotaz   cyber security strategy
[Cisco Connect 2018 - Vietnam] Brian cotaz cyber security strategy
 
Defense-Oriented DevOps for Modern Software Development
Defense-Oriented DevOps for Modern Software DevelopmentDefense-Oriented DevOps for Modern Software Development
Defense-Oriented DevOps for Modern Software Development
 
2015 ISA Calgary Show: IACS Cyber Incident Preparation
2015 ISA Calgary Show: IACS Cyber Incident Preparation2015 ISA Calgary Show: IACS Cyber Incident Preparation
2015 ISA Calgary Show: IACS Cyber Incident Preparation
 
Deployment Review: Carlton Complex Wildfire
Deployment Review: Carlton Complex WildfireDeployment Review: Carlton Complex Wildfire
Deployment Review: Carlton Complex Wildfire
 
Connecting Syria's Refugees
Connecting Syria's RefugeesConnecting Syria's Refugees
Connecting Syria's Refugees
 
Cisco Connect 2018 Indonesia - software-defined access-a transformational ap...
Cisco Connect 2018 Indonesia -  software-defined access-a transformational ap...Cisco Connect 2018 Indonesia -  software-defined access-a transformational ap...
Cisco Connect 2018 Indonesia - software-defined access-a transformational ap...
 
Cisco Connect 2018 Malaysia - SDNNFV telco data center transformation
Cisco Connect 2018 Malaysia - SDNNFV telco data center transformationCisco Connect 2018 Malaysia - SDNNFV telco data center transformation
Cisco Connect 2018 Malaysia - SDNNFV telco data center transformation
 

Similar to DevOps Days Tel Aviv 2013: What exactly is anti-fragile in DevOps? - Asher Sterkin

MOSSCon 2013, Cisco Open Source talk
MOSSCon 2013, Cisco Open Source talkMOSSCon 2013, Cisco Open Source talk
MOSSCon 2013, Cisco Open Source talk
Jeff Squyres
 
Next Generation Security
Next Generation SecurityNext Generation Security
Next Generation Security
Cisco Canada
 
Scalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa PresentationScalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa Presentation
Scalar Decisions
 
Winning Strategy For Hybrid Cloud Environments
Winning Strategy For Hybrid Cloud EnvironmentsWinning Strategy For Hybrid Cloud Environments
Winning Strategy For Hybrid Cloud EnvironmentsCarl De Groote
 
From Air Gap to Air Control
From Air Gap to Air ControlFrom Air Gap to Air Control
From Air Gap to Air Control
EnergySec
 
Cisco brand-language-iabc-houston
Cisco brand-language-iabc-houstonCisco brand-language-iabc-houston
Cisco brand-language-iabc-houstonIABC Houston
 
Cisco brand-language-iabc-houston
Cisco brand-language-iabc-houstonCisco brand-language-iabc-houston
Cisco brand-language-iabc-houston
Emily Murphy
 
Cisco - Revamping and Standardizing Global Marketing and Sales Content
Cisco - Revamping and Standardizing Global Marketing and Sales ContentCisco - Revamping and Standardizing Global Marketing and Sales Content
Cisco - Revamping and Standardizing Global Marketing and Sales Content
Corporate Visions
 
Corporate Visions Conference
Corporate Visions ConferenceCorporate Visions Conference
Corporate Visions Conference
Thierry van Herwijnen
 
«Product Security Incident Response Team (PSIRT) - Изнутри Cisco PSIRT», Алек...
«Product Security Incident Response Team (PSIRT) - Изнутри Cisco PSIRT», Алек...«Product Security Incident Response Team (PSIRT) - Изнутри Cisco PSIRT», Алек...
«Product Security Incident Response Team (PSIRT) - Изнутри Cisco PSIRT», Алек...
Mail.ru Group
 
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
BGA Cyber Security
 
Project Management at Cisco Ben Rus TIM 101 Seminar – .docx
Project Management at Cisco Ben Rus TIM 101 Seminar – .docxProject Management at Cisco Ben Rus TIM 101 Seminar – .docx
Project Management at Cisco Ben Rus TIM 101 Seminar – .docx
woodruffeloisa
 
Behind the Curtain: Exposing Advanced Threats
Behind the Curtain: Exposing Advanced ThreatsBehind the Curtain: Exposing Advanced Threats
Behind the Curtain: Exposing Advanced Threats
Cisco Canada
 
The Next Generation Security
The Next Generation SecurityThe Next Generation Security
The Next Generation Security
Cybera Inc.
 
