SlideShare une entreprise Scribd logo
1  sur  47
Télécharger pour lire hors ligne
Cisco Confidential© 2013 Cisco and/or its affiliates. All rights reserved. 1
What is Exactly Anti-Fragile
in DevOps?
Asher Sterkin
Distinguished Engineer, SPVSS, Cisco Video Systems, Israel
September 30, 2013
Cisco Confidential© 2013 Cisco and/or its affiliates. All rights reserved. 2
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
Antifragile
Some things benefit from shocks…
volatility, randomness, disorder,
and stressors and love adventure,
risk, and uncertainty… there is no
word for the exact opposite of
fragile. Let’s call it antifragile.
Nassim N. Taleb, “Antifragile. Things that gain from
disorder”
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
The Book and Reactions
I think this concept is incredibly
powerful when applied to systems
and organizational architecture.
Jez Humble, “On Antifragility in Systems and
Organizational Structure”
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
The Book and Reactions
The Netflix cloud architecture is
anti-fragile… The Netflix culture is
anti-fragile… Getting stronger
through failure is the basis of anti-
fragility. Avoiding failure at all costs
… makes you brittle and
vulnerable...
Adrian Cockcroft, “Looking back at 2012 with
pointers to 2013”
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
The Book and Reactions
If the idea is nice and neat,
however, the book that houses it
is just the opposite. It is a big,
baggy, sprawling mess.
David Runciman, review of the book in Guardian
November 21, 2012
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
Larger Body of Knowledge
• Complex Adaptive Systems
• Highly-Optimized Tolerance
• Technology Development Cycle
• Disruptive Innovations
• Product Development Flow
• Lean Start Up
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
For Today
• De-fragilization
• Skin in the Game
• Barbell
• Asymmetric Pay-off
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
DevOps Areas
OPSDEV
Area 1: extend delivery to
production
Area 2: extend operations
feedback to project
Area 3: embed project knowledge into operations
Area 4: embed operations knowledge into project
Patrick Debois: “Codifying devops practices”
Cisco Confidential© 2013 Cisco and/or its affiliates. All rights reserved. 11
De-Fragilization
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
“Beauty plus pity-that is the closest we can
get to a definition of art. Where there is
beauty there is pity for the simple reason
that beauty must die: beauty always dies,
the manner dies with the matter, the world
dies with the individual.”
V. Nabokov, “Lecture on Metamorphosis”
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
DevOps Areas
OPSDEV
Area 1: extend delivery to
production
Area 2: extend operations
feedback to project
Area 3: embed project knowledge into operations
Area 4: embed operations knowledge into project
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14
Continuous Delivery
... to exert a constant stress on
your delivery and deployment
process to reduce its fragility so
that releasing becomes a
boring, low-risk activity.
Jez Humble, “On Antifragility in Systems and
Organizational Structure”
Cisco Confidential© 2013 Cisco and/or its affiliates. All rights reserved. 15
Large batches increase cycle time
Large batches increase variability in flow
John Allspaw: “Ops Meta-Metrics”,
slides 103-109
Cisco Confidential© 2013 Cisco and/or its affiliates. All rights reserved. 16
Reducing batch size accelerates feedback
Reducing batch size reduces overhead
Reducing batch size reduces risk
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17
Batch size and Bottlenecks
Reduce batch
size before you
attack
bottlenecks
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18
DevOps Areas
OPSDEV
Area 1: extend delivery to
production
Area 2: extend operations
feedback to project
Area 3: embed project knowledge into operations
Area 4: embed operations knowledge into project
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
“Resilience through Failure”
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
Resilience to failure is a
lofty goal. It enables a
system to survive and
withstand failure. There's an
even higher peak to strive
for, however: making the
system stronger and better
with each failure.
A. Tseitlin, “The Antifragile Organization”
Culture of Continuous Learning
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23
E. Deming, “Out of Crisis”
“Confusing common
causes with special
causes will only make
things worse
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24
Resilience, Reliability, Robustness
Normal Operation
MTBF
Failure!
MTTD MTTR
Max Downtime
Normal Operation
MTBF
Max Data
Lost
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25
It’s me
“Obsessive protection of the
system against extremely rare
events makes it more fragile.
Resilience comes before the
last percentiles of reliability.
Cisco Confidential© 2013 Cisco and/or its affiliates. All rights reserved. 26
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27
DevOps Areas
OPSDEV
Area 1: extend delivery to
production
Area 2: extend operations
feedback to project
Area 3: embed project knowledge into operations
Area 4: embed operations knowledge into project
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28
Give ‘em pagers!
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29
“DevOps: architects,
developers, QA/QC,
system engineers, and IT
cooperate to maximize
the company value
It’s me again
Cisco Confidential© 2013 Cisco and/or its affiliates. All rights reserved. 30
Barbell
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 31
DevOps Areas
OPSDEV
Area 1: extend delivery to
production
Area 2: extend operations
feedback to project
Area 3: embed project knowledge into operations
Area 4: embed operations knowledge into project
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 32John Alsspaw, “Dev and Ops Collaboration”
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 33
Cisco Confidential© 2013 Cisco and/or its affiliates. All rights reserved. 34
Developers
• Responding to outages, takes
on-call
• Alerting systems thresholding,
design
• Architecture design and review
• Building metrics collection
• Application configuration
• Shipping public-facing code
• Responding to outages, takes
on-call
• Alerting systems thresholding,
design
• Architecture design and review
• Building metrics collection
• Application configuration
• Infrastructure
buildout/management
Operations
John Allspaw, “Reply to NoOps @ Netflix”
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 35
DevOps Areas
OPSDEV
Area 1: extend delivery to
production
Area 2: extend operations
feedback to project
Area 3: embed project knowledge into operations
Area 4: embed operations knowledge into project No, not really
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 36
Every analogy has its limit.
One just needs to learn where
to stop.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 37
N. Taleb, “Antifragile”
“The first step to anti-fragility
consists in decreasing
downside…This brings us to the
solution in the form of barbell …
Away from Golden Middle.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 38
Away from golden Middle
Risk
Aversion
Risk
Loving
Cisco Confidential© 2013 Cisco and/or its affiliates. All rights reserved. 39
Niek Bartholomeus,
“DevOps For Dinosaurs”
Cisco Confidential© 2013 Cisco and/or its affiliates. All rights reserved. 40Jeremy Edberg, “DevOps at Netflix”
Risk Aversion Risk Loving
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 41
N. Taleb, “Antifragile”
“The downside/lost should be
known and protected, not
probability
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 42
It’s me
“ You never know where from your next
outage or cyber attack will come from
and when.
The maximal downtime and maximal
data lost should be known and
guaranteed regardless of
probabilities.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 43
Asymmetric Pay-Offs
x
Gain/Lossf(x)
Pain
Gain
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 44
DevOps Areas
OPSDEV
Area 1: extend delivery to
production
Area 2: extend operations
feedback to project
Area 3: embed project knowledge into operations
Area 4: embed operations knowledge into project
Cisco Confidential© 2013 Cisco and/or its affiliates. All rights reserved. 45
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 46
N. Taleb
“Never be sucker. Period!
Thanks

