Continuous Delivery in the Wild
Book Details
| Author | Pete Hodgson |
| Publisher | O'Reilly Media |
| Published | 2020 |
| Edition | 1st |
| Paperback | 37 pages |
| Language | English |
| ISBN-13 | 9781492077701, 9781492077695 |
| ISBN-10 | 1492077704, 1492077690 |
| License | Compliments of Split.io |
Book Description
Software delivery practices are constantly improving as companies apply the philosophy of continuous delivery to deploy and release changes quickly, safely, and predictably. Most teams, however, hit roadblocks in the process. This report examines 10 organizations that have implemented continuous delivery in the real world. These case studies demonstrate how branching strategy, environment design, release management, and the software delivery lifecycle can have significant impact on your journey toward continuous delivery.
Software engineering managers, senior developers, and architects will explore common approaches that most companies in these case studies found useful. Software delivery expert Pete Hodgson provides actionable ideas for implementing or improving continuous delivery within your own organization, including multiple ways to achieve the same goal.
- Learn continuous delivery practices in healthcare, real estate, online retail, financial services, and other industries
- Understand the differences between trunk-based and branch-based delivery modes
- Explore how autonomy within product delivery teams boosts continuous delivery programs
- Learn how continuous delivery can work for companies with either service-oriented or monolithic architectures
- Discover the advantages of investing in a delivery platform that provides self-service tooling to product engineers
This book is published as open-access, which means it is freely available to read, download, and share without restrictions.
If you enjoyed the book and would like to support the author, you can purchase a printed copy (hardcover or paperback) from official retailers.
Download and Read Links
Share this Book
[localhost]# find . -name "*Similar_Books*"
Jenkins: The Definitive Guide
Streamline software development with Jenkins, the popular Java-based open source tool that has revolutionized the way teams think about Continuous Integration (CI). This complete guide shows you how to automate your build, integration, release, and deployment processes with Jenkins - and demonstrates how CI can save you time, money, and many headac
The SysAdmin Handbook
Over the past two years, Simple-Talk has published articles on a variety of SysAdmin topics, from Exchange to Virtualization, and including everything from Powershell to Unified Messaging. We have brought the best of these articles together to form The SysAdmin Handbook. With over fifty articles packed into this book, it will be an essential refere
Load Balancing in the Cloud
Use of redundant servers has long been a solution for meeting sudden spikes in demand, machine failures, and outages. Cloud services greatly reduce the cost and hassle of provisioning redundant equipment and load balancers and give you the ability to deal with separate network, application, and client-side loads. But today there are many options to
DevOps for Digital Leaders
Learn to design, implement, measure, and improve DevOps programs that are tailored to your organization. This concise guide assists leaders who are accountable for the rapid development of high-quality software applications. In DevOps for Digital Leaders, deep collective experience on both sides of the dev - ops divide informs the global thought le
Cloud Native DevOps with Kubernetes, 2nd Edition
Kubernetes has become the operating system of today's cloud native world, providing a reliable and scalable platform for running containerized workloads. In this friendly, pragmatic book, cloud experts Justin Domingus and John Arundel show you what Kubernetes can do-and what you can do with it. This updated second edition guides you through the gro
A Graduate Course in Applied Cryptography
Cryptography is an indispensable tool used to protect information in computing systems. It is used everywhere and by billions of people worldwide on a daily basis. It is used to protect data at rest and data in motion. Cryptographic systems are an integral part of standard protocols, most notably the Transport Layer Security (TLS) protocol, making