Predictive Analytics & Visualization - Towards Data Driven Insights for Opens...
Predictive Analytics & Visualization - Towards Data Driven Insights for Opens...Predictive Analytics & Visualization - Towards Data Driven Insights for Opens...
Predictive Analytics & Visualization - Towards Data Driven Insights for Opens...
Debojyoti Dutta
 
Creating the Workplace of Tomorrow
Creating the Workplace of TomorrowCreating the Workplace of Tomorrow
Creating the Workplace of Tomorrow
Cisco Canada
 
Security and Virtualization in the Data Center
Security and Virtualization in the Data CenterSecurity and Virtualization in the Data Center
Security and Virtualization in the Data Center
Cisco Canada
 
Secure Your DevOps Pipeline Best Practices Meetup 08022024.pptx
Secure Your DevOps Pipeline Best Practices Meetup 08022024.pptxSecure Your DevOps Pipeline Best Practices Meetup 08022024.pptx
Secure Your DevOps Pipeline Best Practices Meetup 08022024.pptx
lior mazor
 
Nsc42 security knights slayer of dragons 0-5_very_short_15m_share
Nsc42 security knights slayer of dragons 0-5_very_short_15m_shareNsc42 security knights slayer of dragons 0-5_very_short_15m_share
Nsc42 security knights slayer of dragons 0-5_very_short_15m_share
NSC42 Ltd
 
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver Presentation
Scalar Decisions
 

Similar to DevOps Days Tel Aviv 2013: What exactly is anti-fragile in DevOps? - Asher Sterkin (20)

MOSSCon 2013, Cisco Open Source talk
MOSSCon 2013, Cisco Open Source talkMOSSCon 2013, Cisco Open Source talk
MOSSCon 2013, Cisco Open Source talk
 
Next Generation Security
Next Generation SecurityNext Generation Security
Next Generation Security
 
Scalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa PresentationScalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa Presentation
 
Winning Strategy For Hybrid Cloud Environments
Winning Strategy For Hybrid Cloud EnvironmentsWinning Strategy For Hybrid Cloud Environments
Winning Strategy For Hybrid Cloud Environments
 
From Air Gap to Air Control
From Air Gap to Air ControlFrom Air Gap to Air Control
From Air Gap to Air Control
 
Cisco brand-language-iabc-houston
Cisco brand-language-iabc-houstonCisco brand-language-iabc-houston
Cisco brand-language-iabc-houston
 
Cisco brand-language-iabc-houston
Cisco brand-language-iabc-houstonCisco brand-language-iabc-houston
Cisco brand-language-iabc-houston
 
Cisco - Revamping and Standardizing Global Marketing and Sales Content
Cisco - Revamping and Standardizing Global Marketing and Sales ContentCisco - Revamping and Standardizing Global Marketing and Sales Content
Cisco - Revamping and Standardizing Global Marketing and Sales Content
 
Corporate Visions Conference
Corporate Visions ConferenceCorporate Visions Conference
Corporate Visions Conference
 
«Product Security Incident Response Team (PSIRT) - Изнутри Cisco PSIRT», Алек...
«Product Security Incident Response Team (PSIRT) - Изнутри Cisco PSIRT», Алек...«Product Security Incident Response Team (PSIRT) - Изнутри Cisco PSIRT», Алек...
«Product Security Incident Response Team (PSIRT) - Изнутри Cisco PSIRT», Алек...
 
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
 
Project Management at Cisco Ben Rus TIM 101 Seminar – .docx
Project Management at Cisco Ben Rus TIM 101 Seminar – .docxProject Management at Cisco Ben Rus TIM 101 Seminar – .docx
Project Management at Cisco Ben Rus TIM 101 Seminar – .docx
 
Behind the Curtain: Exposing Advanced Threats
Behind the Curtain: Exposing Advanced ThreatsBehind the Curtain: Exposing Advanced Threats
Behind the Curtain: Exposing Advanced Threats
 
The Next Generation Security
The Next Generation SecurityThe Next Generation Security
The Next Generation Security
 
Predictive Analytics & Visualization - Towards Data Driven Insights for Opens...
Predictive Analytics & Visualization - Towards Data Driven Insights for Opens...Predictive Analytics & Visualization - Towards Data Driven Insights for Opens...
Predictive Analytics & Visualization - Towards Data Driven Insights for Opens...
 
