The Phoenix Project: A Novel about IT, DevOps, and Helping Your Business Win

By Gene Kim, Kevin Behr, George Spafford

Bill is an IT supervisor at elements limitless. it truly is Tuesday morning and on his force into the place of work, invoice will get a decision from the CEO.

The company's new IT initiative, code named Phoenix venture, is important to the way forward for elements limitless, however the undertaking is hugely over finances and intensely overdue. The CEO desires invoice to document on to him and attach the mess in 90 days in any other case Bill's whole division might be outsourced.

With the aid of a potential board member and his mysterious philosophy of the 3 methods, invoice starts off to work out that IT paintings has extra in universal with production plant paintings than he ever imagined. With the clock ticking, invoice needs to arrange paintings movement streamline interdepartmental communications, and successfully serve the opposite company services at components limitless.

In a fast moving and exciting kind, 3 luminaries of the DevOps stream carry a narrative that anybody who works in it's going to realize. Readers won't merely the right way to increase their very own IT companies, they are going to by no means view IT a similar manner again.

Show description

Quick preview of The Phoenix Project: A Novel about IT, DevOps, and Helping Your Business Win PDF

Similar Information Technology books

Reverse Deception: Organized Cyber Threat Counter-Exploitation

In-depth counterintelligence strategies to struggle cyber-espionage "A complete and unprecedented assessment of the subject via specialists within the box. "--Slashdot disclose, pursue, and prosecute the perpetrators of complicated power threats (APTs) utilizing the proven defense recommendations and real-world case stories featured during this special advisor.

Information Security: The Complete Reference, Second Edition

Increase and enforce an efficient end-to-end defense software Today’s complicated international of cellular structures, cloud computing, and ubiquitous info entry places new safety calls for on each IT specialist. info defense: the entire Reference, moment variation (previously titled community safeguard: the total Reference) is the single accomplished publication that provides vendor-neutral info on all features of data safety, with a watch towards the evolving danger panorama.

CCNA Cisco Certified Network Associate Routing and Switching Study Guide (Exams 200-120, ICND1, & ICND2), with Boson NetSim Limited Edition (Certification Press)

The easiest totally built-in research approach to be had With hundreds of thousands of perform questions and hands-on routines, CCNA Cisco qualified community affiliate Routing and Switching examine advisor with Boson NetSim constrained version covers what you must know-- and exhibits you ways to prepare--for those tough assessments.

CompTIA Network+ All-In-One Exam Guide, Sixth Edition (Exam N10-006)

From Mike Meyers, the number one identify in CompTIA education and examination training, a radical revision of his bestselling examination guide―updated to hide the 2015 liberate of the CompTIA community+ examination. Get whole insurance of the entire CompTIA community+ examination ambitions within this accomplished source. Written by means of the best specialist on CompTIA certification and coaching, Mike Meyers, this authoritative consultant covers examination N10-006 in complete aspect.

Extra resources for The Phoenix Project: A Novel about IT, DevOps, and Helping Your Business Win

Show sample text content

As continuously, I’m stunned through how younger he's. He’s most likely in his mid-thirties with thick, curly black hair. John has a haggard glance approximately him, and prefer many students, has always received weight within the 3 years he’s been right here at elements limitless. probably from the entire tension linked to his failing ethical campaign. John truly jogs my memory extra of Brent than somebody else within the room. notwithstanding, in contrast to Brent who often wears a Linux T-shirt, John wears a starched, collared blouse that’s a bit too huge. Wes is conspicuously underdressed in comparison to everybody within the room, yet he evidently doesn’t care. The final individual within the room is a tender guy who I don’t realize, most likely the IT auditor. Nancy starts, “We have simply concluded our Q3 inner audit in education for the impending exterior SOX-404 audits. we've got a grave scenario. Tim, our IT auditor, came upon an eye-opening variety of IT regulate concerns. Worse, many are repeat findings going into the 3rd yr. Left unresolved, those findings may possibly strength us to finish that the corporate now not has adequate controls to claim the accuracy of its monetary statements. this might lead to an adversarial footnote from the exterior auditors within the corporation 10-K filings with the U.S. Securities and trade fee. “Although those are just initial findings, a result of gravity of the location, i've got already verbally proficient the audit committee. ” I blanch. even if I don’t comprehend the entire audit jargon, i do know sufficient that this may destroy Dick’s day and suggest almost certainly extra undesirable front-page information. happy that I comprehend the severity of the location, Nancy nods. “Tim, please stroll us via your conclusions. ” he's taking out an immense stack of stapled papers, handing one out to everybody assembled. “We have simply concluded our audit of the IT normal controls at components limitless for all the serious monetary structures. It took a workforce of 4 humans over 8 weeks to create this consolidated record. ” Holy crap. I elevate the two-inch thick stack of papers in my hand. the place did they discover a stapler this gigantic? It’s a published Excel spreadsheet, with twenty rows according to web page in tiny eight-point sort. The final web page is numbered web page 189. “There needs to be 1000 matters the following! ” I say in disbelief. “Unfortunately, yes,” he responds, no longer fullyyt capable of cover his conceited pride. “We came across 952 IT normal regulate deficiencies, of which 16 are major deficiencies and are capability fabric weaknesses. evidently, we’re very alarmed. Given how quickly the exterior audit begins, we'd like your remediation plan once attainable. ” Wes is hunched over the desk, one hand on his brow, the opposite hand flipping via web page after web page. “What form of horseshit is that this? ” He holds up one web page. “‘Issue 127. Insecure home windows working approach MAX_SYN_COOKIE setting’? is that this a comic story? if you happen to haven’t heard, we’ve acquired a true company to run. Sorry if that interferes with this full-time audit employment racket you’ve obtained occurring the following.

Download PDF sample

Rated 4.10 of 5 – based on 21 votes