SlideShare uma empresa Scribd logo
1 de 15
Baixar para ler offline
March 11, 2020
Webinar Sponsored by
COPYRIGHT © 2020 ACCELERATED STRATEGIES GROUP, INC. ALL RIGHTS RESERVED
MITCH ASHLEY
CEO and Managing Analyst
Accelerated Strategies Group
ASHISH KUTHIALA
Sr. Director, Strategic Marketing
GitLab
SPEAKERS
COPYRIGHT © 2020 ACCELERATED STRATEGIES GROUP, INC. ALL RIGHTS RESERVED
COPYRIGHT © 2020 ACCELERATED STRATEGIES GROUP, INC. ALL RIGHTS RESERVED
COPYRIGHT © 2020 ACCELERATED STRATEGIES GROUP, INC. ALL RIGHTS RESERVED
People, Process and Technology
Shared Goals – The Why?
Continuous Integration
Automated Testing
Built-In Security
Continuous Deploy
Toolchain Intentionality
Continuous Improvement
8 BEST PRACTICES
COPYRIGHT © 2020 ACCELERATED STRATEGIES GROUP, INC. ALL RIGHTS RESERVED
People, Process and Technology
Shared Goals – The Why?
Continuous Integration
Automated Testing
Built-In Security
Continuous Deploy
Toolchain Intentionality
Continuous Improvement
8 BEST PRACTICES
COPYRIGHT © 2020 ACCELERATED STRATEGIES GROUP, INC. ALL RIGHTS RESERVED
People, Process and Technology
Shared Goals – The Why?
Continuous Integration
Automated Testing
Built-In Security
Continuous Deploy
Toolchain Intentionality
Continuous Improvement
8 BEST PRACTICES
COPYRIGHT © 2020 ACCELERATED STRATEGIES GROUP, INC. ALL RIGHTS RESERVED
People, Process and Technology
Shared Goals – The Why?
Continuous Integration
Automated Testing
Built-In Security
Continuous Deploy
Toolchain Intentionality
Continuous Improvement
8 BEST PRACTICES
COPYRIGHT © 2020 ACCELERATED STRATEGIES GROUP, INC. ALL RIGHTS RESERVED
People, Process and Technology
Shared Goals – The Why?
Continuous Integration
Automated Testing
Built-In Security
Continuous Deploy
Toolchain Intentionality
Continuous Improvement
8 BEST PRACTICES
COPYRIGHT © 2020 ACCELERATED STRATEGIES GROUP, INC. ALL RIGHTS RESERVED
People, Process and Technology
Shared Goals – The Why?
Continuous Integration
Automated Testing
Built-In Security
Continuous Deploy
Toolchain Intentionality
Continuous Improvement
8 BEST PRACTICES
COPYRIGHT © 2020 ACCELERATED STRATEGIES GROUP, INC. ALL RIGHTS RESERVED
People, Process and Technology
Shared Goals – The Why?
Continuous Integration
Automated Testing
Built-In Security
Continuous Deploy
Toolchain Intentionality
Continuous Improvement
8 BEST PRACTICES
COPYRIGHT © 2020 ACCELERATED STRATEGIES GROUP, INC. ALL RIGHTS RESERVED
People, Process and Technology
Shared Goals – The Why?
Continuous Integration
Automated Testing
Built-In Security
Continuous Deploy
Toolchain Intentionality
Continuous Improvement
8 BEST PRACTICES
COPYRIGHT © 2020 ACCELERATED STRATEGIES GROUP, INC. ALL RIGHTS RESERVED
People, Process and Technology
Shared Goals – The Why?
Continuous Integration
Automated Testing
Built-In Security
Continuous Deploy
Toolchain Intentionality
Continuous Improvement
8 BEST PRACTICES
COPYRIGHT © 2020 ACCELERATED STRATEGIES GROUP, INC. ALL RIGHTS RESERVED
COPYRIGHT © 2020 ACCELERATED STRATEGIES GROUP, INC. ALL RIGHTS RESERVED
THANK YOU
Mitch Ashley
CEO and Managing Analyst
mitchell@accelst.com
Accelerated Strategies Group, Inc.
https://accelst.com
ASHISH KUTHIALA
Sr. Director, Strategic Marketing
akuthiala@gitlab.com
GitLab
https://gitlab.com

