Coming Soon: GET:IT Endpoint Management 1-Day Conference on September 28th at 9:30 AM ET Coming Soon: GET:IT Endpoint Management 1-Day Conference on September 28th at 9:30 AM ET

Free DevOps Tool for Calculating Development Waste


Some might hate me for saying it, but DevOps can sometimes be a bit of a politics game. When you’re working deep in the trenches, it can be difficult to convince upper management on where you should be spending your time in terms of new functionality and never-ending bug fixes.

Yesterday during a RSA 2016 session on rugged DevOps, I learned about a neat web utility from Joshua Corman (@joshcorman), CTO of Sonatype, a company that focuses on software supply chain management. He’s also a great person to follow if you’re looking to learn more about DevOps and security best practices.

This free online calculator helps calculate developmental waste in your projects. Corman described that today’s software development is similar to a supply chain, where software is built with several different components. Sonatype states that the challenge is “knowing which components you are using, where they are used and which ones have security vulnerabilities, license or quality issues.”

Sponsored Content

Say Goodbye to Traditional PC Lifecycle Management

Traditional IT tools, including Microsoft SCCM, Ghost Solution Suite, and KACE, often require considerable custom configurations by T3 technicians (an expensive and often elusive IT resource) to enable management of a hybrid onsite + remote workforce. In many cases, even with the best resources, organizations are finding that these on-premise tools simply cannot support remote endpoints consistently and reliably due to infrastructure limitations.

To better understand this, you can play around with the calculator to interpret how much technical debt you’re racking up for these security vulnerabilities. It’s common to hear management or clients that demand new functionality, while fixes are put on the backburner. But with this free tool, you at least have some numbers to put things into perspective and engage in a thoughtful discussion on what needs to change. I hope that this tool sparks some valuable discussion where quality, security, and agility can be improved for your products and services.

Stay tuned for more updates from RSA 2016. Feel free to let me know your thoughts about this tool in the article comments or reach out via Twitter (@blair_greenwood).






Related Topics:


Don't have a login but want to join the conversation? Sign up for a Petri Account

Comments (0)

Leave a Reply

Live Webinar: Active Directory Security: What Needs Immediate Priority!Live on Tuesday, October 12th at 1 PM ET

Attacks on Active Directory are at an all-time high. Companies that are not taking heed are being punished, both monetarily and with loss of production.

In this webinar, you will learn:

  • How to prioritize vulnerability management
  • What attackers are leveraging to breach organizations
  • Where Active Directory security needs immediate attention
  • Overall strategy to secure your environment and keep it secured

Sponsored by: