SlideShare a Scribd company logo
1 of 15
Download to read offline
Avoiding the “Technical Debt Collectors” With
DevOps
We are taught from an early age to be careful with
our money and to avoid the dangers of debt.
Don’t spend more than you make.
Keep on top of your debt payments.
Compounded interest can be dangerous.
Beware of hidden fees and penalties.
You can end up paying more in interest than you paid for what you
bought.
So why is it that we, in IT, are so poor at managing
our own “Technical Debt”?
Highlighted in “The Agile Manifesto” in 2002, “Technical Debt” is the
price organizations pay for releasing code without fixing any problems
immediately.
Like all debt, the burden of Technical Debt compounds over time, making
it hard to make changes later to key systems and applications.
But DevOps may be able to help.
And our early lessons about personal finance can help show us the way.
Here are five steps to controlling personal debt that may also help us
manage Technical Debt:
1. Avoid bad spending habits.
Easy credit may introduce bad habits. We are able
to spend big and put off repayment for “later.”
Avoid bad coding habits, too.
Testing is put off because the project is delayed. Or maybe there’s no
testing infrastructure at all.
With DevOps, teams make it a habit to test in parallel and fix code
defects as early in the cycle as possible, immediately.
Seek out and eradicate the conditions that allow bad habits to fester.
2. Consolidate your debt.
People with credit problems often spread it across
multiple credit cards, making it difficult to manage.
Consolidate your Technical Debt too.
In IT, our debt often spans multiple systems, many of which are built
upon badly designed and developed code bases. Short-term fixes and
bad code perpetuate the problem.
Identify the biggest problems and address these first.
Remember the 80/20 rule – fix the 20 percent of the systems that cause
80 percent of the problems.
3. Seek guidance and counseling.
Breaking bad personal finance habits is tough,
so people normally seek outside help.
In IT, seek peer review, mentors and
management input.
Make extensive use of code and peer-level reviews, mentorship and
management guidance.
IT operations and security should be involved right from the start of
development.
4. Avoid ‘spend more’ incentives.
Folks get tempted by credit card offers to get double frequent flyer
points or 0 percent interest for six months.
Don’t reward production volume
at the expense of quality.
Be careful using ‘carrots’ in development – incentivizing function points,
number of user stories delivered or even lines of code.
You get the behavior you pay for. Make sure incentives are aligned with
code quality metrics.
5. Watch for hidden interest charges.
Those “no interest for 2 years” deals have large and retroactive interest
charges if you miss a payment or don’t pay off in full by the deadline.
In IT, watch for hidden Technical Debt
Everybody pays attention to Dev, but there is Technical Debt in Ops as
well:
• Capacity • Performance • Network latency
A code defect led one client to believe they needed to buy more
hardware, when the problem was really with the code.
Start getting your Technical Debt
under control.
Download a copy of “Waste Not, Want Not: Applying Agile and Lean
thinking to eliminate eight elements of waste and prevent technical
debt”
DOWNLOAD NOW
www.ca.com/us/register/forms/collateral/devop
s-practitioner-series.aspx

More Related Content

What's hot

Software Product Development in 2018 | An Infographic by RapidValue
Software Product Development in 2018 | An Infographic by RapidValueSoftware Product Development in 2018 | An Infographic by RapidValue
Software Product Development in 2018 | An Infographic by RapidValueRapidValue
 
CompTIA's 6th Annual State of the Channel
CompTIA's 6th Annual State of the Channel CompTIA's 6th Annual State of the Channel
CompTIA's 6th Annual State of the Channel CompTIA
 
Considering the New IT Buyer
Considering the New IT BuyerConsidering the New IT Buyer
Considering the New IT BuyerCompTIA
 
CompTIA Second Annual Trends in Enterprise Mobility: BYOD Uncovered
CompTIA Second Annual Trends in Enterprise Mobility: BYOD UncoveredCompTIA Second Annual Trends in Enterprise Mobility: BYOD Uncovered
CompTIA Second Annual Trends in Enterprise Mobility: BYOD UncoveredCompTIA
 
Infrastructure that can stand the test of time | Accenture
Infrastructure that can stand the test of time | AccentureInfrastructure that can stand the test of time | Accenture
Infrastructure that can stand the test of time | Accentureaccenture
 
Solution Spotlight on OneShield Software : Enhancing the Digital Experience a...
Solution Spotlight on OneShield Software : Enhancing the Digital Experience a...Solution Spotlight on OneShield Software : Enhancing the Digital Experience a...
Solution Spotlight on OneShield Software : Enhancing the Digital Experience a...The Digital Insurer
 
