SlideShare a Scribd company logo
1 of 55
Download to read offline
Emergent Patterns for Kanban
         Systems in IT Operations

                          Dominica DeGrandis
                               @dominicad
                          dominica@djaa.com
Lean Systems & Software
Boston, MA    May 2012
Emergent Patterns for Kanban
        Systems in IT Operations

                        Dominica DeGrandis
                             @dominicad
                        dominica@djaa.com

www.djaa.com
kanbanops yahoo group
Kanban Roundup
 Things	
  that	
  Plague	
  IT	
  Ops	
  teams

   1.  How do we not get killed by
       dependencies?
   2.  How do we deal with Brent?
   3.  How can we get important
       work done with so many
       interruptions?
   	
  
Things	
  that	
  Plague	
  IT	
  Ops	
  teams	
  
 Next	
  (3)	
     Study	
  (1)	
      Validate	
  


Specialization     Dependencies



  Interrupts
Ge3ng	
  Visibility	
  on	
  Dependencies	
  
Issue	
  a4ached	
  to	
  
change	
  request	
  –	
  	
  
Electronic Board Dependency tags
Dependencies carry     some level
            of risk.	
  


     How much    Risk?
Levels of risk?
Outside of control:
              Team
              Department
              Company

3rd party vendor in a different time zone
Understanding the risk

  cost?
  history?
  criteria?
Example 1
A dependency on the data team down the
hall. They have changes that impact our CI
scripts. If we don’t get them by next week,
we’ll need a manual step in the build
process to upgrade the DB. 	
      	
   	
  
      	
   	
  	
  
    	
        	
     	
     	
     	
  	
  Strategy?
Courtesy David Lutz




Duplicate ticket from other
teams board placed on Ops
board.
Data	
  Team	
  Kanban	
  Board	
  
Input	
       Design	
   Data	
   Test	
   Deliver	
  




        work item tagged as
        impacting Ops team.
If	
  an	
  issue	
  comes	
  up,	
  the	
  card	
  
gets	
  moved	
  to	
  “blocked”	
  area	
  for	
  
extra	
  visibility.	
  
Electronic Board Dependency tags
Example 2
A dependency on the marketing
department located in a different city. They
want new images deployed to the website,
but image rights have not been cleared yet.
Marketing campaign is tied to next months
press release.
                         Strategy?
Waiting area for items with external dependencies


  5             4                      4             2

Input    Investigate                  Action        Test   Complete
Queue
        Doing       Done      Doing        Done




                                                  Dependency risk
                                                  placed in separate
                    Waiting for (3)               “Waiting For” area
                                                  for management to
                                                  deal with.
WaiHng	
  area	
  for	
  external	
  dependencies	
  
  5         4           3           4           2      2 = 20 total


          Analysis
Input                 Ready Implementation    Build          Release   ...
Queue In Prog Done          In Prog Done      Ready   Test    Ready




                              Waiting on
                               External
                                Group




                Dots denote clock
                 ticking on SLA            Late against SLA
Courtesy Ian Carroll




Blocked” area
for
transparency.
External	
  Blocker	
  Box	
  

                      medium-term blocked
                       Cards at the top are
                       higher priority that
                       cards at the
                       bottom.

                       long-term Blocked



                        Courtesy Ian Carroll
Design for Visibility on SLA status

         Time remaining to meet SLA
 Input                                  Done
            I I I I I I I I I I I I I
 Priority
Fixed	
  date	
  	
  
Example 3
The CFO promises the owner of the
company that we can deliver a regulatory
requirement by the end of the year and
avoid legal penalties.
The request is dependent on input from
Company C who has a terrible track
record.
                       Strategy?
Short term tactical plan:
Policy set for company C where
dependencies are pulled into the
ready queue after confirmation of
completion on their part.
Long term strategic fix:
Contracts modified with vendors
to contain sufficient remedies to
ensure SLAs are met.
Consensus
Dependencies	
  need	
  visibility	
  on	
  
            risk.	
  	
  

            Show the risk
Ways to Illustrate Risks for
      Dependencies

1.  Show cost associated with delay.
2.  Show projected delay (history/simulation).
3.  Display explicit policies for dependencies.
4.  Put risk info on work item
 Things	
  that	
  Plague	
  IT	
  Ops	
  teams

   1.  How do we not get killed by
       dependencies?
   2.  How do we deal with Brent?
   3.  How can we get important
       work done with so many
       interruptions?
   	
  
Things	
  that	
  Plague	
  IT	
  Ops	
  teams	
  
Next	
  (3)	
     Study	
  (1)	
      Validate	
  


 Interrupts        Specialization      Dependencies
Courtesy Ian Carroll
Pattern:

Individually
Named
Swim lanes
PaJern	
  or	
  anH-­‐paJern?

“… they are willing to take responsibility for

             the work
their own work, but not

of the whole team.”
PaJern	
  or	
  anH-­‐paJern?