Mais conteúdo relacionado

Mais procurados

Mark Sage (AREA): All You Need to Know About Enterprise Augmented Reality Req...
Mark Sage (AREA): All You Need to Know About Enterprise Augmented Reality Req...Mark Sage (AREA): All You Need to Know About Enterprise Augmented Reality Req...
Mark Sage (AREA): All You Need to Know About Enterprise Augmented Reality Req...AugmentedWorldExpo
 
From Zero to SAFe
From Zero to SAFeFrom Zero to SAFe
From Zero to SAFeEficode
 
DevOps - The Key to Rapid Productization (Introduction to the 5C's of DevOps)
DevOps - The Key to Rapid Productization (Introduction to the 5C's of DevOps)DevOps - The Key to Rapid Productization (Introduction to the 5C's of DevOps)
DevOps - The Key to Rapid Productization (Introduction to the 5C's of DevOps)Cygnet Infotech
 
apidays LIVE Australia 2021 - Why are some organisations slower than their co...
apidays LIVE Australia 2021 - Why are some organisations slower than their co...apidays LIVE Australia 2021 - Why are some organisations slower than their co...
apidays LIVE Australia 2021 - Why are some organisations slower than their co...apidays
 
Hybrid Enterprise
Hybrid EnterpriseHybrid Enterprise
Hybrid EnterpriseRABS
 
Measure Customer Value with Self-Service Observability
Measure Customer Value with Self-Service ObservabilityMeasure Customer Value with Self-Service Observability
Measure Customer Value with Self-Service ObservabilityDevOps.com
 
Technology Radar Webinar UK - Vol. 22
Technology Radar Webinar UK - Vol. 22Technology Radar Webinar UK - Vol. 22
Technology Radar Webinar UK - Vol. 22Thoughtworks
 
Developer Marketing: Building Experiences
Developer Marketing: Building ExperiencesDeveloper Marketing: Building Experiences
Developer Marketing: Building ExperiencesPredix
 
Accenture Security Framework for AWS - Australian Prudential Regulatory Autho...
Accenture Security Framework for AWS - Australian Prudential Regulatory Autho...Accenture Security Framework for AWS - Australian Prudential Regulatory Autho...
Accenture Security Framework for AWS - Australian Prudential Regulatory Autho...Accenture Operations
 
Difference between ITIL v3 and ITIL 4 | ITIL® Foundation Training | Edureka
Difference between ITIL v3 and ITIL 4 | ITIL® Foundation Training | EdurekaDifference between ITIL v3 and ITIL 4 | ITIL® Foundation Training | Edureka
Difference between ITIL v3 and ITIL 4 | ITIL® Foundation Training | EdurekaEdureka!
 
Agile Certainty, bringing predictability in Agile engagements
Agile Certainty, bringing predictability in Agile engagementsAgile Certainty, bringing predictability in Agile engagements
Agile Certainty, bringing predictability in Agile engagementsPuneet Sachdev
 
Cisco Open Source Strategy: OpenStack Summit 2016
Cisco Open Source Strategy: OpenStack Summit 2016Cisco Open Source Strategy: OpenStack Summit 2016
Cisco Open Source Strategy: OpenStack Summit 2016Lauren Cooney
 
Microservices Best Practices
Microservices Best Practices Microservices Best Practices
Microservices Best Practices MuleSoft
 
DevOps Indonesia - DevSecOps - Application Security on Production Environment
DevOps Indonesia - DevSecOps - Application Security on Production EnvironmentDevOps Indonesia - DevSecOps - Application Security on Production Environment
DevOps Indonesia - DevSecOps - Application Security on Production EnvironmentAdhitya Hartowo
 
[WSO2Con USA 2018] How to Build an Agile Enterprise
[WSO2Con USA 2018] How to Build an Agile Enterprise[WSO2Con USA 2018] How to Build an Agile Enterprise
[WSO2Con USA 2018] How to Build an Agile EnterpriseWSO2
 
Welcome and Insights from ADAPT
Welcome and Insights from ADAPTWelcome and Insights from ADAPT
Welcome and Insights from ADAPTBen Turner
 
Accenture Security Framework for AWS: Monetary Authority of Singapore Guidelines
Accenture Security Framework for AWS: Monetary Authority of Singapore GuidelinesAccenture Security Framework for AWS: Monetary Authority of Singapore Guidelines
Accenture Security Framework for AWS: Monetary Authority of Singapore GuidelinesAccenture Operations
 
7 Principles of Agile Enterprises
7 Principles of Agile Enterprises7 Principles of Agile Enterprises
7 Principles of Agile EnterprisesMendix
 

Mais procurados (20)

Mark Sage (AREA): All You Need to Know About Enterprise Augmented Reality Req...
Mark Sage (AREA): All You Need to Know About Enterprise Augmented Reality Req...Mark Sage (AREA): All You Need to Know About Enterprise Augmented Reality Req...
Mark Sage (AREA): All You Need to Know About Enterprise Augmented Reality Req...
 