Be Digital. Be More.
Be Digital. Be More.Be Digital. Be More.
Be Digital. Be More.Infosys
 
The Impacts of COVID-19 on Enterprise IT
The Impacts of COVID-19 on Enterprise ITThe Impacts of COVID-19 on Enterprise IT
The Impacts of COVID-19 on Enterprise ITInsight
 
How witch companies are actively acquiring to expand their digital and emergi...
How witch companies are actively acquiring to expand their digital and emergi...How witch companies are actively acquiring to expand their digital and emergi...
How witch companies are actively acquiring to expand their digital and emergi...Damo Consulting Inc.
 
CIO Tech Poll: Tech Priorities 2020
CIO Tech Poll: Tech Priorities 2020CIO Tech Poll: Tech Priorities 2020
CIO Tech Poll: Tech Priorities 2020IDG
 
Digital Insurance Transformation
Digital Insurance TransformationDigital Insurance Transformation
Digital Insurance Transformationdigitalinsurer
 
The Impact of COVID-19 on Public Sector IT
The Impact of COVID-19 on Public Sector ITThe Impact of COVID-19 on Public Sector IT
The Impact of COVID-19 on Public Sector ITInsight
 
The Next Generation of Contact Centers
The Next Generation of Contact CentersThe Next Generation of Contact Centers
The Next Generation of Contact CentersAppian
 
Going Digital: A guide for Service Providers – The Executive Edition
Going Digital: A guide for Service Providers – The Executive EditionGoing Digital: A guide for Service Providers – The Executive Edition
Going Digital: A guide for Service Providers – The Executive EditionAmdocs
 
2020 State of the CIO Research
2020 State of the CIO Research2020 State of the CIO Research
2020 State of the CIO ResearchIDG
 
Ibm symp14 referent_christian klezl_cloud
Ibm symp14 referent_christian klezl_cloudIbm symp14 referent_christian klezl_cloud
Ibm symp14 referent_christian klezl_cloudIBM Switzerland
 
Evolution of the Digital Workplace - Office Insights 2018
Evolution of the Digital Workplace - Office Insights 2018Evolution of the Digital Workplace - Office Insights 2018
Evolution of the Digital Workplace - Office Insights 2018Canon Business CEE
 
Digital Insurance - Opportunities in India
Digital Insurance - Opportunities in IndiaDigital Insurance - Opportunities in India
Digital Insurance - Opportunities in IndiaThe Digital Insurer
 

What's hot (20)

Ecommerce
EcommerceEcommerce
Ecommerce
 
Software Product Development in 2018 | An Infographic by RapidValue
Software Product Development in 2018 | An Infographic by RapidValueSoftware Product Development in 2018 | An Infographic by RapidValue
Software Product Development in 2018 | An Infographic by RapidValue
 
CompTIA's 6th Annual State of the Channel
CompTIA's 6th Annual State of the Channel CompTIA's 6th Annual State of the Channel
CompTIA's 6th Annual State of the Channel
 
Tech Stack Training
Tech Stack TrainingTech Stack Training
Tech Stack Training
 
Considering the New IT Buyer
Considering the New IT BuyerConsidering the New IT Buyer
Considering the New IT Buyer
 
CompTIA Second Annual Trends in Enterprise Mobility: BYOD Uncovered
CompTIA Second Annual Trends in Enterprise Mobility: BYOD UncoveredCompTIA Second Annual Trends in Enterprise Mobility: BYOD Uncovered
CompTIA Second Annual Trends in Enterprise Mobility: BYOD Uncovered
 
Infrastructure that can stand the test of time | Accenture
Infrastructure that can stand the test of time | AccentureInfrastructure that can stand the test of time | Accenture
Infrastructure that can stand the test of time | Accenture
 
Solution Spotlight on OneShield Software : Enhancing the Digital Experience a...
Solution Spotlight on OneShield Software : Enhancing the Digital Experience a...Solution Spotlight on OneShield Software : Enhancing the Digital Experience a...
Solution Spotlight on OneShield Software : Enhancing the Digital Experience a...
 
Be Digital. Be More.
Be Digital. Be More.Be Digital. Be More.
Be Digital. Be More.
 
The Impacts of COVID-19 on Enterprise IT
The Impacts of COVID-19 on Enterprise ITThe Impacts of COVID-19 on Enterprise IT
The Impacts of COVID-19 on Enterprise IT
 
How witch companies are actively acquiring to expand their digital and emergi...
How witch companies are actively acquiring to expand their digital and emergi...How witch companies are actively acquiring to expand their digital and emergi...
How witch companies are actively acquiring to expand their digital and emergi...
 
