Today, where there are almost as many approaches to digital transformation as there are enterprise software vendors, Docker refocuses its strategy on providing the best unified container management platform for DevOps. Docker’s key value proposition is to enable developers to build an application once and then deploy it to any Kubernetes-driven private or public cloud, where DevOps teams and IT operations can manage it throughout its lifecycle and move it to another location at any point in time. However, Docker also aims to absorb traditional enterprise applications, edge and IoT workloads, big data apps, blockchain, and serverless functions, both on Windows and on Linux.
OpenManage Enterprise is a big deal, but underrated: OpenManage Enterprise is the new infrastructure automation platform that could unlock the private and hybrid cloud for Dell. Deploying Dell infrastructure through a simple YAML file is within reach.
Here are the 10 quotes that best sum up #Think2018. Inspired by Think 2018, I came up with my own ideas for AI bots and posted them here.
With development teams working on 3-4 releases in parallel and releasing at least once a quarter, we often see release overhead consuming an average of 20-30% of development and operations resources. Enterprises releasing every month, week, or even day suffer from even larger overhead. Here is what you can do to free up most of these 20-30% for the faster creation of new critical software features: to enhance customer value:
The EMA Top 3 report for Container Management and DevOps in Production and at Scale is a curated collection of a large number of data points that reflect individual priorities, pain points, technology adoption patterns, requirements, opinions, and so on, of 300 enterprises. It then dives deeper into these individual data points to provide readers with enough context to inform their technology selection process to some degree. However, each reader needs to pick out the nuggets that are the most relevant to him or her and then draw her own conclusions. Look at it this way: the EMA Top 3 polls 300 of your peers on 58 container and DevOps related questions and you can learn from the answers without having 300 separate conversations.
Digital attackers in 2018 need to focus on one key challenge: “how do I deliver the best possible value to my clients, without significantly increasing cost.“
Top 10 enterprise IT Predictions for 2018 – Release Faster, Cheaper, and at Higher Quality – Everything Is about Becoming a Digital Attacker
AWS Re:Invent 2017 – Serverless Containers, Managed Kubernetes, Bare Metal, Machine Learning, and IoT
Breaking the Triangle of Cost, Quality, and Speed
This year’s AWS Reinvent delivered major announcements in DevOps, machine learning and IoT. All of the announced capability aim to eliminate infrastructure as the bottleneck for enterprises to become ‘digital attackers’. Observing the nearly 50.000 developers, architects, and software operators that came to Reinvent showed us a significant degree of genuine excitement about Amazon helping enterprises release new software faster, at a higher quality and lower cost.
First Came Autonomic Computing
‘Autonomic Computing’ was the original concept of providing systems and apps with the power autonomously responding to unpredictable challenges. ‘Autonomic Computing’ came with all the right ideas (IBM deserves a good share of credit for defining this concept), but failed due to the same cultural and technological barriers DevOps is struggling with today. There simply was not enough ‘pressure to innovate.' This allowed inertia to prevail, leading to 'business as usual,' instead of magical self-healing and self-optimizing datacenter infrastructure.
This year’s DevOps Enterprise Summit (DOES) in San Francisco was carried by the enthusiasm of 1500 practitioners who were genuinely enthusiastic about how DevOps can transform their enterprises into a ‘digital attacker.’ Digital attackers rely as DevOps as their innovation engine to rapidly release high quality software that offers measurable business value. In short, digital attackers bully their competition by offering best in class customer value on an continuous basis and in a cost effective manner.