Creating the Workplace of Tomorrow
Creating the Workplace of TomorrowCreating the Workplace of Tomorrow
Creating the Workplace of Tomorrow
 
Security and Virtualization in the Data Center
Security and Virtualization in the Data CenterSecurity and Virtualization in the Data Center
Security and Virtualization in the Data Center
 
Secure Your DevOps Pipeline Best Practices Meetup 08022024.pptx
Secure Your DevOps Pipeline Best Practices Meetup 08022024.pptxSecure Your DevOps Pipeline Best Practices Meetup 08022024.pptx
Secure Your DevOps Pipeline Best Practices Meetup 08022024.pptx
 
Nsc42 security knights slayer of dragons 0-5_very_short_15m_share
Nsc42 security knights slayer of dragons 0-5_very_short_15m_shareNsc42 security knights slayer of dragons 0-5_very_short_15m_share
Nsc42 security knights slayer of dragons 0-5_very_short_15m_share
 
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver Presentation
 

More from DevOpsDays Tel Aviv

YOUR OPEN SOURCE PROJECT IS LIKE A STARTUP, TREAT IT LIKE ONE, EYAR ZILBERMAN...
YOUR OPEN SOURCE PROJECT IS LIKE A STARTUP, TREAT IT LIKE ONE, EYAR ZILBERMAN...YOUR OPEN SOURCE PROJECT IS LIKE A STARTUP, TREAT IT LIKE ONE, EYAR ZILBERMAN...
YOUR OPEN SOURCE PROJECT IS LIKE A STARTUP, TREAT IT LIKE ONE, EYAR ZILBERMAN...
DevOpsDays Tel Aviv
 
GRAPHQL TO THE RES(T)CUE, ELLA SHARAKANSKI, Salto
GRAPHQL TO THE RES(T)CUE, ELLA SHARAKANSKI, SaltoGRAPHQL TO THE RES(T)CUE, ELLA SHARAKANSKI, Salto
GRAPHQL TO THE RES(T)CUE, ELLA SHARAKANSKI, Salto
DevOpsDays Tel Aviv
 
MICROSERVICES ABOVE THE CLOUD - DESIGNING THE INTERNATIONAL SPACE STATION FOR...
MICROSERVICES ABOVE THE CLOUD - DESIGNING THE INTERNATIONAL SPACE STATION FOR...MICROSERVICES ABOVE THE CLOUD - DESIGNING THE INTERNATIONAL SPACE STATION FOR...
MICROSERVICES ABOVE THE CLOUD - DESIGNING THE INTERNATIONAL SPACE STATION FOR...
DevOpsDays Tel Aviv
 
THE (IR)RATIONAL INCIDENT RESPONSE: HOW PSYCHOLOGICAL BIASES AFFECT INCIDENT ...
THE (IR)RATIONAL INCIDENT RESPONSE: HOW PSYCHOLOGICAL BIASES AFFECT INCIDENT ...THE (IR)RATIONAL INCIDENT RESPONSE: HOW PSYCHOLOGICAL BIASES AFFECT INCIDENT ...
THE (IR)RATIONAL INCIDENT RESPONSE: HOW PSYCHOLOGICAL BIASES AFFECT INCIDENT ...
DevOpsDays Tel Aviv
 
PRINCIPLES OF OBSERVABILITY // DANIEL MAHER, DataDog
PRINCIPLES OF OBSERVABILITY // DANIEL MAHER, DataDogPRINCIPLES OF OBSERVABILITY // DANIEL MAHER, DataDog
PRINCIPLES OF OBSERVABILITY // DANIEL MAHER, DataDog
DevOpsDays Tel Aviv
 
NUDGE AND SLUDGE: DRIVING SECURITY WITH DESIGN // J. WOLFGANG GOERLICH, Duo S...
NUDGE AND SLUDGE: DRIVING SECURITY WITH DESIGN // J. WOLFGANG GOERLICH, Duo S...NUDGE AND SLUDGE: DRIVING SECURITY WITH DESIGN // J. WOLFGANG GOERLICH, Duo S...
NUDGE AND SLUDGE: DRIVING SECURITY WITH DESIGN // J. WOLFGANG GOERLICH, Duo S...
DevOpsDays Tel Aviv
 
(Ignite) TAKE A HIKE: PREVENTING BATTERY CORROSION - LEAH VOGEL, CHEGG
(Ignite) TAKE A HIKE: PREVENTING BATTERY CORROSION - LEAH VOGEL, CHEGG(Ignite) TAKE A HIKE: PREVENTING BATTERY CORROSION - LEAH VOGEL, CHEGG
(Ignite) TAKE A HIKE: PREVENTING BATTERY CORROSION - LEAH VOGEL, CHEGG
DevOpsDays Tel Aviv
 