CIO Tech Poll: Tech Priorities 2020
CIO Tech Poll: Tech Priorities 2020CIO Tech Poll: Tech Priorities 2020
CIO Tech Poll: Tech Priorities 2020
 
Digital Insurance Transformation
Digital Insurance TransformationDigital Insurance Transformation
Digital Insurance Transformation
 
The Impact of COVID-19 on Public Sector IT
The Impact of COVID-19 on Public Sector ITThe Impact of COVID-19 on Public Sector IT
The Impact of COVID-19 on Public Sector IT
 
The Next Generation of Contact Centers
The Next Generation of Contact CentersThe Next Generation of Contact Centers
The Next Generation of Contact Centers
 
Going Digital: A guide for Service Providers – The Executive Edition
Going Digital: A guide for Service Providers – The Executive EditionGoing Digital: A guide for Service Providers – The Executive Edition
Going Digital: A guide for Service Providers – The Executive Edition
 
2020 State of the CIO Research
2020 State of the CIO Research2020 State of the CIO Research
2020 State of the CIO Research
 
Ibm symp14 referent_christian klezl_cloud
Ibm symp14 referent_christian klezl_cloudIbm symp14 referent_christian klezl_cloud
Ibm symp14 referent_christian klezl_cloud
 
Evolution of the Digital Workplace - Office Insights 2018
Evolution of the Digital Workplace - Office Insights 2018Evolution of the Digital Workplace - Office Insights 2018
Evolution of the Digital Workplace - Office Insights 2018
 
Digital Insurance - Opportunities in India
Digital Insurance - Opportunities in IndiaDigital Insurance - Opportunities in India
Digital Insurance - Opportunities in India
 

Similar to Avoiding the “Technical Debt Collectors” with DevOps

Focused agile audit planning using analytics
Focused agile audit planning using analyticsFocused agile audit planning using analytics
Focused agile audit planning using analyticsJim Kaplan CIA CFE
 
Top 8 Mobile Finance Trends 2015
Top 8 Mobile Finance Trends 2015Top 8 Mobile Finance Trends 2015
Top 8 Mobile Finance Trends 2015DMI
 
Ten rules for CIOs
Ten rules for CIOsTen rules for CIOs
Ten rules for CIOsTerry White
 
Safe Spaces Self-Accreditation Scheme - Survey Tool FINAL
Safe Spaces Self-Accreditation Scheme - Survey Tool FINALSafe Spaces Self-Accreditation Scheme - Survey Tool FINAL
Safe Spaces Self-Accreditation Scheme - Survey Tool FINALAdam Loxley
 
Core Banking Systems for Microfinance Institutes.docx
Core Banking Systems for Microfinance Institutes.docxCore Banking Systems for Microfinance Institutes.docx
Core Banking Systems for Microfinance Institutes.docxGabayo
 
For Good or for Worse Making happy client relationships
For Good or for Worse Making happy client relationshipsFor Good or for Worse Making happy client relationships
For Good or for Worse Making happy client relationshipsImre Gmelig Meijling
 
AI in Banking - What it can do & its benefits | Virtue Analytics
AI in Banking - What it can do & its benefits | Virtue AnalyticsAI in Banking - What it can do & its benefits | Virtue Analytics
AI in Banking - What it can do & its benefits | Virtue AnalyticsVirtue Analytics
 
Garth Graham MBA Tech Keynote slides 2018
Garth Graham MBA Tech Keynote slides 2018Garth Graham MBA Tech Keynote slides 2018
Garth Graham MBA Tech Keynote slides 2018Mortgage Coach
 
Why Cloud ERP is Important for Business - AcTouch Technologies
Why Cloud ERP is Important for Business - AcTouch TechnologiesWhy Cloud ERP is Important for Business - AcTouch Technologies
Why Cloud ERP is Important for Business - AcTouch TechnologiesAcTouch Technologies
 
apidays LIVE London 2021 - From Open Banking to Embedded Finance by Simon Tor...
apidays LIVE London 2021 - From Open Banking to Embedded Finance by Simon Tor...apidays LIVE London 2021 - From Open Banking to Embedded Finance by Simon Tor...
apidays LIVE London 2021 - From Open Banking to Embedded Finance by Simon Tor...apidays
 