Contenu connexe

Tendances

DevOps for Defenders in the Enterprise
DevOps for Defenders in the EnterpriseDevOps for Defenders in the Enterprise
DevOps for Defenders in the EnterpriseJames Wickett
 
To dev secops or not to devsecops is that a question ?
To dev secops or not to devsecops   is that a question ?To dev secops or not to devsecops   is that a question ?
To dev secops or not to devsecops is that a question ?🙃 Mario Platt
 
Cisco Connect 2018 Indonesia - Cybersecurity Strategy
Cisco Connect 2018 Indonesia - Cybersecurity StrategyCisco Connect 2018 Indonesia - Cybersecurity Strategy
Cisco Connect 2018 Indonesia - Cybersecurity StrategyNetworkCollaborators
 
After the Catastrophe: IP Resiliency In the Post-Disaster Environment
After the Catastrophe: IP Resiliency In the Post-Disaster Environment After the Catastrophe: IP Resiliency In the Post-Disaster Environment
After the Catastrophe: IP Resiliency In the Post-Disaster Environment Cisco Crisis Response
 
A Tale of Woe, Chaos, and Business
A Tale of Woe, Chaos, and BusinessA Tale of Woe, Chaos, and Business
A Tale of Woe, Chaos, and BusinessJames Wickett
 
[Cisco Connect 2018 - Vietnam] Brian cotaz cyber security strategy
[Cisco Connect 2018 - Vietnam] Brian cotaz   cyber security strategy [Cisco Connect 2018 - Vietnam] Brian cotaz   cyber security strategy
[Cisco Connect 2018 - Vietnam] Brian cotaz cyber security strategy Nur Shiqim Chok
 
Pragmatic Security and Rugged DevOps - SXSW 2015
Pragmatic Security and Rugged DevOps - SXSW 2015Pragmatic Security and Rugged DevOps - SXSW 2015
Pragmatic Security and Rugged DevOps - SXSW 2015James Wickett
 
Cisco Connect 2018 Malaysia - SDNNFV telco data center transformation
Cisco Connect 2018 Malaysia - SDNNFV telco data center transformationCisco Connect 2018 Malaysia - SDNNFV telco data center transformation
Cisco Connect 2018 Malaysia - SDNNFV telco data center transformationNetworkCollaborators
 
Cisco Connect 2018 Indonesia - software-defined access-a transformational ap...
Cisco Connect 2018 Indonesia -  software-defined access-a transformational ap...Cisco Connect 2018 Indonesia -  software-defined access-a transformational ap...
Cisco Connect 2018 Indonesia - software-defined access-a transformational ap...NetworkCollaborators
 
Security at the Breaking Point: Rethink Security in 2013
Security at the Breaking Point: Rethink Security in 2013Security at the Breaking Point: Rethink Security in 2013
Security at the Breaking Point: Rethink Security in 2013 Skybox Security
 