BUILDING A DR PLAN FOR YOUR CLOUD INFRASTRUCTURE FROM THE GROUND UP, MOSHE BE...
BUILDING A DR PLAN FOR YOUR CLOUD INFRASTRUCTURE FROM THE GROUND UP, MOSHE BE...BUILDING A DR PLAN FOR YOUR CLOUD INFRASTRUCTURE FROM THE GROUND UP, MOSHE BE...
BUILDING A DR PLAN FOR YOUR CLOUD INFRASTRUCTURE FROM THE GROUND UP, MOSHE BE...
DevOpsDays Tel Aviv
 
THE THREE DISCIPLINES OF CI/CD SECURITY, DANIEL KRIVELEVICH, Cider Security
THE THREE DISCIPLINES OF CI/CD SECURITY, DANIEL KRIVELEVICH, Cider SecurityTHE THREE DISCIPLINES OF CI/CD SECURITY, DANIEL KRIVELEVICH, Cider Security
THE THREE DISCIPLINES OF CI/CD SECURITY, DANIEL KRIVELEVICH, Cider Security
DevOpsDays Tel Aviv
 
THE PLEASURES OF ON-PREM, TOMER GABEL
THE PLEASURES OF ON-PREM, TOMER GABELTHE PLEASURES OF ON-PREM, TOMER GABEL
THE PLEASURES OF ON-PREM, TOMER GABEL
DevOpsDays Tel Aviv
 
CONFIGURATION MANAGEMENT IN THE CLOUD NATIVE ERA, SHAHAR MINTZ, EggPack
CONFIGURATION MANAGEMENT IN THE CLOUD NATIVE ERA, SHAHAR MINTZ, EggPackCONFIGURATION MANAGEMENT IN THE CLOUD NATIVE ERA, SHAHAR MINTZ, EggPack
CONFIGURATION MANAGEMENT IN THE CLOUD NATIVE ERA, SHAHAR MINTZ, EggPack
DevOpsDays Tel Aviv
 
SOLVING THE DEVOPS CRISIS, ONE PERSON AT A TIME, CHRISTINA BABITSKI, Develeap
SOLVING THE DEVOPS CRISIS, ONE PERSON AT A TIME, CHRISTINA BABITSKI, DeveleapSOLVING THE DEVOPS CRISIS, ONE PERSON AT A TIME, CHRISTINA BABITSKI, Develeap
SOLVING THE DEVOPS CRISIS, ONE PERSON AT A TIME, CHRISTINA BABITSKI, Develeap
DevOpsDays Tel Aviv
 
OPTIMIZING PERFORMANCE USING CONTINUOUS PRODUCTION PROFILING ,YONATAN GOLDSCH...
OPTIMIZING PERFORMANCE USING CONTINUOUS PRODUCTION PROFILING ,YONATAN GOLDSCH...OPTIMIZING PERFORMANCE USING CONTINUOUS PRODUCTION PROFILING ,YONATAN GOLDSCH...
OPTIMIZING PERFORMANCE USING CONTINUOUS PRODUCTION PROFILING ,YONATAN GOLDSCH...
DevOpsDays Tel Aviv
 
HOW TO SCALE YOUR ONCALL OPERATION, AND SURVIVE TO TELL, ANTON DRUKH
HOW TO SCALE YOUR ONCALL OPERATION, AND SURVIVE TO TELL, ANTON DRUKHHOW TO SCALE YOUR ONCALL OPERATION, AND SURVIVE TO TELL, ANTON DRUKH
HOW TO SCALE YOUR ONCALL OPERATION, AND SURVIVE TO TELL, ANTON DRUKH
DevOpsDays Tel Aviv
 
HOW TO OPTIMIZE NON-CODING TIME, ORI KEREN, LinearB
HOW TO OPTIMIZE NON-CODING TIME, ORI KEREN, LinearBHOW TO OPTIMIZE NON-CODING TIME, ORI KEREN, LinearB
HOW TO OPTIMIZE NON-CODING TIME, ORI KEREN, LinearB
DevOpsDays Tel Aviv
 
FLYING BLIND - ACCESSIBILITY IN MONITORING, FEU MOUREK, Icinga
FLYING BLIND - ACCESSIBILITY IN MONITORING, FEU MOUREK, IcingaFLYING BLIND - ACCESSIBILITY IN MONITORING, FEU MOUREK, Icinga
FLYING BLIND - ACCESSIBILITY IN MONITORING, FEU MOUREK, Icinga
DevOpsDays Tel Aviv
 