From Zero to SAFe
From Zero to SAFeFrom Zero to SAFe
From Zero to SAFe
 
DevOps - The Key to Rapid Productization (Introduction to the 5C's of DevOps)
DevOps - The Key to Rapid Productization (Introduction to the 5C's of DevOps)DevOps - The Key to Rapid Productization (Introduction to the 5C's of DevOps)
DevOps - The Key to Rapid Productization (Introduction to the 5C's of DevOps)
 
apidays LIVE Australia 2021 - Why are some organisations slower than their co...
apidays LIVE Australia 2021 - Why are some organisations slower than their co...apidays LIVE Australia 2021 - Why are some organisations slower than their co...
apidays LIVE Australia 2021 - Why are some organisations slower than their co...
 
Hybrid Enterprise
Hybrid EnterpriseHybrid Enterprise
Hybrid Enterprise
 
Twilio connector
Twilio connectorTwilio connector
Twilio connector
 
Measure Customer Value with Self-Service Observability
Measure Customer Value with Self-Service ObservabilityMeasure Customer Value with Self-Service Observability
Measure Customer Value with Self-Service Observability
 
Technology Radar Webinar UK - Vol. 22
Technology Radar Webinar UK - Vol. 22Technology Radar Webinar UK - Vol. 22
Technology Radar Webinar UK - Vol. 22
 
Developer Marketing: Building Experiences
Developer Marketing: Building ExperiencesDeveloper Marketing: Building Experiences
Developer Marketing: Building Experiences
 
Accenture Security Framework for AWS - Australian Prudential Regulatory Autho...
Accenture Security Framework for AWS - Australian Prudential Regulatory Autho...Accenture Security Framework for AWS - Australian Prudential Regulatory Autho...
Accenture Security Framework for AWS - Australian Prudential Regulatory Autho...
 
Mendix-7-Keynote
Mendix-7-KeynoteMendix-7-Keynote
Mendix-7-Keynote
 
Difference between ITIL v3 and ITIL 4 | ITIL® Foundation Training | Edureka
Difference between ITIL v3 and ITIL 4 | ITIL® Foundation Training | EdurekaDifference between ITIL v3 and ITIL 4 | ITIL® Foundation Training | Edureka
Difference between ITIL v3 and ITIL 4 | ITIL® Foundation Training | Edureka
 
Agile Certainty, bringing predictability in Agile engagements
Agile Certainty, bringing predictability in Agile engagementsAgile Certainty, bringing predictability in Agile engagements
Agile Certainty, bringing predictability in Agile engagements
 
Cisco Open Source Strategy: OpenStack Summit 2016
Cisco Open Source Strategy: OpenStack Summit 2016Cisco Open Source Strategy: OpenStack Summit 2016
Cisco Open Source Strategy: OpenStack Summit 2016
 
Microservices Best Practices
Microservices Best Practices Microservices Best Practices
Microservices Best Practices
 
DevOps Indonesia - DevSecOps - Application Security on Production Environment
DevOps Indonesia - DevSecOps - Application Security on Production EnvironmentDevOps Indonesia - DevSecOps - Application Security on Production Environment
DevOps Indonesia - DevSecOps - Application Security on Production Environment
 
[WSO2Con USA 2018] How to Build an Agile Enterprise
[WSO2Con USA 2018] How to Build an Agile Enterprise[WSO2Con USA 2018] How to Build an Agile Enterprise
[WSO2Con USA 2018] How to Build an Agile Enterprise
 
Welcome and Insights from ADAPT
Welcome and Insights from ADAPTWelcome and Insights from ADAPT
Welcome and Insights from ADAPT
 
Accenture Security Framework for AWS: Monetary Authority of Singapore Guidelines
Accenture Security Framework for AWS: Monetary Authority of Singapore GuidelinesAccenture Security Framework for AWS: Monetary Authority of Singapore Guidelines
Accenture Security Framework for AWS: Monetary Authority of Singapore Guidelines
 