Cisco Connect 2018 Malaysia - Cisco services-guiding your digital transformation
Cisco Connect 2018 Malaysia - Cisco services-guiding your digital transformationCisco Connect 2018 Malaysia - Cisco services-guiding your digital transformation
Cisco Connect 2018 Malaysia - Cisco services-guiding your digital transformationNetworkCollaborators
 
Deployment Review: Carlton Complex Wildfire
Deployment Review: Carlton Complex WildfireDeployment Review: Carlton Complex Wildfire
Deployment Review: Carlton Complex WildfireCisco Crisis Response
 
The Network Enabled Emergency Operations Center (EOC)
The Network Enabled Emergency Operations Center (EOC)The Network Enabled Emergency Operations Center (EOC)
The Network Enabled Emergency Operations Center (EOC)Cisco Crisis Response
 
Hastily Formed Networks (HFN) at the Waldo Canyon Fire
Hastily Formed Networks (HFN) at the Waldo Canyon FireHastily Formed Networks (HFN) at the Waldo Canyon Fire
Hastily Formed Networks (HFN) at the Waldo Canyon FireRakesh Bharania
 
Dev(Sec)Ops - Architecture for Security and Compliance
Dev(Sec)Ops - Architecture for Security and ComplianceDev(Sec)Ops - Architecture for Security and Compliance
Dev(Sec)Ops - Architecture for Security and ComplianceYi-Feng Tzeng
 

Tendances (19)

DevOps for Defenders in the Enterprise
DevOps for Defenders in the EnterpriseDevOps for Defenders in the Enterprise
DevOps for Defenders in the Enterprise
 
To dev secops or not to devsecops is that a question ?
To dev secops or not to devsecops   is that a question ?To dev secops or not to devsecops   is that a question ?
To dev secops or not to devsecops is that a question ?
 
Cisco Connect 2018 Indonesia - Cybersecurity Strategy
Cisco Connect 2018 Indonesia - Cybersecurity StrategyCisco Connect 2018 Indonesia - Cybersecurity Strategy
Cisco Connect 2018 Indonesia - Cybersecurity Strategy
 
After the Catastrophe: IP Resiliency In the Post-Disaster Environment
After the Catastrophe: IP Resiliency In the Post-Disaster Environment After the Catastrophe: IP Resiliency In the Post-Disaster Environment
After the Catastrophe: IP Resiliency In the Post-Disaster Environment
 
A Tale of Woe, Chaos, and Business
A Tale of Woe, Chaos, and BusinessA Tale of Woe, Chaos, and Business
A Tale of Woe, Chaos, and Business
 
The Network Enabled EOC
The Network Enabled EOCThe Network Enabled EOC
The Network Enabled EOC
 
[Cisco Connect 2018 - Vietnam] Brian cotaz cyber security strategy
[Cisco Connect 2018 - Vietnam] Brian cotaz   cyber security strategy [Cisco Connect 2018 - Vietnam] Brian cotaz   cyber security strategy
[Cisco Connect 2018 - Vietnam] Brian cotaz cyber security strategy
 
Pragmatic Security and Rugged DevOps - SXSW 2015
Pragmatic Security and Rugged DevOps - SXSW 2015Pragmatic Security and Rugged DevOps - SXSW 2015
Pragmatic Security and Rugged DevOps - SXSW 2015
 
Cisco Connect 2018 Malaysia - SDNNFV telco data center transformation
Cisco Connect 2018 Malaysia - SDNNFV telco data center transformationCisco Connect 2018 Malaysia - SDNNFV telco data center transformation
Cisco Connect 2018 Malaysia - SDNNFV telco data center transformation
 
Securing Humanitarian Connectivity
Securing Humanitarian ConnectivitySecuring Humanitarian Connectivity
Securing Humanitarian Connectivity
 
Cisco Connect 2018 Indonesia - software-defined access-a transformational ap...
Cisco Connect 2018 Indonesia -  software-defined access-a transformational ap...Cisco Connect 2018 Indonesia -  software-defined access-a transformational ap...
Cisco Connect 2018 Indonesia - software-defined access-a transformational ap...
 
Security at the Breaking Point: Rethink Security in 2013
Security at the Breaking Point: Rethink Security in 2013Security at the Breaking Point: Rethink Security in 2013
Security at the Breaking Point: Rethink Security in 2013
 
Cisco Connect 2018 Malaysia - Cisco services-guiding your digital transformation
Cisco Connect 2018 Malaysia - Cisco services-guiding your digital transformationCisco Connect 2018 Malaysia - Cisco services-guiding your digital transformation
Cisco Connect 2018 Malaysia - Cisco services-guiding your digital transformation
 
Compliance what does security have to do with it
Compliance what does security have to do with it Compliance what does security have to do with it
Compliance what does security have to do with it
 
Deployment Review: Carlton Complex Wildfire
Deployment Review: Carlton Complex WildfireDeployment Review: Carlton Complex Wildfire
Deployment Review: Carlton Complex Wildfire
 
The Network Enabled Emergency Operations Center (EOC)
The Network Enabled Emergency Operations Center (EOC)The Network Enabled Emergency Operations Center (EOC)
The Network Enabled Emergency Operations Center (EOC)
 
