Posted by:
admin
11 years, 9 months ago
The short version: read Gene Kim, Kevin Behr & George Spafford's The Phoenix Project because it is a book you can't put down about IT services! Can you imagine? That's really all you need to know.
The long version is that The Phoenix Project picks up where Eliyahu M. Goldratt's The Goal left off and brings it to the world of IT services. And how important is that now that IT services are so critical? The Goal is one those books that I have bought many times because I constantly give it away. I see that The Phoenix Project will be similar (though ebooks make this more difficult!).
While the key message of the book is applying the theory of constraints to IT workflow, I'm going to address two underlying messages that I think are key: sunk costs and keeping it simple.
Understanding sunk costs is incredibly important, especially in IT. In the book, the company is betting its survival on a massive software project. It has spent millions on it. However, those millions are a sunk cost. If it makes sense to start over from scratch, do it! Software is very interesting. In some instances, it makes a lot sense to keep a piece of software running despite the accrued technical debt (mostly for non-technical businesses or cash-cow situations). Just look at all the mainframe apps around. In other cases, you should plan on completely re-writing software well before obsolesce. In particular, if you are acquiring a software company you might want to plan on a total re-write in your cost analysis.
I think most devops proponents would argue that devops reduces cycle times so much that the project is being constantly rewritten. So, you avoid any technical debt.
The other sub-theme I like in The Phoenix Project is the use of simple, often paper-based solutions to big problems. The change management software is replaced by a kanban-esque system of index cards pasted all over a conference room. This setup allows the managers to immediately see where issues are cropping up. Tech geeks think that all they need is the latest greatest task manager app and boom, they are productive. I'm guilty of swapping out to-do list apps - it's a great way to clear out the detritus! In truth, starting simple is the best path.
The Phoenix Project is a great novel. I suspect that it will have two phases of sales. First, most IT people will read it. Then, IT people will give it their family members. No more "He does something with computers"!
Share on Twitter Share on FacebookRecent Posts
- Blast-RADIUS attack
- The latest WiKID version includes an SBOM
- WiKID 6 is released!
- Log4j CVE-2021-44228
- Questions about 2FA for AD admins
Archive
2024
2022
- December (1)
2021
2019
2018
2017
2016
2015
2014
- December (2)
- November (3)
- October (3)
- September (5)
- August (4)
- July (5)
- June (5)
- May (2)
- April (2)
- March (2)
- February (3)
- January (1)
2013
2012
- December (1)
- November (1)
- October (5)
- September (1)
- August (1)
- June (2)
- May (2)
- April (1)
- March (2)
- February (3)
- January (1)
2011
2010
- December (2)
- November (3)
- October (3)
- September (4)
- August (1)
- July (1)
- June (3)
- May (3)
- April (1)
- March (1)
- February (6)
- January (3)
2009
- December (4)
- November (1)
- October (3)
- September (3)
- August (2)
- July (5)
- June (6)
- May (8)
- April (7)
- March (6)
- February (4)
- January (427)
2008
- December (1)
Categories
- PCI-DSS (2)
- Two-factor authentication (3)
Tags
- wireless-cellular-mobile-devices (7)
- Two-factor authentication (10)
- Wireless, cellular, mobile devices (6)
- NPS (1)
- Phishing and Fraud (111)
- Active Directory (1)
- pam-radius (3)
- privileged access (2)
- Cloud Security (10)
- Mutual Authentication (60)
- Web Application Authentication (1)
- Authentication Attacks (99)
- pci (50)
- Security and Economics (97)
- WiKID (133)
- pam (2)
- VPN (1)
- Installation (2)
- RADIUS Server (1)
- Open Source (64)
- Tutorial (2)
- Strong Authentication (35)
- Information Security (137)
- Transaction Authentication (13)
- Miscellaneous (100)
- Linux (2)
- transaction-authentication (6)
- Two Factor Authentication (254)