ChatOps
Managing Operations in Group Chat
Book Details
| Author | Jason Hand |
| Publisher | O'Reilly Media |
| Published | 2016 |
| Edition | 1st |
| Paperback | 96 pages |
| Language | English |
| ISBN-13 | 9781492042891, 9781491962305 |
| ISBN-10 | 1492042897, 1491962305 |
| License | Compliments of VictorOps |
Book Description
Increase efficiency with ChatOps, an approach that helps IT teams collaborate and perform daily actions from a unique, turbocharged chatroom. With this 75-page report, you'll learn how your team can query information, work together on solutions, enter commands with bots and scripts, and comment on the work - all in one place and in real time.
Author Jason Hand takes you through key ChatOps concepts and technologies, as well as the challenges you need to consider as you start to use persistent group chat as your operational interface. You'll learn how ChatOps can provide people throughout your department and organization with the context they need to understand how - and why - their operations are evolving.
With this report, you'll explore:
- Key benefits including increased automation and sharing of domain knowledge
- How ChatOps relies on APIs to leverage tools and services
- Why a familiar chat interface helps people engage with the process
- Common uses and tasks, including read-only data retrieval
- How persistent data from group chat can enhance other processes, such as compliance and post-mortems
- The use of existing chat services, third-party integrations, and bots in ChatOps implementations
- Several options to help your team get started with ChatOps
This book is published as open-access, which means it is freely available to read, download, and share without restrictions.
If you enjoyed the book and would like to support the author, you can purchase a printed copy (hardcover or paperback) from official retailers.
Download and Read Links
Share this Book
[localhost]# find . -name "*Similar_Books*"
Deep Learning with JavaScript
Deep learning has transformed the fields of computer vision, image processing, and natural language applications. Thanks to TensorFlow.js, now JavaScript developers can build deep learning apps without relying on Python or R. Deep Learning with JavaScript shows developers how they can bring DL technology to the web. Written by the main authors of t
Annotated Algorithms in Python, 2nd Edition
This open book is assembled from lectures given by the author over a period of 10 years at the School of Computing of DePaul University. The lectures cover multiple classes, including Analysis and Design of Algorithms, Scientific Computing, Monte Carlo Simulations, and Parallel Algorithms. These lectures teach the core knowledge required by any sci
A Graduate Course in Applied Cryptography
Cryptography is an indispensable tool used to protect information in computing systems. It is used everywhere and by billions of people worldwide on a daily basis. It is used to protect data at rest and data in motion. Cryptographic systems are an integral part of standard protocols, most notably the Transport Layer Security (TLS) protocol, making
Managing Risk and Information Security, 2nd Edition
Examine the evolving enterprise security landscape and discover how to manage and survive risk. While based primarily on the author's experience and insights at major companies where he has served as CISO and CSPO, the book also includes many examples from other well-known companies and provides guidance for a management-level audience. Managing Ri
Managing Cloud Native Data on Kubernetes
Is Kubernetes ready for stateful workloads? This open source system has become the primary platform for deploying and managing cloud native applications. But because it was originally designed for stateless workloads, working with data on Kubernetes has been challenging. If you want to avoid the inefficiencies and duplicative costs of having separa
Continuous API Management, 2nd Edition
A lot of work is required to release an API, but the effort doesn't always pay off. Overplanning before an API matures is a wasted investment, while underplanning can lead to disaster. The second edition of this book provides maturity models for individual APIs and multi-API landscapes to help you invest the right human and company resources for th