7 Principles of Agile Enterprises
7 Principles of Agile Enterprises7 Principles of Agile Enterprises
7 Principles of Agile Enterprises
 

Semelhante a Breakthrough DevOps - Successful DevOps Adoption Strategies

Security & DevOps - What We Have Here Is a Failure to Communicate!
Security & DevOps - What We Have Here Is a Failure to Communicate!Security & DevOps - What We Have Here Is a Failure to Communicate!
Security & DevOps - What We Have Here Is a Failure to Communicate!DevOps.com
 
DevOps, Mainframes and the Economic Rebound
DevOps, Mainframes and the Economic ReboundDevOps, Mainframes and the Economic Rebound
DevOps, Mainframes and the Economic ReboundDevOps.com
 
Designing a Successful Governed Citizen Data Science Strategy
Designing a Successful Governed Citizen Data Science StrategyDesigning a Successful Governed Citizen Data Science Strategy
Designing a Successful Governed Citizen Data Science StrategyDATAVERSITY
 
2018 McRock Capital IIoT Symposium: Antonio Pietri, Aspentech
2018 McRock Capital IIoT Symposium: Antonio Pietri, Aspentech2018 McRock Capital IIoT Symposium: Antonio Pietri, Aspentech
2018 McRock Capital IIoT Symposium: Antonio Pietri, AspentechMTechHub
 
IT Sales Opportunities at the VA - Everything you Need to Know but Were Afrai...
IT Sales Opportunities at the VA - Everything you Need to Know but Were Afrai...IT Sales Opportunities at the VA - Everything you Need to Know but Were Afrai...
IT Sales Opportunities at the VA - Everything you Need to Know but Were Afrai...immixGroup
 
SigmaTec Solutions
SigmaTec SolutionsSigmaTec Solutions
SigmaTec Solutionsasalman
 
AWS Live Panel Discussion: Simplify Large-Scale IoT Device Management
 AWS Live Panel Discussion: Simplify Large-Scale IoT Device Management AWS Live Panel Discussion: Simplify Large-Scale IoT Device Management
AWS Live Panel Discussion: Simplify Large-Scale IoT Device ManagementAmazon Web Services
 
A Data Driven Roadmap to Enterprise AI Strategy (Sponsored by Contino) - AWS ...
A Data Driven Roadmap to Enterprise AI Strategy (Sponsored by Contino) - AWS ...A Data Driven Roadmap to Enterprise AI Strategy (Sponsored by Contino) - AWS ...
A Data Driven Roadmap to Enterprise AI Strategy (Sponsored by Contino) - AWS ...Amazon Web Services
 
apidays LIVE Singapore 2021 - Re-imagining the investment workflow using APIs...
apidays LIVE Singapore 2021 - Re-imagining the investment workflow using APIs...apidays LIVE Singapore 2021 - Re-imagining the investment workflow using APIs...
apidays LIVE Singapore 2021 - Re-imagining the investment workflow using APIs...apidays
 
Building Elastic into security operations
Building Elastic into security operationsBuilding Elastic into security operations
Building Elastic into security operationsElasticsearch
 
SusthitSoft Technologies
SusthitSoft TechnologiesSusthitSoft Technologies
SusthitSoft TechnologiesBhavik Shah
 
AIOps Deployments in the Real World: Bringing Operations and Security Together
AIOps Deployments in the Real World: Bringing Operations and Security Together AIOps Deployments in the Real World: Bringing Operations and Security Together
AIOps Deployments in the Real World: Bringing Operations and Security Together Enterprise Management Associates
 
Ideas to Impacts -- Corporate ppt Nov-16
Ideas to Impacts -- Corporate ppt Nov-16Ideas to Impacts -- Corporate ppt Nov-16
Ideas to Impacts -- Corporate ppt Nov-16Ideas To Impacts
 
The IT Automation Imperative: Keeping Pace with the Speed of Business
The IT Automation Imperative: Keeping Pace with the Speed of BusinessThe IT Automation Imperative: Keeping Pace with the Speed of Business
The IT Automation Imperative: Keeping Pace with the Speed of BusinessEnterprise Management Associates
 
Top 10 Strategic Technologies in 2024: AI and Automation
Top 10 Strategic Technologies in 2024: AI and AutomationTop 10 Strategic Technologies in 2024: AI and Automation
Top 10 Strategic Technologies in 2024: AI and AutomationAutomationEdge Technologies
 
Equalize Profile
Equalize ProfileEqualize Profile
Equalize Profilekiran1983k
 

Semelhante a Breakthrough DevOps - Successful DevOps Adoption Strategies (20)

Data driven-business
Data driven-businessData driven-business
Data driven-business
 
Security & DevOps - What We Have Here Is a Failure to Communicate!
Security & DevOps - What We Have Here Is a Failure to Communicate!Security & DevOps - What We Have Here Is a Failure to Communicate!
Security & DevOps - What We Have Here Is a Failure to Communicate!
 
