Skip to main content

Where have I been?

I have been away for a while for a few reasons.  One reason, I forgot I even had this blog. :)  I was shocked to see I actually got some comments on some early post.  Thanks, to those who did comment.

Another reason is that I went from software development into operations again.  I could say that I was too busy fighting fires to keep up this blog and practice.  If I am honest and I look back that would not be true.  I could have taken this blog to another level while I was in ops, if I could have seen the bigger picture.

As I got more and more frustrated with the operations team lack of improvement and more frustrated with how development treated operations, I realized this process was just broken.  I really had no solutions.   I would tell operations to just take their beating and we can figure it out later.  Ops kept pushing back on Dev.  Dev stayed longer and longer on projects.  Dev struggled with the turn around on ops deployments and requests.  Ops struggle with transitions.  Ops struggled with dev going around ops to get things done.  How can this work?  Honestly it works only because the client has low expectations and doesn't really know it could be better.

Then, just in a random passing I heard about something called "DevOps".   (Wish I had heard about this years back but that was not my path to this passion)

This blog is going to be my thoughts and information as I stop focusing on Development or Operations and focus on DevOps.

Comments

Popular posts from this blog

2020 State of DevSecOps by Accurics

 This is an excellent report for all IT Pros and Engineers.   Highlights: Storage is most impacted solution Open security groups or network configuration Secrets are not so secret Unused resources are not secure. Take a look at these.  Look again.  These are not highly skilled problems.  They just need guidelines and proactive management.  The article uses policy as code as a solution for many of the problems.  I will drill into each of these more in the future.  I wanted to get the awareness out first and then, come back to solutions.  

Cloud Ops: The New IT for the Cloud Era

Over the past few months of interviewing and researching dozens of companies—particularly small to mid-sized SaaS businesses—one pattern keeps emerging: the desire to stand up a Cloud Operations (Cloud Ops) organization. It makes sense on the surface. Cloud is now the infrastructure of choice, so naturally, someone needs to “own” it. But what’s unfolding in practice often misses the mark. Many companies are attempting to solve growing cloud complexity by taking all their DevOps, SRE, and platform engineering talent and consolidating them into a Cloud Ops team. The idea? Share them across product teams so no one gets overwhelmed. If that sounds familiar, it should. It’s the same centralization tactic used by traditional IT for decades. And it's creating the same problems. When Cloud Ops Becomes Old IT in Disguise Here’s the playbook we’re seeing: Move DevOps, SRE, and Ops into a central Cloud Ops team. Let them handle infrastructure, CI/CD, monitoring, and cloud securit...

How AI is Transforming DevSecOps: A New Era of Secure, Agile Software Delivery

 As software delivery accelerates and attack surfaces grow, traditional DevSecOps practices are being pushed to their limits. The integration of artificial intelligence (AI) into DevSecOps workflows is not just a trend—it’s a strategic imperative. AI is driving a seismic shift in how we manage code quality, automate security, respond to threats, and enable secure innovation at scale. In this post, we’ll explore the key ways AI is improving DevSecOps and why forward-thinking organizations are embedding it deeply into their pipelines. 1. Proactive Threat Detection and Response In modern CI/CD pipelines, code moves fast—sometimes too fast for human eyes to catch every vulnerability or misconfiguration. AI helps shift security left and right by: Analyzing code and dependencies with natural language processing and ML to detect hidden vulnerabilities, insecure APIs, or anomalous changes during commits. Real-time anomaly detection in production environments using AI-powered o...