SlideShare uma empresa Scribd logo
1 de 19
Baixar para ler offline
Failure Is Not An Option

(It's a Core Feature!)
James Boswell

Senior Consultant, 

CMD Solutions
Been there,
Learned that,
Made the T-Shirt
CMD Solutions is an Advanced AWS
consulting partner specialising in:
• Automated environment creation using
Infrastructure As Code;
• DevSecOps methods and CICD toolsets;
• Baked in automated security controls; and
• AWS environments aligned with compliance
standards

(PCI, APRA, IRAP, ISO)
James Boswell
@xcapee
#EPIC-FAIL
Who comes to work to look…

• Ignorant

• Incompetent

• Intrusive

• Negative
I’m with
Stupid
!
The Three Ways of DevOps
The first way
¯_(ツ)_/¯
IT WORKS
on my machine Flow
The first way: Flow
git reset --hard
#failoften
#recoverfast
Thank You
for
Breaking the Build
(no really)
The first way: Flow
s/rack/repo/g
#infracoder
Everyone has a

test environment
Some are lucky

enough to have a

separate environment

for production
The Second Way
¯_(ツ)_/¯
IT WORKS
on my machine
Feedback
The Second Way: Feedback
• Devs on call with ops - experience
failure rather than distance from it

• Greater sense of “we”

• Greater understanding of how
business value is created

• Fix defects faster
You Build it,

You Run it
— WernerVogels
The Second Way: Feedback
• Define metrics at all layers

• Business

• Application

• Operations

• Deployments

• Invest in Telemetry

• Provide an easy way to instrument code

• Instrument everything

• Centralise metrics collection

• Extract value
Measure it
StatsD::increment(“AllTheThings");
If it moves
The Second Way: Feedback
UI
SERVICE
UNIT
I said I wanted
to be a Test
Pilot
The Third Way
¯_(ツ)_/¯
IT WORKS
on my machine
Continual Experimentation and Learning
The Third Way: Continual Experimentation and Learning
• Out-experimenting the competition
means failing fast

• A-B Testing

• You’re either a learning
organisation or you’re losing to
someone who is

— Andrew Shafer
There’s no
for experience
COMPRESSIONALGORITHM
The Third Way: Continual Experimentation and Learning
• Netflix can only survive failure

by failing all the time

• Everything fails, all the time

• Design for Failure

• Deliberately break things to make
things better
The Third Way: Continual Experimentation and Learning
• Every incident is a

learning opportunity

• Blameless Post-Mortems

• Beware…

• Hindsight Bias

• The Fundamental Attribution Error

• Finding a single root cause

• Are they learning focused?

• What stopped this being worse?

• It’s not all about the action items
Incidents are
unplanned investments
in your company’s
survival
— John Allspaw
Safety Culture & Psychological Safety
Safety Culture
“a culture that allows people to give the boss bad news”
• Industries and environments where safe 

practices are questions of life and death

(Airlines, hospitals, mining, steel making)

• Safety 1

	 Who caused the problem

	 (and how should they be punished)

• Safety 2

	 What caused the problem

	 (who’s hurt, what are their needs, how can we help)
Psychological safety
• The belief that no one
will be punished or
humiliated for speaking
up with ideas, questions,
concerns or mistakes

• Far and away the most
important of the five key
dynamics that set
successful teams apart
at Google
When people fail
Who comes to work to look…

" 

I’m with
Stupid
• Ignorant
• Incompetent
• Intrusive
• Negative
Don’t ask questions
Don’t admit mistakes
Don’t offer ideas
Don’t challenge the status quo
If you don’t want to look
Failure vs Accountability
The freedom to Fail
is the hallmark of
Learning
#life-long-learning
Low High
LowHigh
PsychologicalSafety
Accountability to meet demanding goals
Comfort

Zone
Learning

Zone
Anxiety

Zone
Apathy

Zone
The Competitive Imperative of Learning Amy C. Edmondson

https://hbr.org/2008/07/the-competitive-imperative-of-learning
I’d love to continue

the conversation
and find even more DevOps T-shirt inspiration
James Boswell
@xcapee

Mais conteúdo relacionado

Semelhante a Failure is not an option it's a core feature

Mr. Burhan Khalid - secure dev.
Mr. Burhan Khalid - secure dev.Mr. Burhan Khalid - secure dev.
Mr. Burhan Khalid - secure dev.nooralmousa
 