Unifying IT with Outcome-Aware AIOps
Unifying IT with Outcome-Aware AIOps  Unifying IT with Outcome-Aware AIOps
Unifying IT with Outcome-Aware AIOps
 
DevOps, Mainframes and the Economic Rebound
DevOps, Mainframes and the Economic ReboundDevOps, Mainframes and the Economic Rebound
DevOps, Mainframes and the Economic Rebound
 
Designing a Successful Governed Citizen Data Science Strategy
Designing a Successful Governed Citizen Data Science StrategyDesigning a Successful Governed Citizen Data Science Strategy
Designing a Successful Governed Citizen Data Science Strategy
 
2018 McRock Capital IIoT Symposium: Antonio Pietri, Aspentech
2018 McRock Capital IIoT Symposium: Antonio Pietri, Aspentech2018 McRock Capital IIoT Symposium: Antonio Pietri, Aspentech
2018 McRock Capital IIoT Symposium: Antonio Pietri, Aspentech
 
IT Sales Opportunities at the VA - Everything you Need to Know but Were Afrai...
IT Sales Opportunities at the VA - Everything you Need to Know but Were Afrai...IT Sales Opportunities at the VA - Everything you Need to Know but Were Afrai...
IT Sales Opportunities at the VA - Everything you Need to Know but Were Afrai...
 
SigmaTec Solutions
SigmaTec SolutionsSigmaTec Solutions
SigmaTec Solutions
 
AWS Live Panel Discussion: Simplify Large-Scale IoT Device Management
 AWS Live Panel Discussion: Simplify Large-Scale IoT Device Management AWS Live Panel Discussion: Simplify Large-Scale IoT Device Management
AWS Live Panel Discussion: Simplify Large-Scale IoT Device Management
 
A Data Driven Roadmap to Enterprise AI Strategy (Sponsored by Contino) - AWS ...
A Data Driven Roadmap to Enterprise AI Strategy (Sponsored by Contino) - AWS ...A Data Driven Roadmap to Enterprise AI Strategy (Sponsored by Contino) - AWS ...
A Data Driven Roadmap to Enterprise AI Strategy (Sponsored by Contino) - AWS ...
 
apidays LIVE Singapore 2021 - Re-imagining the investment workflow using APIs...
apidays LIVE Singapore 2021 - Re-imagining the investment workflow using APIs...apidays LIVE Singapore 2021 - Re-imagining the investment workflow using APIs...
apidays LIVE Singapore 2021 - Re-imagining the investment workflow using APIs...
 
Intro to Learning Tech and Learning Organisations
Intro to Learning Tech and Learning OrganisationsIntro to Learning Tech and Learning Organisations
Intro to Learning Tech and Learning Organisations
 
Building Elastic into security operations
Building Elastic into security operationsBuilding Elastic into security operations
Building Elastic into security operations
 
SusthitSoft Technologies
SusthitSoft TechnologiesSusthitSoft Technologies
SusthitSoft Technologies
 
AIOps Deployments in the Real World: Bringing Operations and Security Together
AIOps Deployments in the Real World: Bringing Operations and Security Together AIOps Deployments in the Real World: Bringing Operations and Security Together
AIOps Deployments in the Real World: Bringing Operations and Security Together
 
Ideas to Impacts -- Corporate ppt Nov-16
Ideas to Impacts -- Corporate ppt Nov-16Ideas to Impacts -- Corporate ppt Nov-16
Ideas to Impacts -- Corporate ppt Nov-16
 
Artificial Intelligence The SAS Perspective
Artificial Intelligence The SAS PerspectiveArtificial Intelligence The SAS Perspective
Artificial Intelligence The SAS Perspective
 
The IT Automation Imperative: Keeping Pace with the Speed of Business
The IT Automation Imperative: Keeping Pace with the Speed of BusinessThe IT Automation Imperative: Keeping Pace with the Speed of Business
The IT Automation Imperative: Keeping Pace with the Speed of Business
 
