Git has become the version control system of choice for many developers. It is relatively easy to use, has good repository integrity, and has a distributed architecture. But Git also has some limitations and can be challenging to support for large scale enterprise use. Read on for some practices.
Bob Aiello is a consultant, a technical editor for CM Crossroads, and the author of Configuration Management Best Practices: Practical Methods that Work in the Real World. Bob has served as the vice chair of the IEEE 828 Standards working group and is a member of the IEEE Software and Systems Engineering Standards Committee (S2ESC) management board.
Connect with Me
All Stories by Bob Aiello
Of course DevOps focuses on enhancing the working relationship between development and operations, but it just as easily includes QA, data security, or any other silo of smart people who need to collaborate more effectively. This requires an understanding of DevOps principles. Read on for more.
Process improvement is a fundamental endeavor that any successful organization must embrace. The challenge many companies face is how to effectively implement IT process improvement. A good place to begin is with an assessment of current operations; then measure those findings against good criteria.
DevOps is a set of principles and practices that help teams, including development and operations, to communicate and collaborate more effectively. But DevOps also has a dark side, and some dysfunctional behaviors and misunderstandings can keep organizations from implementing these best practices.
The Chicago Board Options Exchange (CBOE) trading system recently was shut down for part of a day due to a software glitch. Some inside the CBOE are looking to recent configuration changes, requirements tracking, and testing as possible culprits.
Despite a recent White House executive order designed to beef up cyber security, First Lady Michelle Obama has fallen victim to doxing, a technique for collecting from the Internet personal information that then can be used to access more sensitive, security-critical information.
Israel's Iron Dome Missile Interception System is a computer aided rocket system that intercepts incoming missiles and destroys them before they reach their intended target. Bob Aiello writes on this military defense system and how it relates to many of the practices associated with ALM.