DevOps Archives - JASON SUTTIE
Jason Suttie Head of Disruption at The Foundery division of Rand Merchant Bank
Jason, Suttie, RMB, Agile, DevOps, Rand, Merchant, Bank, Technology, IT, Disruption, Foundery,
26
archive,category,category-devops,category-26,ajax_fade,page_not_loaded,,qode_grid_1300,footer_responsive_adv,qode-theme-ver-16.2.1,qode-theme-bridge,disabled_footer_bottom,wpb-js-composer js-comp-ver-5.4.7,vc_responsive

DevOps

- DevSecOps is the golden thread of security through the organisational fabric that focuses on application development. - This is the philosophy of bringing in security principles and practices into every stage in the lifecycle of application development - Application of Machu Picchu thinking ...

FinTech is making waves across the globe - but little is known or predicted about how this will shape banking in Africa. I sat down with KNect 365 on what the future could look like. ...

On the 29th August, FirstRand in partnership with BSG hosted the Fast Fish Forum at FNB Bank City. The forum titled “Demystifying the Data Science cookbook - Tasty meals or disasters waiting to happen?” focused on how to do Data Science projects right and some of the pitfalls in the delivery lifecycle. Post a short Data Science cookbook presentation – paired with delicious food from a great chef, the forum then moved to an emergent agenda that was participant directed....

I spoke at Africa DevOps on ChatOps. Many of you will be familiar with using Chat channels in the DevOps space, ChatOps formalises this practice. The most common definition of ChatOps is as follows: What is ChatOps? Conversations, put to work. ChatOps is a collaboration model that connects people, tools, process, and automation into a transparent workflow. This flow connects the work needed, the work happening, and the work done in a persistent location staffed by the people, bots, and related...

DevSecOps = DevOps + Security ( Sec ) In the world of DevSecOps as you may predict we have three teams working together. Development, the Security team and Operations. ...

We’ve framed the enterprise problem, now how do we apply DevSecOps to it? Well the answer is to delve a little more into DevSecOps. DevSecOps = DevOps + Security ( Sec ) In the world of DevSecOps as you may predict we have three teams working together. Development, the Security team and Operations....

THE SPINE MODEL – a philosophy of thoaught for Agile companies. Let’s Walk the Spine to show how this philosophy can be applied to the real world....

I believe that in this time we live in more than any other that came before it we are dealing with exponentials. Exponential growth, exponential challenges, and exponential solutions. This theme manifests into both daily life and our businesses, and since our businesses are technology driven into technology too....

THE “SEC” OF DEVSECOPS introduces changes into the following: • Engineering • Operations • Data Science • Compliance...

Even if you are focussing on the tools and technology in DevOps. You cant forget about the behaviour of people. The change in technology that DevOps brings is equally profound as the change people need to make in the way they work....

Enter “The Foundery”, RMB’s Technology Disruption Unit – this is where we want to showcase how to do it right. ...

The body has organs that provide specific and vital functions. In order to survive each organ needs to work in harmony with the other. Just like the body, enterprises have organizational divisions/silos that provide specific functions....

[vc_row css_animation="" row_type="row" use_row_as_full_screen_section="no" type="grid" angled_section="no" text_align="left" background_image_as_pattern="without_pattern" css=".vc_custom_1463146108811{padding-bottom: 20px !important;}"][vc_column offset="vc_col-lg-offset-1 vc_col-lg-10 vc_col-md-offset-1 vc_col-md-10"][vc_column_text][dropcaps type='normal' font_size='45' color='#191919' background_color='' border_color='']T[/dropcaps]ypically, IT policies cover many aspects of technology – including security. These policies are written in elaborate documents and then are stored somewhere cryptic. Then we hire experts to come in and manually run penetration tests against the environment which gives us measurement feedback on both compliance and vulnerabilities. We then take these manually generated penetration test reports and ask people in...