“Upper management
wants visibility on individuals work.”
Kanban Design for Visibility on Specializations

                       Operations Board
                     Investigate Committed   Test   Delivered
   SysAdmin
    Jason

   Config/Automate
    Kris

   Network/Monitor
    Pat

   DBA
    Mark

   Security
    Joe



   Visibility on types of demand
Highly	
  specialized	
  workforces	
  are	
  

not	
  very	
  flexible,	
  but 	
  it	
  might	
  be	
  
the	
  workforce	
  that	
  enables	
  you	
  to	
  
win.	
  	
  	
  
Skill	
  Level	
  Rankings	
  Example	
  

Master

Journeyman

Practitioner

Novice

Newb
Skill	
  Level	
  Rankings	
  Example	
  
                          10 yrs exp or 10,000 hours of
                          practice, mentors others.
Master                    Knows when to break the rules.

Journeyman                6-9 yrs exp, can handle > 80%
                          of requests, trains others.

Practitioner              3-5 yrs exp, can handle > 50%
                          of requests.
Novice                    1-2 yrs exp, in training

Newb                      Newbie
Tools & skill level of team
Puppet
Apache
Ruby
MySQL
Oracle
Linux
 Things	
  that	
  Plague	
  IT	
  Ops	
  teams

   1.  How do we not get killed by
       dependencies?
   2.  How do we deal with Brent?
   3.  How can we get important
       work done with so many
       interruptions?
   	
  
Things	
  that	
  Plague	
  IT	
  Ops	
  teams	
  
Next	
  (3)	
     Study	
  (1)	
      Validate	
  


                     Interrupts        Dependencies




                                       Specialization
Making Interrupts visible

                 Operations
                 Investigate Implement Buyoff   Done

   Planned
      25%

   Unplanned
     75%
Pattern - The        Goalie


                Handles small interrupts
                    Rotates weekly
                Expands knowledge base
                 Gains flexibility in team
         	
  
Help Desk Board

Fire Lane

 Input      Implement   Test   Delivered

 Priority
1.
2.
3.
4.
5.
What is the threshold
    for creating a ticket?


Transaction cost vs. value
 PaJerns	
  for	
  Task	
  Size	
  Policies

Example:	
  	
  	
  	
  	
  	
  If	
  <	
  n	
  min,	
  just	
  do	
  it	
  
	
  

ExcepHons….	
  
         	
  1.	
  Dependency	
  
         	
  2.	
  Only	
  Brent	
  knows	
  how	
  to	
  do	
  it	
  
         	
  3.	
  Visibility	
  of	
  small	
  tasks	
  in	
  reporHng	
  
         	
  	
  
Showing impact of Interrupts

   Interrupts
                Investigate Doing   Buy off   Done

   Small
      6
   Medium
       3

   Large
      2


S = 1 day, M = 2-3 days, L= 1+week (LT)
Caution!


Consider the context
It’s likely different.

Using another design for your situation
can be dangerous.
	
  
Things	
  that	
  Plague	
  IT	
  Ops	
  teams	
  
Next	
  (3)	
     Study	
  (1)	
      Validate	
  

 What’s the
                                       Dependencies
  point?



                                       Specialization



                                         Interrupts
Things	
  that	
  Plague	
  IT	
  Ops	
  teams	
  
Next	
  (3)	
     Study	
  (1)	
      Validate	
  
                                       Dependencies

 Questions?          What’s the
                      point?
                                       Specialization



                                         Interrupts
What’s the Point?
1. Show the risk
 Improving recognition of risks in IT is powerful!
What’s the Point?
1. Show the risk
 Improving recognition of risks in IT is powerful!

2. Show the types of work
  Understanding demand helps to meet it.
What’s the Point?
1. Show the risk!
  Improving recognition of risks in IT is powerful.

2. Show the types of work
  Studying/understanding demand helps to meet it.

3. Track interrupts for visibility
   Making invisible work visible reduces unknowns.
Things	
  that	
  Plague	
  IT	
  Ops	
  teams	
  
Next	
  (3)	
     Study	
  (1)	
      Validate	
  
                                       Dependencies

                    Questions?

                                       Specialization



                                         Interrupts


                                        What’s the
                                         point?
Emergent Patterns for Kanban Systems
in IT Operations
                           Delivered	
  

   Dominica DeGrandis      Dependencies

          @dominicad         Specialization
    dominica@djaa.com
                             Interrupts

                                What’s the
                                 point?

                            Questions?