Top 10 Strategic Technologies in 2024: AI and Automation
Top 10 Strategic Technologies in 2024: AI and AutomationTop 10 Strategic Technologies in 2024: AI and Automation
Top 10 Strategic Technologies in 2024: AI and Automation
 
Equalize Profile
Equalize ProfileEqualize Profile
Equalize Profile
 

Mais de DevOps.com

Modernizing on IBM Z Made Easier With Open Source Software
Modernizing on IBM Z Made Easier With Open Source SoftwareModernizing on IBM Z Made Easier With Open Source Software
Modernizing on IBM Z Made Easier With Open Source SoftwareDevOps.com
 
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...DevOps.com
 
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...DevOps.com
 
Next Generation Vulnerability Assessment Using Datadog and Snyk
Next Generation Vulnerability Assessment Using Datadog and SnykNext Generation Vulnerability Assessment Using Datadog and Snyk
Next Generation Vulnerability Assessment Using Datadog and SnykDevOps.com
 
Vulnerability Discovery in the Cloud
Vulnerability Discovery in the CloudVulnerability Discovery in the Cloud
Vulnerability Discovery in the CloudDevOps.com
 
2021 Open Source Governance: Top Ten Trends and Predictions
2021 Open Source Governance: Top Ten Trends and Predictions2021 Open Source Governance: Top Ten Trends and Predictions
2021 Open Source Governance: Top Ten Trends and PredictionsDevOps.com
 
A New Year’s Ransomware Resolution
A New Year’s Ransomware ResolutionA New Year’s Ransomware Resolution
A New Year’s Ransomware ResolutionDevOps.com
 
Getting Started with Runtime Security on Azure Kubernetes Service (AKS)
Getting Started with Runtime Security on Azure Kubernetes Service (AKS)Getting Started with Runtime Security on Azure Kubernetes Service (AKS)
Getting Started with Runtime Security on Azure Kubernetes Service (AKS)DevOps.com
 
Don't Panic! Effective Incident Response
Don't Panic! Effective Incident ResponseDon't Panic! Effective Incident Response
Don't Panic! Effective Incident ResponseDevOps.com
 
Creating a Culture of Chaos: Chaos Engineering Is Not Just Tools, It's Culture
Creating a Culture of Chaos: Chaos Engineering Is Not Just Tools, It's CultureCreating a Culture of Chaos: Chaos Engineering Is Not Just Tools, It's Culture
Creating a Culture of Chaos: Chaos Engineering Is Not Just Tools, It's CultureDevOps.com
 
Role Based Access Controls (RBAC) for SSH and Kubernetes Access with Teleport
Role Based Access Controls (RBAC) for SSH and Kubernetes Access with TeleportRole Based Access Controls (RBAC) for SSH and Kubernetes Access with Teleport
Role Based Access Controls (RBAC) for SSH and Kubernetes Access with TeleportDevOps.com
 
Monitoring Serverless Applications with Datadog
Monitoring Serverless Applications with DatadogMonitoring Serverless Applications with Datadog
Monitoring Serverless Applications with DatadogDevOps.com
 
Deliver your App Anywhere … Publicly or Privately
Deliver your App Anywhere … Publicly or PrivatelyDeliver your App Anywhere … Publicly or Privately
Deliver your App Anywhere … Publicly or PrivatelyDevOps.com
 
Securing medical apps in the age of covid final
Securing medical apps in the age of covid finalSecuring medical apps in the age of covid final
Securing medical apps in the age of covid finalDevOps.com
 
How to Build a Healthy On-Call Culture
How to Build a Healthy On-Call CultureHow to Build a Healthy On-Call Culture
How to Build a Healthy On-Call CultureDevOps.com
 
The Evolving Role of the Developer in 2021
The Evolving Role of the Developer in 2021The Evolving Role of the Developer in 2021
The Evolving Role of the Developer in 2021DevOps.com
 
Service Mesh: Two Big Words But Do You Need It?
Service Mesh: Two Big Words But Do You Need It?Service Mesh: Two Big Words But Do You Need It?
Service Mesh: Two Big Words But Do You Need It?DevOps.com
 
Secure Data Sharing in OpenShift Environments
Secure Data Sharing in OpenShift EnvironmentsSecure Data Sharing in OpenShift Environments
Secure Data Sharing in OpenShift EnvironmentsDevOps.com
 