Hastily Formed Networks (HFN) at the Waldo Canyon Fire
Hastily Formed Networks (HFN) at the Waldo Canyon FireHastily Formed Networks (HFN) at the Waldo Canyon Fire
Hastily Formed Networks (HFN) at the Waldo Canyon Fire
 
Connecting Syria's Refugees
Connecting Syria's RefugeesConnecting Syria's Refugees
Connecting Syria's Refugees
 
Dev(Sec)Ops - Architecture for Security and Compliance
Dev(Sec)Ops - Architecture for Security and ComplianceDev(Sec)Ops - Architecture for Security and Compliance
Dev(Sec)Ops - Architecture for Security and Compliance
 

En vedette

טלפונים חכמים ואתם
טלפונים חכמים ואתםטלפונים חכמים ואתם
טלפונים חכמים ואתםIdan ofek
 
Code quality as a built-in process
Code quality as a built-in processCode quality as a built-in process
Code quality as a built-in processElad Maimon
 
1953 and all that. A tale of two sciences (Kitcher, 1984)
1953 and all that. A tale of two sciences (Kitcher, 1984)1953 and all that. A tale of two sciences (Kitcher, 1984)
1953 and all that. A tale of two sciences (Kitcher, 1984)Yoav Francis
 
Guice - dependency injection framework
Guice - dependency injection frameworkGuice - dependency injection framework
Guice - dependency injection frameworkEvgeny Barabanov
 
מכתב המלצה - לירן פרידמן
מכתב המלצה - לירן פרידמןמכתב המלצה - לירן פרידמן
מכתב המלצה - לירן פרידמןLiran Fridman
 
NUnit Features Presentation
NUnit Features PresentationNUnit Features Presentation
NUnit Features PresentationShir Brass
 
Responsive Web Design
Responsive Web DesignResponsive Web Design
Responsive Web DesignNir Elbaz
 
Work-for-hire Game Studios: Elevate Your Game
Work-for-hire Game Studios: Elevate Your GameWork-for-hire Game Studios: Elevate Your Game
Work-for-hire Game Studios: Elevate Your GameGur Dotan
 
Dynamo and BigTable - Review and Comparison
Dynamo and BigTable - Review and ComparisonDynamo and BigTable - Review and Comparison
Dynamo and BigTable - Review and ComparisonGrisha Weintraub
 
Bootstrapping a Tech Community - Demi Ben-Ari
Bootstrapping a Tech Community - Demi Ben-AriBootstrapping a Tech Community - Demi Ben-Ari
Bootstrapping a Tech Community - Demi Ben-AriDemi Ben-Ari
 

En vedette (11)

טלפונים חכמים ואתם
טלפונים חכמים ואתםטלפונים חכמים ואתם
טלפונים חכמים ואתם
 
Code quality as a built-in process
Code quality as a built-in processCode quality as a built-in process
Code quality as a built-in process
 
1953 and all that. A tale of two sciences (Kitcher, 1984)
1953 and all that. A tale of two sciences (Kitcher, 1984)1953 and all that. A tale of two sciences (Kitcher, 1984)
1953 and all that. A tale of two sciences (Kitcher, 1984)
 
Guice - dependency injection framework
Guice - dependency injection frameworkGuice - dependency injection framework
Guice - dependency injection framework
 
מכתב המלצה - לירן פרידמן
מכתב המלצה - לירן פרידמןמכתב המלצה - לירן פרידמן
מכתב המלצה - לירן פרידמן
 
NUnit Features Presentation
NUnit Features PresentationNUnit Features Presentation
NUnit Features Presentation
 
Responsive Web Design
Responsive Web DesignResponsive Web Design
Responsive Web Design
 
Work-for-hire Game Studios: Elevate Your Game
Work-for-hire Game Studios: Elevate Your GameWork-for-hire Game Studios: Elevate Your Game
Work-for-hire Game Studios: Elevate Your Game
 
Hibernate caching
Hibernate cachingHibernate caching
Hibernate caching
 
Dynamo and BigTable - Review and Comparison
Dynamo and BigTable - Review and ComparisonDynamo and BigTable - Review and Comparison
Dynamo and BigTable - Review and Comparison
 
Bootstrapping a Tech Community - Demi Ben-Ari
Bootstrapping a Tech Community - Demi Ben-AriBootstrapping a Tech Community - Demi Ben-Ari
Bootstrapping a Tech Community - Demi Ben-Ari
 

Similaire à What is exactly anti fragile in dev ops - v3

DevOps Days Tel Aviv 2013: What exactly is anti-fragile in DevOps? - Asher St...
DevOps Days Tel Aviv 2013: What exactly is anti-fragile in DevOps? - Asher St...DevOps Days Tel Aviv 2013: What exactly is anti-fragile in DevOps? - Asher St...
DevOps Days Tel Aviv 2013: What exactly is anti-fragile in DevOps? - Asher St...DevOpsDays Tel Aviv
 
Cisco - Revamping and Standardizing Global Marketing and Sales Content
Cisco - Revamping and Standardizing Global Marketing and Sales ContentCisco - Revamping and Standardizing Global Marketing and Sales Content
Cisco - Revamping and Standardizing Global Marketing and Sales ContentCorporate Visions
 