Question 1The board of directors is considering updating the fle.docx
Question 1The board of directors is considering updating the fle.docxQuestion 1The board of directors is considering updating the fle.docx
Question 1The board of directors is considering updating the fle.docxmakdul
 
Implementing and Auditing GDPR Series (3 of 10)
Implementing and Auditing GDPR Series (3 of 10) Implementing and Auditing GDPR Series (3 of 10)
Implementing and Auditing GDPR Series (3 of 10) Jim Kaplan CIA CFE
 
Implementing and Auditing General Data Protection Regulation
Implementing and Auditing General Data Protection RegulationImplementing and Auditing General Data Protection Regulation
Implementing and Auditing General Data Protection RegulationJim Kaplan CIA CFE
 
BSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing businessBSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing businessJoel Cardella
 
Non performing assets in banking industry
Non performing assets in banking industryNon performing assets in banking industry
Non performing assets in banking industryTirthankar Sutradhar
 
Note Please, answer the questions in the word format ONLY with st.docx
Note Please, answer the questions in the word format ONLY with st.docxNote Please, answer the questions in the word format ONLY with st.docx
Note Please, answer the questions in the word format ONLY with st.docxvannagoforth
 
How to prepare for your first anti fraud review
How to prepare for your first anti fraud reviewHow to prepare for your first anti fraud review
How to prepare for your first anti fraud reviewJim Kaplan CIA CFE
 

Similar to Avoiding the “Technical Debt Collectors” with DevOps (20)

Technical debt
Technical debtTechnical debt
Technical debt
 
Focused agile audit planning using analytics
Focused agile audit planning using analyticsFocused agile audit planning using analytics
Focused agile audit planning using analytics
 
Top 8 Mobile Finance Trends 2015
Top 8 Mobile Finance Trends 2015Top 8 Mobile Finance Trends 2015
Top 8 Mobile Finance Trends 2015
 
Overcome barriers to good req mgmt
Overcome barriers to good req mgmtOvercome barriers to good req mgmt
Overcome barriers to good req mgmt
 
Ten rules for CIOs
Ten rules for CIOsTen rules for CIOs
Ten rules for CIOs
 
Safe Spaces Self-Accreditation Scheme - Survey Tool FINAL
Safe Spaces Self-Accreditation Scheme - Survey Tool FINALSafe Spaces Self-Accreditation Scheme - Survey Tool FINAL
Safe Spaces Self-Accreditation Scheme - Survey Tool FINAL
 
Core Banking Systems for Microfinance Institutes.docx
Core Banking Systems for Microfinance Institutes.docxCore Banking Systems for Microfinance Institutes.docx
Core Banking Systems for Microfinance Institutes.docx
 
For Good or for Worse Making happy client relationships
For Good or for Worse Making happy client relationshipsFor Good or for Worse Making happy client relationships
For Good or for Worse Making happy client relationships
 
AI in Banking - What it can do & its benefits | Virtue Analytics
AI in Banking - What it can do & its benefits | Virtue AnalyticsAI in Banking - What it can do & its benefits | Virtue Analytics
AI in Banking - What it can do & its benefits | Virtue Analytics
 
Garth Graham MBA Tech Keynote slides 2018
Garth Graham MBA Tech Keynote slides 2018Garth Graham MBA Tech Keynote slides 2018
Garth Graham MBA Tech Keynote slides 2018
 
3-I to manage issues and risks associated to software and IT services
3-I to manage issues and risks associated to software and IT services3-I to manage issues and risks associated to software and IT services
3-I to manage issues and risks associated to software and IT services
 
Why Cloud ERP is Important for Business - AcTouch Technologies
Why Cloud ERP is Important for Business - AcTouch TechnologiesWhy Cloud ERP is Important for Business - AcTouch Technologies
Why Cloud ERP is Important for Business - AcTouch Technologies
 
apidays LIVE London 2021 - From Open Banking to Embedded Finance by Simon Tor...
apidays LIVE London 2021 - From Open Banking to Embedded Finance by Simon Tor...apidays LIVE London 2021 - From Open Banking to Embedded Finance by Simon Tor...
apidays LIVE London 2021 - From Open Banking to Embedded Finance by Simon Tor...
 