(Ignite) WHAT'S BURNING THROUGH YOUR CLOUD BILL - GIL BAHAT, CIDER SECURITY
(Ignite) WHAT'S BURNING THROUGH YOUR CLOUD BILL - GIL BAHAT, CIDER SECURITY(Ignite) WHAT'S BURNING THROUGH YOUR CLOUD BILL - GIL BAHAT, CIDER SECURITY
(Ignite) WHAT'S BURNING THROUGH YOUR CLOUD BILL - GIL BAHAT, CIDER SECURITY
DevOpsDays Tel Aviv
 
SLO DRIVEN DEVELOPMENT, ALON NATIV, Tomorrow.io
SLO DRIVEN DEVELOPMENT, ALON NATIV, Tomorrow.ioSLO DRIVEN DEVELOPMENT, ALON NATIV, Tomorrow.io
SLO DRIVEN DEVELOPMENT, ALON NATIV, Tomorrow.io
DevOpsDays Tel Aviv
 
ONBOARDING IN LOCKDOWN, HILA FOX, Augury
ONBOARDING IN LOCKDOWN, HILA FOX, AuguryONBOARDING IN LOCKDOWN, HILA FOX, Augury
ONBOARDING IN LOCKDOWN, HILA FOX, Augury
DevOpsDays Tel Aviv
 
DON'T PANIC: GETTING YOUR INFRASTRUCTURE DRIFT UNDER CONTROL, ERAN BIBI, Firefly
DON'T PANIC: GETTING YOUR INFRASTRUCTURE DRIFT UNDER CONTROL, ERAN BIBI, FireflyDON'T PANIC: GETTING YOUR INFRASTRUCTURE DRIFT UNDER CONTROL, ERAN BIBI, Firefly
DON'T PANIC: GETTING YOUR INFRASTRUCTURE DRIFT UNDER CONTROL, ERAN BIBI, Firefly
DevOpsDays Tel Aviv
 

More from DevOpsDays Tel Aviv (20)

YOUR OPEN SOURCE PROJECT IS LIKE A STARTUP, TREAT IT LIKE ONE, EYAR ZILBERMAN...
YOUR OPEN SOURCE PROJECT IS LIKE A STARTUP, TREAT IT LIKE ONE, EYAR ZILBERMAN...YOUR OPEN SOURCE PROJECT IS LIKE A STARTUP, TREAT IT LIKE ONE, EYAR ZILBERMAN...
YOUR OPEN SOURCE PROJECT IS LIKE A STARTUP, TREAT IT LIKE ONE, EYAR ZILBERMAN...
 
GRAPHQL TO THE RES(T)CUE, ELLA SHARAKANSKI, Salto
GRAPHQL TO THE RES(T)CUE, ELLA SHARAKANSKI, SaltoGRAPHQL TO THE RES(T)CUE, ELLA SHARAKANSKI, Salto
GRAPHQL TO THE RES(T)CUE, ELLA SHARAKANSKI, Salto
 
MICROSERVICES ABOVE THE CLOUD - DESIGNING THE INTERNATIONAL SPACE STATION FOR...
MICROSERVICES ABOVE THE CLOUD - DESIGNING THE INTERNATIONAL SPACE STATION FOR...MICROSERVICES ABOVE THE CLOUD - DESIGNING THE INTERNATIONAL SPACE STATION FOR...
MICROSERVICES ABOVE THE CLOUD - DESIGNING THE INTERNATIONAL SPACE STATION FOR...
 
THE (IR)RATIONAL INCIDENT RESPONSE: HOW PSYCHOLOGICAL BIASES AFFECT INCIDENT ...
THE (IR)RATIONAL INCIDENT RESPONSE: HOW PSYCHOLOGICAL BIASES AFFECT INCIDENT ...THE (IR)RATIONAL INCIDENT RESPONSE: HOW PSYCHOLOGICAL BIASES AFFECT INCIDENT ...
THE (IR)RATIONAL INCIDENT RESPONSE: HOW PSYCHOLOGICAL BIASES AFFECT INCIDENT ...
 
PRINCIPLES OF OBSERVABILITY // DANIEL MAHER, DataDog
PRINCIPLES OF OBSERVABILITY // DANIEL MAHER, DataDogPRINCIPLES OF OBSERVABILITY // DANIEL MAHER, DataDog
PRINCIPLES OF OBSERVABILITY // DANIEL MAHER, DataDog
 
NUDGE AND SLUDGE: DRIVING SECURITY WITH DESIGN // J. WOLFGANG GOERLICH, Duo S...
NUDGE AND SLUDGE: DRIVING SECURITY WITH DESIGN // J. WOLFGANG GOERLICH, Duo S...NUDGE AND SLUDGE: DRIVING SECURITY WITH DESIGN // J. WOLFGANG GOERLICH, Duo S...
NUDGE AND SLUDGE: DRIVING SECURITY WITH DESIGN // J. WOLFGANG GOERLICH, Duo S...
 