Cisco brand-language-iabc-houston
Cisco brand-language-iabc-houstonCisco brand-language-iabc-houston
Cisco brand-language-iabc-houstonEmily Murphy
 
Cisco brand-language-iabc-houston
Cisco brand-language-iabc-houstonCisco brand-language-iabc-houston
Cisco brand-language-iabc-houstonIABC Houston
 
Scalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa PresentationScalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa PresentationScalar Decisions
 
Project Management at Cisco Ben Rus TIM 101 Seminar – .docx
Project Management at Cisco Ben Rus TIM 101 Seminar – .docxProject Management at Cisco Ben Rus TIM 101 Seminar – .docx
Project Management at Cisco Ben Rus TIM 101 Seminar – .docxwoodruffeloisa
 
Creating the Workplace of Tomorrow
Creating the Workplace of TomorrowCreating the Workplace of Tomorrow
Creating the Workplace of TomorrowCisco Canada
 
From Air Gap to Air Control
From Air Gap to Air ControlFrom Air Gap to Air Control
From Air Gap to Air ControlEnergySec
 
Next Generation Security
Next Generation SecurityNext Generation Security
Next Generation SecurityCisco Canada
 
Winning Strategy For Hybrid Cloud Environments
Winning Strategy For Hybrid Cloud EnvironmentsWinning Strategy For Hybrid Cloud Environments
Winning Strategy For Hybrid Cloud EnvironmentsCarl De Groote
 
«Product Security Incident Response Team (PSIRT) - Изнутри Cisco PSIRT», Алек...
«Product Security Incident Response Team (PSIRT) - Изнутри Cisco PSIRT», Алек...«Product Security Incident Response Team (PSIRT) - Изнутри Cisco PSIRT», Алек...
«Product Security Incident Response Team (PSIRT) - Изнутри Cisco PSIRT», Алек...Mail.ru Group
 
Predictive Analytics & Visualization - Towards Data Driven Insights for Opens...
Predictive Analytics & Visualization - Towards Data Driven Insights for Opens...Predictive Analytics & Visualization - Towards Data Driven Insights for Opens...
Predictive Analytics & Visualization - Towards Data Driven Insights for Opens...Debojyoti Dutta
 
Security and Virtualization in the Data Center
Security and Virtualization in the Data CenterSecurity and Virtualization in the Data Center
Security and Virtualization in the Data CenterCisco Canada
 
SDN Adoption Challenges
SDN Adoption Challenges SDN Adoption Challenges
SDN Adoption Challenges Vimal Suba
 
Nsc42 security knights slayer of dragons 0-5_very_short_15m_share
Nsc42 security knights slayer of dragons 0-5_very_short_15m_shareNsc42 security knights slayer of dragons 0-5_very_short_15m_share
Nsc42 security knights slayer of dragons 0-5_very_short_15m_shareNSC42 Ltd
 
Will the Cloud be your disaster, or will Cloud be your disaster recovery?
Will the Cloud be your disaster, or will Cloud be your disaster recovery?Will the Cloud be your disaster, or will Cloud be your disaster recovery?
Will the Cloud be your disaster, or will Cloud be your disaster recovery?Livingstone Advisory
 
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Decisions
 
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation SecurityBGA Cyber Security
 
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud WorldCisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud WorldNetworkCollaborators
 

Similaire à What is exactly anti fragile in dev ops - v3 (20)

DevOps Days Tel Aviv 2013: What exactly is anti-fragile in DevOps? - Asher St...
DevOps Days Tel Aviv 2013: What exactly is anti-fragile in DevOps? - Asher St...DevOps Days Tel Aviv 2013: What exactly is anti-fragile in DevOps? - Asher St...
DevOps Days Tel Aviv 2013: What exactly is anti-fragile in DevOps? - Asher St...
 
Cisco - Revamping and Standardizing Global Marketing and Sales Content
Cisco - Revamping and Standardizing Global Marketing and Sales ContentCisco - Revamping and Standardizing Global Marketing and Sales Content
Cisco - Revamping and Standardizing Global Marketing and Sales Content
 
Corporate Visions Conference
Corporate Visions ConferenceCorporate Visions Conference
Corporate Visions Conference
 
Cisco brand-language-iabc-houston
Cisco brand-language-iabc-houstonCisco brand-language-iabc-houston
Cisco brand-language-iabc-houston
 
Cisco brand-language-iabc-houston
Cisco brand-language-iabc-houstonCisco brand-language-iabc-houston
Cisco brand-language-iabc-houston
 
Scalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa PresentationScalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa Presentation
 
Project Management at Cisco Ben Rus TIM 101 Seminar – .docx
Project Management at Cisco Ben Rus TIM 101 Seminar – .docxProject Management at Cisco Ben Rus TIM 101 Seminar – .docx
Project Management at Cisco Ben Rus TIM 101 Seminar – .docx
 
Creating the Workplace of Tomorrow
Creating the Workplace of TomorrowCreating the Workplace of Tomorrow
Creating the Workplace of Tomorrow
 
