It would seem that the devops discussion is mostly driven by development’s incentives, and appropriately so, given developers’ focus on building functionality for the business user. So it’s no surprise that development is the originator of the whole devops lifecycle, but are there any dangers lurking in a one-sided focus on devops issues? A hefty majority of devops articles come from writers of the development persuasion who are motivated by the legitimate frustrations of the application deployment process. The movement to agile development has been a key contributor in the increase of handicaps encountered as a result of more frequent transitions from development to operations IT groups. Online and verbal discussions identify the primary challenge Read more
William Keyworth focuses on IT operational excellence. Bill has established a reputation as a credible and consistent voice in maximizing business value from IT operations. Read more ...
The critical need for technology to achieve core business goals has never been more pronounced. Business is rapidly advancing the use of technology to generate better profit margins, improved customer relationships and competitive advantage. As a result, the degree of change within IT organizations is unparalleled. Simultaneously, alternative “business” options for IT services now available outside corporate IT Operations are rapidly multiplying. Cloud service providers such as Infrastructure-as-a-Service (IaaS) and Software-as-a-Service (SaaS) are able to quickly resolve the business demands for faster IT provisioning, increased storage capacity, faster response time, and more flexible software business applications. Managed Service Providers can cost-effectively resolve or alleviate the resource handicaps of traditional, internal IT service organizations. But much Read more
IT organizations devote significant attention to delivering the technology and processes that ensure the achievement of business objectives. It’s what we do in IT. It’s the recognition that drives our actions. It’s our purpose for existing. Yet is it sufficient to simply deliver value without any executive recognition for that contribution? IT best practices require that we not only deliver on the promise of IT, but that we also take the necessary steps toward recognition of that value so that the business “buys IT.” This marketing-style approach allows IT to remain adequately funded, gain support for technology investments, obtain backing for critical IT initiatives, and ensure responsiveness to our dependencies. Marketing IT Is Not a Read more
Cloud computing is truly one of the major technology shifts of our era. It’s natural for a technology solution as pervasive and beneficial as cloud computing to be oversold to users with inflated expectations. Industry observers have consistently highlighted the rapid adoption of cloud computing and cloud services by end users, which is driving an explosion of interest within the vendor community.1 Given the conservative growth rates for most software and hardware in our current economy, it’s understandable that the huge growth rate forecast for cloud attracts almost every high-tech vendor. That pervasiveness is hype, but it’s a “good” hype in that critical technologies do emerge as legitimate offerings. Unfortunately, that pervasiveness also means that Read more
We seem to invest heavily in IT service management solutions that are highly dependent upon agent technologies for the visibility needed to “drive” (i.e. access, secure, manage and control) the desktops, laptops and servers within our IT infrastructure. Are these applications so compelling that we trust traditional agent-based management models which are inherently vulnerable to the same risks as the endpoints they manage? Is it wisdom to introduce the resultant IT operational handicaps of being unable to identify over 15-20% of our infrastructure’s endpoints1 due to issues of hidden, missing, outdated, or misconfigured agents required for anti-virus, inventory and patches? Given the significance of the functionality of these mission critical IT management and security applications, Read more