Continuous Lifecycle ...
Sounds a lot like Application Lifecycle Management, which if we learn from history, ruins companies that begin to believe their own hype, just look at Borland and Rational.. DevOps is heading the same way, yay :D
1568 publicly visible posts • joined 5 Apr 2007
And if you look back, El Reg was peddling article after article about this - Yet if you read all the comments from the same period, nearly every (clued up) el-reg reader called this bollocks!
So next time El Reg, rather than referencing Gartner, who we know are charlatans... Listen to the real experts - Your dear readers who are at the coalface, rather than academics and PFY's who can bearly produce stubble!
DHA: Excuse me sir, whats is your Facebook ID?
ME: I'm not on Facebook
DHA: Oh ok. What is your Twitter handle?
ME: I'm not on Twitter
DHA What about instagram?
ME: I'm not on Instagram
DHA: Thank you sir, you may enter..
ME: Thank fuck for that, I thought you were going to ask for my Pornhub ID, that would have been embarrassing.
The truth is a process can only be optimised so much, and each iteration becomes progressively more difficult. The fact we've got this far with silicon is a testament to the folks who work in the industry.
Saying that, we really do need a paradigm shift, with a move to light based processing or meta-matetials (troll Face)!
@Dr Mantis Toboggan
Let me guess, you just graduated? Now go make the tea little padawan!
There are 2 things you need to learn, and quickly:
1) There is no "beginner languages" or "real languages", each language has it uses and its a case of choosing the best for the intended purpose.
2) Elitest (aka newbie) developers who scream "my language is better", typically lack the skill, confidence or dexterity to recognise this, then often leave a mess when they depart as they lacked the insight to recognise point 1.
Broaden your skillset and widen your appeal (as well as salary), or forever be working on the same shit day after day, then when your "real language" goes out of vogue, start panicking that there are insufficient roles and two many "Elite developers" fighting for them.
Agreed.
The big problem I see between Cloud an On-prem at the moment is the disjointed security, I wish somebody would come up with a solution for that. Certain things you would take for granted with on-prem, such dropping a couple of Next-gen Firewalls to a core-location, or tapping a port to give traffic forensics etc.. Are very difficult or impossible in AWS, and AWS don't seem interested in offering a decent alternative.
Instead what you get is, a few security policies groups to control port and IP access.. no IPS, DPS, DPI or App filtering. Everytime I think about this, I have 1 single thought "... Hey AWS, 2003 just called, they want their security methodology back.."
If AWS offered the hypervisor capabilities of ESXi to customers on the normal EC2 platform, the world and cloud would be a much better place!
@AC Becareful what you wish for.. if they have to pay the correct amount of tax, then they'll use that an excuse to raise prices, follow by a press release stating "Due to increase overheads within the UK, a price increase is required to offset the differences!"..
These companies have one rule - Placate the shareholders..
Shareholders have one rule - Screw everybody to get maximum return
My local council at the time (Portsmouth) was begging for companies to take the cash - surprisingly few companies took this up (at least in the beginning).
It was a good deal though, allowed me to crank up the companies interpipes and give us not only better connectivity, but delivery a workable DR (as data had to be replicated offsite).
I would have wet myself laughing if I hadn't done exactly this recently (Infrastructure -> Infosec)
(Though, the team I've joined isnt compliance orientated and my role is still infrastructure, thank god! bonus point for you: same infrastructure role pays 30% more just by tacking "security" on the title..)
@chris 125
But your specifically talking about contracts there - But the handset you usually receive is the "base" (with any of the bloatware or crapware) from the Network operator, additionally it is unlocked, so your free to put a SIM in it from another network.
You seem to have forgotten the "Carphone Warehouse" part of the name, which typically operate separate stores dedicated to Mobiles.
Now would I buy a phone from Carephone Warehouse? Probably, as they are usually unlocked and can be on any network.. So you're better of getting one from there, than going directly to the Network operators where you will be tied in.
As for the rest of the losses, not surprised, as the place is a bureaucratic hell-hole, I'm surprised anything ever gets done! Interesting news on the Connected World Services, and great shame (they develop business-2-business software solutions etc), as they've got some awesome platforms and are probably the most agile and "non-corporate" division of the company. I wonder if part of these loses though are down to re-organisation internally, for example a recent acquisition being shifted away from CWS into Dixons..
I realised the stupidity of HR and "Strategic focused IT Managers" (IT Managers who don't have an ounce of IT experience) just after graduating Uni in 2003, when I saw an an job ad for "a .NET developer, must have 10 years experience!"..
If you can't spot the issue here, you either too young, or you've got a future career as an Strategic-focused Manager in IT.
50% of companies don't have a plan, 40% have an untested one, whilst 10% have a tried and tested..
Then there is the question of how prepared are they to detect an attack, over the past 4 years I've worked at 3 different companies, only 1 of them was properly prepared. My current company (its in the FTSE) doesn't even have an IPS/DPS or EndPoint Security on their customer facing infrastructure (its AWS, .. doing security like its 1999!). If we got hit, we would never detect - though thankfully we are now changing that.
And the one that was properly prepared, was a SME company with about 200 staff... which ironically went backrupt (hmm perhaps I overspent?!)
A/C to protect the innocent.. and my job :D
MITM is the only decent way of doing this. Using agents is very cumbersome and in my experience unreliable, there always some users who will try to subvert it, then there is the issue of deployment, management and users who bring personal devices into the corporate network.
Just my 2 pence, feel free to disagree, and I'd be interested to hear of other people's experience on this front.
But working in a poisonous environment isn't good for any one, even a CEO.. one of my former CEO's, was a lovely guy, looked after the staff (he even took us Techies on a skiing holiday), but the poor guy ended up having a breakdown due to similar circumstances.
If its as described, the guy has got my sympathies.. have a beer and enjoy your new free time!
Also if you've ever worked at a tech company, you'll know that data is "gold".. They hoard it, slice it, dice it and monetise it!
From that data alone, they can generate a map of where you hang out, what shops you visit etc etc, then try to find a way of making money from it (via advertising, selling it etc).. even if they anonymise the data, it still has value to somebody.
Sure - Over the past couple years I've worked at 3 companies (all SME's ranging from 200 to 3000 employees) as an IT Manager, all of them swore they practised DevOps and were "investigating containers", none of them successfully delivered it..
I now work for a FTSE 250 company, who practise a loose DevOps (Formerly known as Dev and elements of Infrastructure working closely), they stuck with the traditional "lets just add a few more VM's when we need to scale", and it works f*cking brilliantly.
A little while ago, I was watching this documentary called Iron Sky's.. Highly recommend it if you want a proper history lesson and true understanding of the US Shadow Government.
Guess that means they were testing the version that runs on BullShi-te.. I have heard some dodgy and that its not very reliable!
Typical of that all those organisations, if the legal challenge is too big, then revert to granny scare tactics. I remember the same thing a few year ago about software - not excluding the fact that software was usually obtains from the developer, but just a hockey key was used!
Named, shamed and caned!
My partner recently had this, she presenting at an FDA led conference in the US. The presenters are required to submit slides and attend conference calls before hand, on the 2nd call she discovered one the other presenters had completely rewritten their presentation to mirror hers, basically stealing her idea and half her slides.
Wouldn't have been so bad, but the person is question had also wangled to present their slides before my partner (and hence getting the recognition).
There really are some despicable people in this world :(