Owasp tds
Owasp tdsOwasp tds
Owasp tdssnyff
 
Software Security Initiative Capabilities: Where Do I Begin?
Software Security Initiative Capabilities: Where Do I Begin? Software Security Initiative Capabilities: Where Do I Begin?
Software Security Initiative Capabilities: Where Do I Begin? Cigital
 
Business ideas or business opportunities
Business ideas or business opportunitiesBusiness ideas or business opportunities
Business ideas or business opportunitiesAndrew Hirst
 
Startup Operating Systems
Startup Operating SystemsStartup Operating Systems
Startup Operating SystemsDean Haritos
 
EMBRACING DISRUPTION: HOW ONE MULTINATIONAL IS CHANGING ITS APPROACH TO LEARNING
EMBRACING DISRUPTION: HOW ONE MULTINATIONAL IS CHANGING ITS APPROACH TO LEARNINGEMBRACING DISRUPTION: HOW ONE MULTINATIONAL IS CHANGING ITS APPROACH TO LEARNING
EMBRACING DISRUPTION: HOW ONE MULTINATIONAL IS CHANGING ITS APPROACH TO LEARNINGHuman Capital Media
 
Networking 2016-06-14 - The Dirty Secrets of Enterprise Security by Kevin Dunn
Networking 2016-06-14 - The Dirty Secrets of Enterprise Security by Kevin DunnNetworking 2016-06-14 - The Dirty Secrets of Enterprise Security by Kevin Dunn
Networking 2016-06-14 - The Dirty Secrets of Enterprise Security by Kevin DunnNorth Texas Chapter of the ISSA
 
Architecting a Post Mortem - Velocity 2018 San Jose Tutorial
Architecting a Post Mortem - Velocity 2018 San Jose TutorialArchitecting a Post Mortem - Velocity 2018 San Jose Tutorial
Architecting a Post Mortem - Velocity 2018 San Jose TutorialWill Gallego
 
Effective Tools for Effective Change
Effective Tools for Effective ChangeEffective Tools for Effective Change
Effective Tools for Effective ChangeJennifer Davis
 
Intro to INFOSEC
Intro to INFOSECIntro to INFOSEC
Intro to INFOSECSean Whalen
 
The Lens of Intrinsic Skill Atoms: A Method for Gameful Design
The Lens of Intrinsic Skill Atoms: A Method for Gameful DesignThe Lens of Intrinsic Skill Atoms: A Method for Gameful Design
The Lens of Intrinsic Skill Atoms: A Method for Gameful DesignSebastian Deterding
 
Slide Deck – Class Session 1 – FRSecure CISSP Mentor Program
Slide Deck – Class Session 1 – FRSecure CISSP Mentor ProgramSlide Deck – Class Session 1 – FRSecure CISSP Mentor Program
Slide Deck – Class Session 1 – FRSecure CISSP Mentor ProgramFRSecure
 
Learn Learning + Prototype Testing
Learn Learning + Prototype TestingLearn Learning + Prototype Testing
Learn Learning + Prototype TestingDave Hora
 
Testing Is How You Avoid Looking Stupid
Testing Is How You Avoid Looking StupidTesting Is How You Avoid Looking Stupid
Testing Is How You Avoid Looking StupidSteve Branam
 
Bootstrapping an Open-Source Program Office at Blue Cross NC
Bootstrapping an Open-Source Program Office at Blue Cross NCBootstrapping an Open-Source Program Office at Blue Cross NC
Bootstrapping an Open-Source Program Office at Blue Cross NCAll Things Open
 
Devops - Accelerating the Pace and Securing Along the Way - Thaddeus Walsh
Devops - Accelerating the Pace and Securing Along the Way - Thaddeus WalshDevops - Accelerating the Pace and Securing Along the Way - Thaddeus Walsh
Devops - Accelerating the Pace and Securing Along the Way - Thaddeus WalshDrew Malone
 
Bit by Bit: A Framework for Building Technological Competence as a Lawyer
Bit by Bit: A Framework for Building Technological Competence as a LawyerBit by Bit: A Framework for Building Technological Competence as a Lawyer
Bit by Bit: A Framework for Building Technological Competence as a LawyerJack Pringle
 

Semelhante a Failure is not an option it's a core feature (20)

Ergonomic design is more than good design - elise crawford
Ergonomic design is more than good design - elise crawfordErgonomic design is more than good design - elise crawford
Ergonomic design is more than good design - elise crawford
 
Mr. Burhan Khalid - secure dev.
Mr. Burhan Khalid - secure dev.Mr. Burhan Khalid - secure dev.
Mr. Burhan Khalid - secure dev.
 