How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...
How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...
How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...DevOps.com
 
Elevate Your Enterprise Python and R AI, ML Software Strategy with Anaconda T...
Elevate Your Enterprise Python and R AI, ML Software Strategy with Anaconda T...Elevate Your Enterprise Python and R AI, ML Software Strategy with Anaconda T...
Elevate Your Enterprise Python and R AI, ML Software Strategy with Anaconda T...DevOps.com
 

Mais de DevOps.com (20)

Modernizing on IBM Z Made Easier With Open Source Software
Modernizing on IBM Z Made Easier With Open Source SoftwareModernizing on IBM Z Made Easier With Open Source Software
Modernizing on IBM Z Made Easier With Open Source Software
 
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
 
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
 
Next Generation Vulnerability Assessment Using Datadog and Snyk
Next Generation Vulnerability Assessment Using Datadog and SnykNext Generation Vulnerability Assessment Using Datadog and Snyk
Next Generation Vulnerability Assessment Using Datadog and Snyk
 
Vulnerability Discovery in the Cloud
Vulnerability Discovery in the CloudVulnerability Discovery in the Cloud
Vulnerability Discovery in the Cloud
 
2021 Open Source Governance: Top Ten Trends and Predictions
2021 Open Source Governance: Top Ten Trends and Predictions2021 Open Source Governance: Top Ten Trends and Predictions
2021 Open Source Governance: Top Ten Trends and Predictions
 
A New Year’s Ransomware Resolution
A New Year’s Ransomware ResolutionA New Year’s Ransomware Resolution
A New Year’s Ransomware Resolution
 
Getting Started with Runtime Security on Azure Kubernetes Service (AKS)
Getting Started with Runtime Security on Azure Kubernetes Service (AKS)Getting Started with Runtime Security on Azure Kubernetes Service (AKS)
Getting Started with Runtime Security on Azure Kubernetes Service (AKS)
 
Don't Panic! Effective Incident Response
Don't Panic! Effective Incident ResponseDon't Panic! Effective Incident Response
Don't Panic! Effective Incident Response
 
Creating a Culture of Chaos: Chaos Engineering Is Not Just Tools, It's Culture
Creating a Culture of Chaos: Chaos Engineering Is Not Just Tools, It's CultureCreating a Culture of Chaos: Chaos Engineering Is Not Just Tools, It's Culture
Creating a Culture of Chaos: Chaos Engineering Is Not Just Tools, It's Culture
 
Role Based Access Controls (RBAC) for SSH and Kubernetes Access with Teleport
Role Based Access Controls (RBAC) for SSH and Kubernetes Access with TeleportRole Based Access Controls (RBAC) for SSH and Kubernetes Access with Teleport
Role Based Access Controls (RBAC) for SSH and Kubernetes Access with Teleport
 
Monitoring Serverless Applications with Datadog
Monitoring Serverless Applications with DatadogMonitoring Serverless Applications with Datadog
Monitoring Serverless Applications with Datadog
 
Deliver your App Anywhere … Publicly or Privately
Deliver your App Anywhere … Publicly or PrivatelyDeliver your App Anywhere … Publicly or Privately
Deliver your App Anywhere … Publicly or Privately
 
Securing medical apps in the age of covid final
Securing medical apps in the age of covid finalSecuring medical apps in the age of covid final
Securing medical apps in the age of covid final
 
How to Build a Healthy On-Call Culture
How to Build a Healthy On-Call CultureHow to Build a Healthy On-Call Culture
How to Build a Healthy On-Call Culture
 
The Evolving Role of the Developer in 2021
The Evolving Role of the Developer in 2021The Evolving Role of the Developer in 2021
The Evolving Role of the Developer in 2021
 
Service Mesh: Two Big Words But Do You Need It?
Service Mesh: Two Big Words But Do You Need It?Service Mesh: Two Big Words But Do You Need It?
Service Mesh: Two Big Words But Do You Need It?
 
Secure Data Sharing in OpenShift Environments
Secure Data Sharing in OpenShift EnvironmentsSecure Data Sharing in OpenShift Environments
Secure Data Sharing in OpenShift Environments
 
How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...
How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...
How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...
 
Elevate Your Enterprise Python and R AI, ML Software Strategy with Anaconda T...
Elevate Your Enterprise Python and R AI, ML Software Strategy with Anaconda T...Elevate Your Enterprise Python and R AI, ML Software Strategy with Anaconda T...
Elevate Your Enterprise Python and R AI, ML Software Strategy with Anaconda T...
 