From Air Gap to Air Control
From Air Gap to Air ControlFrom Air Gap to Air Control
From Air Gap to Air Control
 
Next Generation Security
Next Generation SecurityNext Generation Security
Next Generation Security
 
Winning Strategy For Hybrid Cloud Environments
Winning Strategy For Hybrid Cloud EnvironmentsWinning Strategy For Hybrid Cloud Environments
Winning Strategy For Hybrid Cloud Environments
 
«Product Security Incident Response Team (PSIRT) - Изнутри Cisco PSIRT», Алек...
«Product Security Incident Response Team (PSIRT) - Изнутри Cisco PSIRT», Алек...«Product Security Incident Response Team (PSIRT) - Изнутри Cisco PSIRT», Алек...
«Product Security Incident Response Team (PSIRT) - Изнутри Cisco PSIRT», Алек...
 
Predictive Analytics & Visualization - Towards Data Driven Insights for Opens...
Predictive Analytics & Visualization - Towards Data Driven Insights for Opens...Predictive Analytics & Visualization - Towards Data Driven Insights for Opens...
Predictive Analytics & Visualization - Towards Data Driven Insights for Opens...
 
Security and Virtualization in the Data Center
Security and Virtualization in the Data CenterSecurity and Virtualization in the Data Center
Security and Virtualization in the Data Center
 
SDN Adoption Challenges
SDN Adoption Challenges SDN Adoption Challenges
SDN Adoption Challenges
 
Nsc42 security knights slayer of dragons 0-5_very_short_15m_share
Nsc42 security knights slayer of dragons 0-5_very_short_15m_shareNsc42 security knights slayer of dragons 0-5_very_short_15m_share
Nsc42 security knights slayer of dragons 0-5_very_short_15m_share
 
Will the Cloud be your disaster, or will Cloud be your disaster recovery?
Will the Cloud be your disaster, or will Cloud be your disaster recovery?Will the Cloud be your disaster, or will Cloud be your disaster recovery?
Will the Cloud be your disaster, or will Cloud be your disaster recovery?
 
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver Presentation
 
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
 
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud WorldCisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
 

Plus de Asher Sterkin

Essence of Requirements Engineering: Pragmatic Insights for 2024
Essence of Requirements Engineering: Pragmatic Insights for 2024Essence of Requirements Engineering: Pragmatic Insights for 2024
Essence of Requirements Engineering: Pragmatic Insights for 2024Asher Sterkin
 
Cloud Infrastructure from Python Code: PyCon DE-23
Cloud Infrastructure from Python Code: PyCon DE-23Cloud Infrastructure from Python Code: PyCon DE-23
Cloud Infrastructure from Python Code: PyCon DE-23Asher Sterkin
 
pyjamas22_ generic composite in python.pdf
pyjamas22_ generic composite in python.pdfpyjamas22_ generic composite in python.pdf
pyjamas22_ generic composite in python.pdfAsher Sterkin
 
If your computer is cloud what its Operating System look like?
If your computer is cloud what its Operating System look like?If your computer is cloud what its Operating System look like?
If your computer is cloud what its Operating System look like?Asher Sterkin
 
Serverless flow programming a new perspective (py web meetup, sept 2nd, 2019...
Serverless flow programming  a new perspective (py web meetup, sept 2nd, 2019...Serverless flow programming  a new perspective (py web meetup, sept 2nd, 2019...
Serverless flow programming a new perspective (py web meetup, sept 2nd, 2019...Asher Sterkin
 
Documenting serverless architectures could we do it better - o'reily sa con...
Documenting serverless architectures  could we do it better  - o'reily sa con...Documenting serverless architectures  could we do it better  - o'reily sa con...
Documenting serverless architectures could we do it better - o'reily sa con...Asher Sterkin
 
Developing cloud serverless components in Python: DDD Perspective
Developing cloud serverless components in Python: DDD PerspectiveDeveloping cloud serverless components in Python: DDD Perspective
Developing cloud serverless components in Python: DDD PerspectiveAsher Sterkin
 
Shaping serverless architecture with domain driven design patterns - py web-il
Shaping serverless architecture with domain driven design patterns - py web-ilShaping serverless architecture with domain driven design patterns - py web-il
Shaping serverless architecture with domain driven design patterns - py web-ilAsher Sterkin
 
Shaping serverless architecture with domain driven design patterns
Shaping serverless architecture with domain driven design patternsShaping serverless architecture with domain driven design patterns
Shaping serverless architecture with domain driven design patternsAsher Sterkin
 
Domain driven design: a gentle introduction
Domain driven design:  a gentle introductionDomain driven design:  a gentle introduction
Domain driven design: a gentle introductionAsher Sterkin
 
Strategy toolbox for startsups
Strategy toolbox for startsupsStrategy toolbox for startsups
Strategy toolbox for startsupsAsher Sterkin
 
Software strategy for startups
Software strategy for startupsSoftware strategy for startups
Software strategy for startupsAsher Sterkin
 

Plus de Asher Sterkin (16)