(Ignite) TAKE A HIKE: PREVENTING BATTERY CORROSION - LEAH VOGEL, CHEGG
(Ignite) TAKE A HIKE: PREVENTING BATTERY CORROSION - LEAH VOGEL, CHEGG(Ignite) TAKE A HIKE: PREVENTING BATTERY CORROSION - LEAH VOGEL, CHEGG
(Ignite) TAKE A HIKE: PREVENTING BATTERY CORROSION - LEAH VOGEL, CHEGG
 
BUILDING A DR PLAN FOR YOUR CLOUD INFRASTRUCTURE FROM THE GROUND UP, MOSHE BE...
BUILDING A DR PLAN FOR YOUR CLOUD INFRASTRUCTURE FROM THE GROUND UP, MOSHE BE...BUILDING A DR PLAN FOR YOUR CLOUD INFRASTRUCTURE FROM THE GROUND UP, MOSHE BE...
BUILDING A DR PLAN FOR YOUR CLOUD INFRASTRUCTURE FROM THE GROUND UP, MOSHE BE...
 
THE THREE DISCIPLINES OF CI/CD SECURITY, DANIEL KRIVELEVICH, Cider Security
THE THREE DISCIPLINES OF CI/CD SECURITY, DANIEL KRIVELEVICH, Cider SecurityTHE THREE DISCIPLINES OF CI/CD SECURITY, DANIEL KRIVELEVICH, Cider Security
THE THREE DISCIPLINES OF CI/CD SECURITY, DANIEL KRIVELEVICH, Cider Security
 
THE PLEASURES OF ON-PREM, TOMER GABEL
THE PLEASURES OF ON-PREM, TOMER GABELTHE PLEASURES OF ON-PREM, TOMER GABEL
THE PLEASURES OF ON-PREM, TOMER GABEL
 
CONFIGURATION MANAGEMENT IN THE CLOUD NATIVE ERA, SHAHAR MINTZ, EggPack
CONFIGURATION MANAGEMENT IN THE CLOUD NATIVE ERA, SHAHAR MINTZ, EggPackCONFIGURATION MANAGEMENT IN THE CLOUD NATIVE ERA, SHAHAR MINTZ, EggPack
CONFIGURATION MANAGEMENT IN THE CLOUD NATIVE ERA, SHAHAR MINTZ, EggPack
 
SOLVING THE DEVOPS CRISIS, ONE PERSON AT A TIME, CHRISTINA BABITSKI, Develeap
SOLVING THE DEVOPS CRISIS, ONE PERSON AT A TIME, CHRISTINA BABITSKI, DeveleapSOLVING THE DEVOPS CRISIS, ONE PERSON AT A TIME, CHRISTINA BABITSKI, Develeap
SOLVING THE DEVOPS CRISIS, ONE PERSON AT A TIME, CHRISTINA BABITSKI, Develeap
 
OPTIMIZING PERFORMANCE USING CONTINUOUS PRODUCTION PROFILING ,YONATAN GOLDSCH...
OPTIMIZING PERFORMANCE USING CONTINUOUS PRODUCTION PROFILING ,YONATAN GOLDSCH...OPTIMIZING PERFORMANCE USING CONTINUOUS PRODUCTION PROFILING ,YONATAN GOLDSCH...
OPTIMIZING PERFORMANCE USING CONTINUOUS PRODUCTION PROFILING ,YONATAN GOLDSCH...
 
HOW TO SCALE YOUR ONCALL OPERATION, AND SURVIVE TO TELL, ANTON DRUKH
HOW TO SCALE YOUR ONCALL OPERATION, AND SURVIVE TO TELL, ANTON DRUKHHOW TO SCALE YOUR ONCALL OPERATION, AND SURVIVE TO TELL, ANTON DRUKH
HOW TO SCALE YOUR ONCALL OPERATION, AND SURVIVE TO TELL, ANTON DRUKH
 
HOW TO OPTIMIZE NON-CODING TIME, ORI KEREN, LinearB
HOW TO OPTIMIZE NON-CODING TIME, ORI KEREN, LinearBHOW TO OPTIMIZE NON-CODING TIME, ORI KEREN, LinearB
HOW TO OPTIMIZE NON-CODING TIME, ORI KEREN, LinearB
 
FLYING BLIND - ACCESSIBILITY IN MONITORING, FEU MOUREK, Icinga
FLYING BLIND - ACCESSIBILITY IN MONITORING, FEU MOUREK, IcingaFLYING BLIND - ACCESSIBILITY IN MONITORING, FEU MOUREK, Icinga
FLYING BLIND - ACCESSIBILITY IN MONITORING, FEU MOUREK, Icinga
 