Secured Development
Secured DevelopmentSecured Development
Secured Development
 
Owasp tds
Owasp tdsOwasp tds
Owasp tds
 
Software Security Initiative Capabilities: Where Do I Begin?
Software Security Initiative Capabilities: Where Do I Begin? Software Security Initiative Capabilities: Where Do I Begin?
Software Security Initiative Capabilities: Where Do I Begin?
 
Business ideas or business opportunities
Business ideas or business opportunitiesBusiness ideas or business opportunities
Business ideas or business opportunities
 
Startup Operating Systems
Startup Operating SystemsStartup Operating Systems
Startup Operating Systems
 
EMBRACING DISRUPTION: HOW ONE MULTINATIONAL IS CHANGING ITS APPROACH TO LEARNING
EMBRACING DISRUPTION: HOW ONE MULTINATIONAL IS CHANGING ITS APPROACH TO LEARNINGEMBRACING DISRUPTION: HOW ONE MULTINATIONAL IS CHANGING ITS APPROACH TO LEARNING
EMBRACING DISRUPTION: HOW ONE MULTINATIONAL IS CHANGING ITS APPROACH TO LEARNING
 
Networking 2016-06-14 - The Dirty Secrets of Enterprise Security by Kevin Dunn
Networking 2016-06-14 - The Dirty Secrets of Enterprise Security by Kevin DunnNetworking 2016-06-14 - The Dirty Secrets of Enterprise Security by Kevin Dunn
Networking 2016-06-14 - The Dirty Secrets of Enterprise Security by Kevin Dunn
 
Architecting a Post Mortem - Velocity 2018 San Jose Tutorial
Architecting a Post Mortem - Velocity 2018 San Jose TutorialArchitecting a Post Mortem - Velocity 2018 San Jose Tutorial
Architecting a Post Mortem - Velocity 2018 San Jose Tutorial
 
Effective Tools for Effective Change
Effective Tools for Effective ChangeEffective Tools for Effective Change
Effective Tools for Effective Change
 
Intro to INFOSEC
Intro to INFOSECIntro to INFOSEC
Intro to INFOSEC
 
TesTrek Notes
TesTrek NotesTesTrek Notes
TesTrek Notes
 
The Lens of Intrinsic Skill Atoms: A Method for Gameful Design
The Lens of Intrinsic Skill Atoms: A Method for Gameful DesignThe Lens of Intrinsic Skill Atoms: A Method for Gameful Design
The Lens of Intrinsic Skill Atoms: A Method for Gameful Design
 
Slide Deck – Class Session 1 – FRSecure CISSP Mentor Program
Slide Deck – Class Session 1 – FRSecure CISSP Mentor ProgramSlide Deck – Class Session 1 – FRSecure CISSP Mentor Program
Slide Deck – Class Session 1 – FRSecure CISSP Mentor Program
 
Learn Learning + Prototype Testing
Learn Learning + Prototype TestingLearn Learning + Prototype Testing
Learn Learning + Prototype Testing
 
Testing Is How You Avoid Looking Stupid
Testing Is How You Avoid Looking StupidTesting Is How You Avoid Looking Stupid
Testing Is How You Avoid Looking Stupid
 
Bootstrapping an Open-Source Program Office at Blue Cross NC
Bootstrapping an Open-Source Program Office at Blue Cross NCBootstrapping an Open-Source Program Office at Blue Cross NC
Bootstrapping an Open-Source Program Office at Blue Cross NC
 
Devops - Accelerating the Pace and Securing Along the Way - Thaddeus Walsh
Devops - Accelerating the Pace and Securing Along the Way - Thaddeus WalshDevops - Accelerating the Pace and Securing Along the Way - Thaddeus Walsh
Devops - Accelerating the Pace and Securing Along the Way - Thaddeus Walsh
 