Essence of Requirements Engineering: Pragmatic Insights for 2024
Essence of Requirements Engineering: Pragmatic Insights for 2024Essence of Requirements Engineering: Pragmatic Insights for 2024
Essence of Requirements Engineering: Pragmatic Insights for 2024
 
Cloud Infrastructure from Python Code: PyCon DE-23
Cloud Infrastructure from Python Code: PyCon DE-23Cloud Infrastructure from Python Code: PyCon DE-23
Cloud Infrastructure from Python Code: PyCon DE-23
 
PyCascades-23.pdf
PyCascades-23.pdfPyCascades-23.pdf
PyCascades-23.pdf
 
PyConFR-23 Talk.pdf
PyConFR-23 Talk.pdfPyConFR-23 Talk.pdf
PyConFR-23 Talk.pdf
 
pyjamas22_ generic composite in python.pdf
pyjamas22_ generic composite in python.pdfpyjamas22_ generic composite in python.pdf
pyjamas22_ generic composite in python.pdf
 
If your computer is cloud what its Operating System look like?
If your computer is cloud what its Operating System look like?If your computer is cloud what its Operating System look like?
If your computer is cloud what its Operating System look like?
 
Serverless flow programming a new perspective (py web meetup, sept 2nd, 2019...
Serverless flow programming  a new perspective (py web meetup, sept 2nd, 2019...Serverless flow programming  a new perspective (py web meetup, sept 2nd, 2019...
Serverless flow programming a new perspective (py web meetup, sept 2nd, 2019...
 
Documenting serverless architectures could we do it better - o'reily sa con...
Documenting serverless architectures  could we do it better  - o'reily sa con...Documenting serverless architectures  could we do it better  - o'reily sa con...
Documenting serverless architectures could we do it better - o'reily sa con...
 
Developing cloud serverless components in Python: DDD Perspective
Developing cloud serverless components in Python: DDD PerspectiveDeveloping cloud serverless components in Python: DDD Perspective
Developing cloud serverless components in Python: DDD Perspective
 
Shaping serverless architecture with domain driven design patterns - py web-il
Shaping serverless architecture with domain driven design patterns - py web-ilShaping serverless architecture with domain driven design patterns - py web-il
Shaping serverless architecture with domain driven design patterns - py web-il
 
Shaping serverless architecture with domain driven design patterns
Shaping serverless architecture with domain driven design patternsShaping serverless architecture with domain driven design patterns
Shaping serverless architecture with domain driven design patterns
 
Domain driven design: a gentle introduction
Domain driven design:  a gentle introductionDomain driven design:  a gentle introduction
Domain driven design: a gentle introduction
 
Strategy toolbox for startsups
Strategy toolbox for startsupsStrategy toolbox for startsups
Strategy toolbox for startsups
 
AI as a service
AI as a serviceAI as a service
AI as a service
 
Serverless ddd
Serverless dddServerless ddd
Serverless ddd
 
Software strategy for startups
Software strategy for startupsSoftware strategy for startups
Software strategy for startups
 

Dernier

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 

Dernier (20)