(Ignite) WHAT'S BURNING THROUGH YOUR CLOUD BILL - GIL BAHAT, CIDER SECURITY
(Ignite) WHAT'S BURNING THROUGH YOUR CLOUD BILL - GIL BAHAT, CIDER SECURITY(Ignite) WHAT'S BURNING THROUGH YOUR CLOUD BILL - GIL BAHAT, CIDER SECURITY
(Ignite) WHAT'S BURNING THROUGH YOUR CLOUD BILL - GIL BAHAT, CIDER SECURITY
 
SLO DRIVEN DEVELOPMENT, ALON NATIV, Tomorrow.io
SLO DRIVEN DEVELOPMENT, ALON NATIV, Tomorrow.ioSLO DRIVEN DEVELOPMENT, ALON NATIV, Tomorrow.io
SLO DRIVEN DEVELOPMENT, ALON NATIV, Tomorrow.io
 
ONBOARDING IN LOCKDOWN, HILA FOX, Augury
ONBOARDING IN LOCKDOWN, HILA FOX, AuguryONBOARDING IN LOCKDOWN, HILA FOX, Augury
ONBOARDING IN LOCKDOWN, HILA FOX, Augury
 
DON'T PANIC: GETTING YOUR INFRASTRUCTURE DRIFT UNDER CONTROL, ERAN BIBI, Firefly
DON'T PANIC: GETTING YOUR INFRASTRUCTURE DRIFT UNDER CONTROL, ERAN BIBI, FireflyDON'T PANIC: GETTING YOUR INFRASTRUCTURE DRIFT UNDER CONTROL, ERAN BIBI, Firefly
DON'T PANIC: GETTING YOUR INFRASTRUCTURE DRIFT UNDER CONTROL, ERAN BIBI, Firefly
 

Recently uploaded

Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
Vlad Stirbu
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Enhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZEnhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZ
Globus
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
Jen Stirrup
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
UiPathCommunity
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 

Recently uploaded (20)

Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Enhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZEnhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZ
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 

DevOps Days Tel Aviv 2013: What exactly is anti-fragile in DevOps? - Asher Sterkin

