15 Books That Will Change The Way You Do IT Ops

  • Upload
    vistara

  • View
    846

  • Download
    0

Embed Size (px)

Citation preview

PowerPoint Presentation

1

Why Read This Book?

The Practice of System and Network Administration is a long read at 1,000+ pages. Learn how to address IT problems without getting lost in the details with a framework for thinking about system administration problems.

If you cant measure it, you cant manage it. In the field of system administration, that useful business axiom becomes: If you arent monitoring it, you arent managing it.

Why Read This Book?

Network Warrior distills Gary A. Donahues experience as a consultant and entrepreneur. The book covers all the networking technologies youll need to know plus advice on how to work with your business.

Companies only spend money on IT projects that lower costs, increase performance or capacity, or increase reliability.

Why Read This Book?

The Visible Ops Handbook helps you understand the common characteristics of high performing IT organizations. The authors share a four phase framework for continuous improvement and taming the chaos of unplanned change.

Start by identifying the systems and business processes that generate the greatest amount of firefighting. When problems are escalated to IT operations, which servers, networking devices, infrastructure or services are constantly being revisited each week?

Why Read This Book?

How do you make progress on long term projects while still handling urgent escalations? Tom Limoncelli explains how you can guard your valuable work time with a mutual interruption shield.

Time management is difficult for SAs because we are constantly being interrupted. How can we get anything done if we are constantly pausing to fix emergencies or respond to requests that arrive in person, via email, or via the newest source of interruptions, instant messages (IMs)?

Why Read This Book?

This short read (54 pages long) gives you the plain facts about Scrum. Drive valuable and collaborative work with Scrum and respond faster to customer needs and ship products sooner.

Scrum is designed to help teams continuously inspect and adapt, resulting in ever-improving performance and happiness.

Why Read This Book?

How does a scheduling systems for lean manufacturing apply to IT operations? David J. Anderson offers a five step Kanban success recipe for driving agility and efficiency across your IT teams.

Kanban has been shown to improve customer satisfaction through regular, dependable, high quality releases of valuable software. It has been shown to improve productivity, quality and cycle times.

Why Read This Book?

Published in 2013, The Phoenix Project explains how to escape from a world of constant crisis. Learn the philosophy of The Three Ways to transform IT to meet competitive challenges.

IT Operations seems to have lodged itself in every major flow of work, including the top company project. It has all the executives hopping mad and theyre turning the screws on your Development guy to do whatever it takes to get it into production.

Why Read This Book?

How do you apply DevOps principles in a mature enterprise? Learn how HP's Laserjet division transformed its software development processes and saved $45 million in development costs per year.

Transforming development and delivery processes in a large, traditional organization requires a lot of technical change that will require some work, but by far the biggest challenges are with changing the culture and how people work on a day-to-day basis.

Why Read This Book?

How do you build software that can be frequently and reliably released into production? Continuous Delivery helps you deliver new services at the pace your business wants.

Our aim is to make the delivery of software from the hands of developers into production a reliable, predictable, visible, and largely automated process with well-understood, quantifiable risks.

Why Read This Book?

How do you build large scale and resilient systems in the cloud? Scale operations for hybrid cloud environments with best practices for building and running distributed systems.

Manual processes do not scale. When tasks are manual, if there are twice as many tasks, there is twice as much human effort required.

Why Read This Book?

How do you plan, deploy, migrate, and manage IT in the brave new world of cloud? This book show you how to migrate traditional enterprise services to hybrid cloud environments.

Cloud computing...takes technology and IT concepts from the past and transforms them into a faster delivery modelproviding new IT services and business value to customers at a pace weve never seen before.

Why Read This Book?

How does a company like Google operate services like Gmail and Google Maps with millions of users? Site Reliability Engineers help Google build and operate hyperscale infrastructure with automation.

Traditional operations teams and their counterparts in product development thus often end up in conflict, most visibly over how quickly software can be released to production.

Why Read This Book?

Delivering a fast, secure, and always available web application is a difficult undertaking. Web Ops deals with the complexities of scaling, maintaining, and securing your apps.

Because websites are globally used, there is no good time for changes, upgrades, or maintenance windows, only fewer bad times. This also means that outages are guaranteed to affect someone, somewhere using the site, no matter what time it is.

Why Read This Book?

Learn from one of the worlds best hackers why all the security practices in the world can still leave you vulnerable. Social engineering can crack the human firewall and expose your business to multiple risks.

Anyone who thinks that security products alone offer true security is settling for the illusion of security. It's a case of living in a world of fantasy: They will inevitably, later if not sooner, suffer a security incident.

Why Read This Book?

Not a day goes by without a high profile security breach. The Tangled Web, written by Googles resident browser security expert, explains why web architectures are fundamentally insecure and what you can do to protect your organization.

As the complexity of our online interactions approaches that of real life, the odds of designing perfectly secure software are rapidly diminishing. Meanwhile, the extreme paranoia begins to take a heavy toll on how quickly we can progress.

Follow The Vistara Blog for Great Insights on IT Operations