Secure Agile Cloud Development

A secure agile cloud development procedure to produce cloud-native and other applications starts first with a process. (See video at end of this article for a secure process.) This process defines how code created by a developer eventually makes it through to production and customer use. I have found that many companies do not even have …

Goodbye 2015, and Here We Go, 2016

Goodbye 2015 and here we go 2016. Since this is my first post of the New Year, I wanted to start the year with a post on one of my current favorite topics for discussion and that topic to start the year right is automation. For this post, let’s concentrate on the second day operations type of automation. Second day operations is really quite a different beast from the build and decommission automation in that second day operations incorporate several different approaches to the automation. It is these approaches that I discuss a little further.

Failure of Imagination

After the Apollo 1 disaster, astronaut Frank Borman told Congress that the tragedy had not been caused by any one company or organization, but by the entirety of all those involved with the Mercury, Gemini, and Apollo missions. The problem had been a failure of imagination. They knew that at some point there would be a fire in a space …

Additional Thoughts on Criteria for Your Business Case Development

In a previous post, I talked about developing a criteria triangle, with the bottom being the systems/data layer, the middle the objectives/tactics layer, and the peak the strategic results layer. The objective is to make sure the criteria that you select hit in the middle and upper layers of the triangle, where folks work in the realm of …