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 

What is exactly anti fragile in dev ops - v3

  • 1. Cisco Confidential© 2013 Cisco and/or its affiliates. All rights reserved. 1 What is Exactly Anti-Fragile in DevOps? Asher Sterkin Distinguished Engineer, SPVSS, Cisco Video Systems, Israel September 30, 2013
  • 2. Cisco Confidential© 2013 Cisco and/or its affiliates. All rights reserved. 2
  • 3. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
  • 4. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4 Antifragile Some things benefit from shocks… volatility, randomness, disorder, and stressors and love adventure, risk, and uncertainty… there is no word for the exact opposite of fragile. Let’s call it antifragile. Nassim N. Taleb, “Antifragile. Things that gain from disorder”
  • 5. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5 The Book and Reactions I think this concept is incredibly powerful when applied to systems and organizational architecture. Jez Humble, “On Antifragility in Systems and Organizational Structure”
  • 6. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6 The Book and Reactions The Netflix cloud architecture is anti-fragile… The Netflix culture is anti-fragile… Getting stronger through failure is the basis of anti- fragility. Avoiding failure at all costs … makes you brittle and vulnerable... Adrian Cockcroft, “Looking back at 2012 with pointers to 2013”
  • 7. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7 The Book and Reactions If the idea is nice and neat, however, the book that houses it is just the opposite. It is a big, baggy, sprawling mess. David Runciman, review of the book in Guardian November 21, 2012
  • 8. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8 Larger Body of Knowledge • Complex Adaptive Systems • Highly-Optimized Tolerance • Technology Development Cycle • Disruptive Innovations • Product Development Flow • Lean Start Up
  • 9. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9 For Today • De-fragilization • Skin in the Game • Barbell • Asymmetric Pay-off
  • 10. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10 DevOps Areas OPSDEV Area 1: extend delivery to production Area 2: extend operations feedback to project Area 3: embed project knowledge into operations Area 4: embed operations knowledge into project Patrick Debois: “Codifying devops practices”
  • 11. Cisco Confidential© 2013 Cisco and/or its affiliates. All rights reserved. 11 De-Fragilization
  • 12. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12 “Beauty plus pity-that is the closest we can get to a definition of art. Where there is beauty there is pity for the simple reason that beauty must die: beauty always dies, the manner dies with the matter, the world dies with the individual.” V. Nabokov, “Lecture on Metamorphosis”
  • 13. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13 DevOps Areas OPSDEV Area 1: extend delivery to production Area 2: extend operations feedback to project Area 3: embed project knowledge into operations Area 4: embed operations knowledge into project
  • 14. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14 Continuous Delivery ... to exert a constant stress on your delivery and deployment process to reduce its fragility so that releasing becomes a boring, low-risk activity. Jez Humble, “On Antifragility in Systems and Organizational Structure”
  • 15. Cisco Confidential© 2013 Cisco and/or its affiliates. All rights reserved. 15 Large batches increase cycle time Large batches increase variability in flow John Allspaw: “Ops Meta-Metrics”, slides 103-109
  • 16. Cisco Confidential© 2013 Cisco and/or its affiliates. All rights reserved. 16 Reducing batch size accelerates feedback Reducing batch size reduces overhead Reducing batch size reduces risk
  • 17. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17 Batch size and Bottlenecks Reduce batch size before you attack bottlenecks
  • 18. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18 DevOps Areas OPSDEV Area 1: extend delivery to production Area 2: extend operations feedback to project Area 3: embed project knowledge into operations Area 4: embed operations knowledge into project
  • 19. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19 “Resilience through Failure”
  • 20. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20
  • 21. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21
  • 22. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22 Resilience to failure is a lofty goal. It enables a system to survive and withstand failure. There's an even higher peak to strive for, however: making the system stronger and better with each failure. A. Tseitlin, “The Antifragile Organization” Culture of Continuous Learning
  • 23. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23 E. Deming, “Out of Crisis” “Confusing common causes with special causes will only make things worse
  • 24. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24 Resilience, Reliability, Robustness Normal Operation MTBF Failure! MTTD MTTR Max Downtime Normal Operation MTBF Max Data Lost
  • 25. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25 It’s me “Obsessive protection of the system against extremely rare events makes it more fragile. Resilience comes before the last percentiles of reliability.
  • 26. Cisco Confidential© 2013 Cisco and/or its affiliates. All rights reserved. 26
  • 27. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27 DevOps Areas OPSDEV Area 1: extend delivery to production Area 2: extend operations feedback to project Area 3: embed project knowledge into operations Area 4: embed operations knowledge into project
  • 28. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28 Give ‘em pagers!
  • 29. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29 “DevOps: architects, developers, QA/QC, system engineers, and IT cooperate to maximize the company value It’s me again
  • 30. Cisco Confidential© 2013 Cisco and/or its affiliates. All rights reserved. 30 Barbell
  • 31. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 31 DevOps Areas OPSDEV Area 1: extend delivery to production Area 2: extend operations feedback to project Area 3: embed project knowledge into operations Area 4: embed operations knowledge into project
  • 32. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 32John Alsspaw, “Dev and Ops Collaboration”
  • 33. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 33
  • 34. Cisco Confidential© 2013 Cisco and/or its affiliates. All rights reserved. 34 Developers • Responding to outages, takes on-call • Alerting systems thresholding, design • Architecture design and review • Building metrics collection • Application configuration • Shipping public-facing code • Responding to outages, takes on-call • Alerting systems thresholding, design • Architecture design and review • Building metrics collection • Application configuration • Infrastructure buildout/management Operations John Allspaw, “Reply to NoOps @ Netflix”
  • 35. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 35 DevOps Areas OPSDEV Area 1: extend delivery to production Area 2: extend operations feedback to project Area 3: embed project knowledge into operations Area 4: embed operations knowledge into project No, not really
  • 36. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 36 Every analogy has its limit. One just needs to learn where to stop.
  • 37. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 37 N. Taleb, “Antifragile” “The first step to anti-fragility consists in decreasing downside…This brings us to the solution in the form of barbell … Away from Golden Middle.
  • 38. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 38 Away from golden Middle Risk Aversion Risk Loving
  • 39. Cisco Confidential© 2013 Cisco and/or its affiliates. All rights reserved. 39 Niek Bartholomeus, “DevOps For Dinosaurs”
  • 40. Cisco Confidential© 2013 Cisco and/or its affiliates. All rights reserved. 40Jeremy Edberg, “DevOps at Netflix” Risk Aversion Risk Loving
  • 41. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 41 N. Taleb, “Antifragile” “The downside/lost should be known and protected, not probability
  • 42. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 42 It’s me “ You never know where from your next outage or cyber attack will come from and when. The maximal downtime and maximal data lost should be known and guaranteed regardless of probabilities.
  • 43. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 43 Asymmetric Pay-Offs x Gain/Lossf(x) Pain Gain
  • 44. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 44 DevOps Areas OPSDEV Area 1: extend delivery to production Area 2: extend operations feedback to project Area 3: embed project knowledge into operations Area 4: embed operations knowledge into project
  • 45. Cisco Confidential© 2013 Cisco and/or its affiliates. All rights reserved. 45
  • 46. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 46 N. Taleb “Never be sucker. Period!