Bit by Bit: A Framework for Building Technological Competence as a Lawyer
Bit by Bit: A Framework for Building Technological Competence as a LawyerBit by Bit: A Framework for Building Technological Competence as a Lawyer
Bit by Bit: A Framework for Building Technological Competence as a Lawyer
 

Último

How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 

Último (20)

How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 

Failure is not an option it's a core feature

  • 1. Failure Is Not An Option
 (It's a Core Feature!) James Boswell Senior Consultant, CMD Solutions Been there, Learned that, Made the T-Shirt
  • 2. CMD Solutions is an Advanced AWS consulting partner specialising in: • Automated environment creation using Infrastructure As Code; • DevSecOps methods and CICD toolsets; • Baked in automated security controls; and • AWS environments aligned with compliance standards
 (PCI, APRA, IRAP, ISO) James Boswell @xcapee
  • 3. #EPIC-FAIL Who comes to work to look… • Ignorant • Incompetent • Intrusive • Negative I’m with Stupid !
  • 4. The Three Ways of DevOps
  • 5. The first way ¯_(ツ)_/¯ IT WORKS on my machine Flow
  • 6. The first way: Flow git reset --hard #failoften #recoverfast Thank You for Breaking the Build (no really)
  • 7. The first way: Flow s/rack/repo/g #infracoder Everyone has a
 test environment Some are lucky
 enough to have a
 separate environment
 for production
  • 8. The Second Way ¯_(ツ)_/¯ IT WORKS on my machine Feedback
  • 9. The Second Way: Feedback • Devs on call with ops - experience failure rather than distance from it • Greater sense of “we” • Greater understanding of how business value is created • Fix defects faster You Build it,
 You Run it — WernerVogels
  • 10. The Second Way: Feedback • Define metrics at all layers • Business • Application • Operations • Deployments • Invest in Telemetry • Provide an easy way to instrument code • Instrument everything • Centralise metrics collection • Extract value Measure it StatsD::increment(“AllTheThings"); If it moves
  • 11. The Second Way: Feedback UI SERVICE UNIT I said I wanted to be a Test Pilot
  • 12. The Third Way ¯_(ツ)_/¯ IT WORKS on my machine Continual Experimentation and Learning
  • 13. The Third Way: Continual Experimentation and Learning • Out-experimenting the competition means failing fast • A-B Testing • You’re either a learning organisation or you’re losing to someone who is — Andrew Shafer There’s no for experience COMPRESSIONALGORITHM
  • 14. The Third Way: Continual Experimentation and Learning • Netflix can only survive failure
 by failing all the time • Everything fails, all the time • Design for Failure • Deliberately break things to make things better
  • 15. The Third Way: Continual Experimentation and Learning • Every incident is a
 learning opportunity • Blameless Post-Mortems • Beware… • Hindsight Bias • The Fundamental Attribution Error • Finding a single root cause • Are they learning focused? • What stopped this being worse? • It’s not all about the action items Incidents are unplanned investments in your company’s survival — John Allspaw
  • 16. Safety Culture & Psychological Safety Safety Culture “a culture that allows people to give the boss bad news” • Industries and environments where safe 
 practices are questions of life and death
 (Airlines, hospitals, mining, steel making) • Safety 1
 Who caused the problem
 (and how should they be punished) • Safety 2
 What caused the problem
 (who’s hurt, what are their needs, how can we help) Psychological safety • The belief that no one will be punished or humiliated for speaking up with ideas, questions, concerns or mistakes • Far and away the most important of the five key dynamics that set successful teams apart at Google
  • 17. When people fail Who comes to work to look… " 
 I’m with Stupid • Ignorant • Incompetent • Intrusive • Negative Don’t ask questions Don’t admit mistakes Don’t offer ideas Don’t challenge the status quo If you don’t want to look
  • 18. Failure vs Accountability The freedom to Fail is the hallmark of Learning #life-long-learning Low High LowHigh PsychologicalSafety Accountability to meet demanding goals Comfort
 Zone Learning
 Zone Anxiety
 Zone Apathy
 Zone The Competitive Imperative of Learning Amy C. Edmondson https://hbr.org/2008/07/the-competitive-imperative-of-learning
  • 19. I’d love to continue
 the conversation and find even more DevOps T-shirt inspiration James Boswell @xcapee