Question 1The board of directors is considering updating the fle.docx
Question 1The board of directors is considering updating the fle.docxQuestion 1The board of directors is considering updating the fle.docx
Question 1The board of directors is considering updating the fle.docx
 
Implementing and Auditing GDPR Series (3 of 10)
Implementing and Auditing GDPR Series (3 of 10) Implementing and Auditing GDPR Series (3 of 10)
Implementing and Auditing GDPR Series (3 of 10)
 
Implementing and Auditing General Data Protection Regulation
Implementing and Auditing General Data Protection RegulationImplementing and Auditing General Data Protection Regulation
Implementing and Auditing General Data Protection Regulation
 
BSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing businessBSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing business
 
Non performing assets in banking industry
Non performing assets in banking industryNon performing assets in banking industry
Non performing assets in banking industry
 
Note Please, answer the questions in the word format ONLY with st.docx
Note Please, answer the questions in the word format ONLY with st.docxNote Please, answer the questions in the word format ONLY with st.docx
Note Please, answer the questions in the word format ONLY with st.docx
 
How to prepare for your first anti fraud review
How to prepare for your first anti fraud reviewHow to prepare for your first anti fraud review
How to prepare for your first anti fraud review
 

More from CA Technologies

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Technologies
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceCA Technologies
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...CA Technologies
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCA Technologies
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...CA Technologies
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCA Technologies
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...CA Technologies
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCA Technologies
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramCA Technologies
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageCA Technologies
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementCA Technologies
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...CA Technologies
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...CA Technologies
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...CA Technologies
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...CA Technologies
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentCA Technologies
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseCA Technologies
 

More from CA Technologies (20)

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource Intelligence
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on Time
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital Government
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive Advantage
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access Management
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of Deployment
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
 

Recently uploaded

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 

Recently uploaded (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 

Avoiding the “Technical Debt Collectors” with DevOps

  • 1. Avoiding the “Technical Debt Collectors” With DevOps
  • 2. We are taught from an early age to be careful with our money and to avoid the dangers of debt. Don’t spend more than you make. Keep on top of your debt payments. Compounded interest can be dangerous. Beware of hidden fees and penalties. You can end up paying more in interest than you paid for what you bought.
  • 3. So why is it that we, in IT, are so poor at managing our own “Technical Debt”? Highlighted in “The Agile Manifesto” in 2002, “Technical Debt” is the price organizations pay for releasing code without fixing any problems immediately. Like all debt, the burden of Technical Debt compounds over time, making it hard to make changes later to key systems and applications.
  • 4. But DevOps may be able to help. And our early lessons about personal finance can help show us the way. Here are five steps to controlling personal debt that may also help us manage Technical Debt:
  • 5. 1. Avoid bad spending habits. Easy credit may introduce bad habits. We are able to spend big and put off repayment for “later.”
  • 6. Avoid bad coding habits, too. Testing is put off because the project is delayed. Or maybe there’s no testing infrastructure at all. With DevOps, teams make it a habit to test in parallel and fix code defects as early in the cycle as possible, immediately. Seek out and eradicate the conditions that allow bad habits to fester.
  • 7. 2. Consolidate your debt. People with credit problems often spread it across multiple credit cards, making it difficult to manage.
  • 8. Consolidate your Technical Debt too. In IT, our debt often spans multiple systems, many of which are built upon badly designed and developed code bases. Short-term fixes and bad code perpetuate the problem. Identify the biggest problems and address these first. Remember the 80/20 rule – fix the 20 percent of the systems that cause 80 percent of the problems.
  • 9. 3. Seek guidance and counseling. Breaking bad personal finance habits is tough, so people normally seek outside help.
  • 10. In IT, seek peer review, mentors and management input. Make extensive use of code and peer-level reviews, mentorship and management guidance. IT operations and security should be involved right from the start of development.
  • 11. 4. Avoid ‘spend more’ incentives. Folks get tempted by credit card offers to get double frequent flyer points or 0 percent interest for six months.
  • 12. Don’t reward production volume at the expense of quality. Be careful using ‘carrots’ in development – incentivizing function points, number of user stories delivered or even lines of code. You get the behavior you pay for. Make sure incentives are aligned with code quality metrics.
  • 13. 5. Watch for hidden interest charges. Those “no interest for 2 years” deals have large and retroactive interest charges if you miss a payment or don’t pay off in full by the deadline.
  • 14. In IT, watch for hidden Technical Debt Everybody pays attention to Dev, but there is Technical Debt in Ops as well: • Capacity • Performance • Network latency A code defect led one client to believe they needed to buy more hardware, when the problem was really with the code.
  • 15. Start getting your Technical Debt under control. Download a copy of “Waste Not, Want Not: Applying Agile and Lean thinking to eliminate eight elements of waste and prevent technical debt” DOWNLOAD NOW www.ca.com/us/register/forms/collateral/devop s-practitioner-series.aspx