  • 1. What is Exactly Anti-Fragile in DevOps? Asher Sterkin Distinguished Engineer, SPVSS, Cisco Video Systems, Israel September 30, 2013 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1
  • 2. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
  • 3. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
  • 4. Antifragile Some things benefit from shocks… volatility, randomness, disorder, and stressors and love adventure, risk, and uncertainty… there is no word for the exact opposite of fragile. Let’s call it antifragile. Nassim N. Taleb, “Antifragile. Things that gain from disorder” © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
  • 5. The Book and Reactions I think this concept is incredibly powerful when applied to systems and organizational architecture. Jez Humble, “On Antifragility in Systems and Organizational Structure” © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
  • 6. The Book and Reactions The Netflix cloud architecture is anti-fragile… The Netflix culture is anti-fragile… Getting stronger through failure is the basis of antifragility. Avoiding failure at all costs … makes you brittle and vulnerable... Adrian Cockcroft, “Looking back at 2012 with pointers to 2013” © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
  • 7. The Book and Reactions If the idea is nice and neat, however, the book that houses it is just the opposite. It is a big, baggy, sprawling mess. David Runciman, review of the book in Guardian November 21, 2012 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
  • 8. Larger Body of Knowledge • • Highly-Optimized Tolerance • Technology Development Cycle • Disruptive Innovations • Product Development Flow • © 2013 Cisco and/or its affiliates. All rights reserved. Complex Adaptive Systems Lean Start Up Cisco Confidential 8
  • 9. For Today • De-fragilization • Skin in the Game • Barbell • Asymmetric Pay-off © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
  • 10. DevOps Areas Area 3: embed project knowledge into operations Area 1: extend delivery to production DEV Area 2: extend operations feedback to project OPS Area 4: embed operations knowledge into project © 2013 Cisco and/or its affiliates. All rights reserved. Patrick Debois: “Codifying devops practices” Cisco Confidential 10
  • 11. De-Fragilization © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
  • 12. “Beauty plus pity-that is the closest we can get to a definition of art. Where there is beauty there is pity for the simple reason that beauty must die: beauty always dies, the manner dies with the matter, the world dies with the individual.” V. Nabokov, “Lecture on Metamorphosis” © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
  • 13. DevOps Areas Area 3: embed project knowledge into operations Area 1: extend delivery to production DEV Area 2: extend operations feedback to project OPS Area 4: embed operations knowledge into project © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
  • 14. Continuous Delivery ... to exert a constant stress on your delivery and deployment process to reduce its fragility so that releasing becomes a boring, low-risk activity. Jez Humble, “On Antifragility in Systems and Organizational Structure” © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14
  • 15. Large batches increase variability in flow John Allspaw: “Ops Meta-Metrics”, slides 103-109 Large batches increase cycle time © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
  • 16. Reducing batch size reduces risk Reducing batch size reduces overhead Reducing batch size accelerates feedback © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16
  • 17. Batch size and Bottlenecks Reduce batch size before you attack bottlenecks © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17
  • 18. DevOps Areas Area 3: embed project knowledge into operations Area 1: extend delivery to production DEV Area 2: extend operations feedback to project OPS Area 4: embed operations knowledge into project © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18
  • 19. “Resilience through Failure” © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
  • 20. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20
  • 21. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21
  • 22. Culture of Continuous Learning Resilience to failure is a lofty goal. It enables a system to survive and withstand failure. There's an even higher peak to strive for, however: making the system stronger and better with each failure. A. Tseitlin, “The Antifragile Organization” © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
  • 23. “Confusing common causes with special causes will only make things worse E. Deming, “Out of Crisis” © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23
  • 24. Resilience, Reliability, Robustness Normal Operation Failure! Normal Operation Max Downtime MTBF MTTD MTTR MTBF Max Data Lost © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24
  • 25. “Obsessive protection of the system against extremely rare events makes it more fragile. Resilience comes before the last percentiles of reliability. It’s me © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25
  • 26. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26
  • 27. DevOps Areas Area 3: embed project knowledge into operations Area 1: extend delivery to production DEV Area 2: extend operations feedback to project OPS Area 4: embed operations knowledge into project © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27
  • 28. Give ‘em pagers! © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28
  • 29. “DevOps: architects, developers, QA/QC, system engineers, and IT cooperate to maximize the company value It’s me again © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29
  • 30. Barbell © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30
  • 31. DevOps Areas Area 3: embed project knowledge into operations Area 1: extend delivery to production DEV Area 2: extend operations feedback to project OPS Area 4: embed operations knowledge into project © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 31
  • 32. © 2013 Cisco and/or its affiliates. All rights reserved. John Alsspaw, “Dev and Ops Collaboration” Cisco Confidential 32
  • 33. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 33
  • 34. John Allspaw, “Reply to NoOps @ Netflix” Developers Operations • Responding to outages, takes on-call • Responding to outages, takes on-call • Alerting systems thresholding, design • Alerting systems thresholding, design • Architecture design and review • Architecture design and review • Building metrics collection • Building metrics collection • Application configuration • Application configuration • Shipping public-facing code • Infrastructure buildout/management © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 34
  • 35. DevOps Areas Area 3: embed project knowledge into operations Area 1: extend delivery to production DEV Area 2: extend operations feedback to project Area 4: embed operations knowledge into project © 2013 Cisco and/or its affiliates. All rights reserved. OPS No, not really Cisco Confidential 35
  • 36. Every analogy has its limit. One just needs to learn where to stop. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 36
  • 37. “ The first step to anti-fragility consists in decreasing downside…This brings us to the solution in the form of barbell … Away from Golden Middle. N. Taleb, “Antifragile” © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 37
  • 38. Risk Aversion Risk Loving Away from golden Middle © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 38
  • 39. © 2013 Cisco and/or its affiliates. All rights reserved. Niek Bartholomeus, “DevOps For Dinosaurs” Cisco Confidential 39
  • 40. Risk Aversion © 2013 Cisco and/or its affiliates. All rights reserved. Risk Loving Jeremy Edberg, “DevOps at Netflix” Cisco Confidential 40
  • 41. “ The downside/lost should be known and protected, not probability N. Taleb, “Antifragile” © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 41
  • 42. “ You never know where from your next outage or cyber attack will come from and when. The maximal downtime and maximal data lost should be known and guaranteed regardless of probabilities. It’s me © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 42
  • 43. Gain Gain/Loss f(x) Asymmetric Pay-Offs Pain x © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 43
  • 44. DevOps Areas Area 3: embed project knowledge into operations Area 1: extend delivery to production DEV Area 2: extend operations feedback to project OPS Area 4: embed operations knowledge into project © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 44
  • 45. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 45
  • 46. “ Never be sucker. Period! N. Taleb © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 46