Último

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 

Último (20)

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

Breakthrough DevOps - Successful DevOps Adoption Strategies

  • 1. March 11, 2020 Webinar Sponsored by
  • 2. COPYRIGHT © 2020 ACCELERATED STRATEGIES GROUP, INC. ALL RIGHTS RESERVED MITCH ASHLEY CEO and Managing Analyst Accelerated Strategies Group ASHISH KUTHIALA Sr. Director, Strategic Marketing GitLab SPEAKERS
  • 3. COPYRIGHT © 2020 ACCELERATED STRATEGIES GROUP, INC. ALL RIGHTS RESERVED
  • 4. COPYRIGHT © 2020 ACCELERATED STRATEGIES GROUP, INC. ALL RIGHTS RESERVED
  • 5. COPYRIGHT © 2020 ACCELERATED STRATEGIES GROUP, INC. ALL RIGHTS RESERVED People, Process and Technology Shared Goals – The Why? Continuous Integration Automated Testing Built-In Security Continuous Deploy Toolchain Intentionality Continuous Improvement 8 BEST PRACTICES
  • 6. COPYRIGHT © 2020 ACCELERATED STRATEGIES GROUP, INC. ALL RIGHTS RESERVED People, Process and Technology Shared Goals – The Why? Continuous Integration Automated Testing Built-In Security Continuous Deploy Toolchain Intentionality Continuous Improvement 8 BEST PRACTICES
  • 7. COPYRIGHT © 2020 ACCELERATED STRATEGIES GROUP, INC. ALL RIGHTS RESERVED People, Process and Technology Shared Goals – The Why? Continuous Integration Automated Testing Built-In Security Continuous Deploy Toolchain Intentionality Continuous Improvement 8 BEST PRACTICES
  • 8. COPYRIGHT © 2020 ACCELERATED STRATEGIES GROUP, INC. ALL RIGHTS RESERVED People, Process and Technology Shared Goals – The Why? Continuous Integration Automated Testing Built-In Security Continuous Deploy Toolchain Intentionality Continuous Improvement 8 BEST PRACTICES
  • 9. COPYRIGHT © 2020 ACCELERATED STRATEGIES GROUP, INC. ALL RIGHTS RESERVED People, Process and Technology Shared Goals – The Why? Continuous Integration Automated Testing Built-In Security Continuous Deploy Toolchain Intentionality Continuous Improvement 8 BEST PRACTICES
  • 10. COPYRIGHT © 2020 ACCELERATED STRATEGIES GROUP, INC. ALL RIGHTS RESERVED People, Process and Technology Shared Goals – The Why? Continuous Integration Automated Testing Built-In Security Continuous Deploy Toolchain Intentionality Continuous Improvement 8 BEST PRACTICES
  • 11. COPYRIGHT © 2020 ACCELERATED STRATEGIES GROUP, INC. ALL RIGHTS RESERVED People, Process and Technology Shared Goals – The Why? Continuous Integration Automated Testing Built-In Security Continuous Deploy Toolchain Intentionality Continuous Improvement 8 BEST PRACTICES
  • 12. COPYRIGHT © 2020 ACCELERATED STRATEGIES GROUP, INC. ALL RIGHTS RESERVED People, Process and Technology Shared Goals – The Why? Continuous Integration Automated Testing Built-In Security Continuous Deploy Toolchain Intentionality Continuous Improvement 8 BEST PRACTICES
  • 13. COPYRIGHT © 2020 ACCELERATED STRATEGIES GROUP, INC. ALL RIGHTS RESERVED People, Process and Technology Shared Goals – The Why? Continuous Integration Automated Testing Built-In Security Continuous Deploy Toolchain Intentionality Continuous Improvement 8 BEST PRACTICES
  • 14. COPYRIGHT © 2020 ACCELERATED STRATEGIES GROUP, INC. ALL RIGHTS RESERVED
  • 15. COPYRIGHT © 2020 ACCELERATED STRATEGIES GROUP, INC. ALL RIGHTS RESERVED THANK YOU Mitch Ashley CEO and Managing Analyst mitchell@accelst.com Accelerated Strategies Group, Inc. https://accelst.com ASHISH KUTHIALA Sr. Director, Strategic Marketing akuthiala@gitlab.com GitLab https://gitlab.com