More Related Content

What's hot

Outages, PostMortems, and Human Error
Outages, PostMortems, and Human ErrorOutages, PostMortems, and Human Error
Outages, PostMortems, and Human ErrorJohn Allspaw
 
eircom Managed Security
eircom Managed Securityeircom Managed Security
eircom Managed Securityeircom
 
Evaluating thin client_security
Evaluating thin client_securityEvaluating thin client_security
Evaluating thin client_securityNick Turunov
 
Part II - Why-asset-management-system-software-implementations-fail
Part II - Why-asset-management-system-software-implementations-failPart II - Why-asset-management-system-software-implementations-fail
Part II - Why-asset-management-system-software-implementations-failTranscendent
 
Uptime Magazine - Failure Reporting Article
Uptime Magazine - Failure Reporting ArticleUptime Magazine - Failure Reporting Article
Uptime Magazine - Failure Reporting ArticleRicky Smith CMRP, CMRT
 
Not my bug! Reasons for software bug report reassignments
Not my bug! Reasons for software bug report reassignmentsNot my bug! Reasons for software bug report reassignments
Not my bug! Reasons for software bug report reassignmentsThomas Zimmermann
 
Virtualize More While Improving Your Cybersecurity Risk Posture - The "4 Must...
Virtualize More While Improving Your Cybersecurity Risk Posture - The "4 Must...Virtualize More While Improving Your Cybersecurity Risk Posture - The "4 Must...
Virtualize More While Improving Your Cybersecurity Risk Posture - The "4 Must...HyTrust
 
More effective and more flexible security to lower your total cost of ownersh...
More effective and more flexible security to lower your total cost of ownersh...More effective and more flexible security to lower your total cost of ownersh...
More effective and more flexible security to lower your total cost of ownersh...InSync Conference
 
CS5032 L11 validation and reliability testing 2013
CS5032 L11 validation and reliability testing 2013CS5032 L11 validation and reliability testing 2013
CS5032 L11 validation and reliability testing 2013Ian Sommerville
 

What's hot (11)

Outages, PostMortems, and Human Error
Outages, PostMortems, and Human ErrorOutages, PostMortems, and Human Error
Outages, PostMortems, and Human Error
 
eircom Managed Security
eircom Managed Securityeircom Managed Security
eircom Managed Security
 
Evaluating thin client_security
Evaluating thin client_securityEvaluating thin client_security
Evaluating thin client_security
 
Part II - Why-asset-management-system-software-implementations-fail
Part II - Why-asset-management-system-software-implementations-failPart II - Why-asset-management-system-software-implementations-fail
Part II - Why-asset-management-system-software-implementations-fail
 
Uptime Magazine - Failure Reporting Article
Uptime Magazine - Failure Reporting ArticleUptime Magazine - Failure Reporting Article
Uptime Magazine - Failure Reporting Article
 
Not my bug! Reasons for software bug report reassignments
Not my bug! Reasons for software bug report reassignmentsNot my bug! Reasons for software bug report reassignments
Not my bug! Reasons for software bug report reassignments
 
Introdution to POF reliability methods
Introdution to POF reliability methodsIntrodution to POF reliability methods
Introdution to POF reliability methods
 
Virtualize More While Improving Your Cybersecurity Risk Posture - The "4 Must...
Virtualize More While Improving Your Cybersecurity Risk Posture - The "4 Must...Virtualize More While Improving Your Cybersecurity Risk Posture - The "4 Must...
Virtualize More While Improving Your Cybersecurity Risk Posture - The "4 Must...
 
More effective and more flexible security to lower your total cost of ownersh...
More effective and more flexible security to lower your total cost of ownersh...More effective and more flexible security to lower your total cost of ownersh...
More effective and more flexible security to lower your total cost of ownersh...
 
CS5032 L11 validation and reliability testing 2013
CS5032 L11 validation and reliability testing 2013CS5032 L11 validation and reliability testing 2013
CS5032 L11 validation and reliability testing 2013
 
Scrum Hates Technical Debt
Scrum Hates Technical DebtScrum Hates Technical Debt
Scrum Hates Technical Debt
 

Similar to Lssc12.emergent.patterns.in.it

Lkce12.emergent patternsit ops
Lkce12.emergent patternsit opsLkce12.emergent patternsit ops
Lkce12.emergent patternsit opsDominica DeGrandis
 
Structured Software Design
Structured Software DesignStructured Software Design
Structured Software DesignGiorgio Zoppi
 
Incident Management in the Age of DevOps and SRE
Incident Management in the Age of DevOps and SRE Incident Management in the Age of DevOps and SRE
Incident Management in the Age of DevOps and SRE Rundeck
 
Ground rules
Ground rulesGround rules
Ground rulesLior Sion
 
What to Expect When You're Expecting (to Own Production)
What to Expect When You're Expecting (to Own Production)What to Expect When You're Expecting (to Own Production)
What to Expect When You're Expecting (to Own Production)Michael Diamant
 
PuppetConf2012GeneKim
PuppetConf2012GeneKimPuppetConf2012GeneKim
PuppetConf2012GeneKimGene Kim
 
SRE Topics with Charity Majors and Liz Fong-Jones of Honeycomb
SRE Topics with Charity Majors and Liz Fong-Jones of HoneycombSRE Topics with Charity Majors and Liz Fong-Jones of Honeycomb
SRE Topics with Charity Majors and Liz Fong-Jones of HoneycombDaniel Zivkovic
 
451 and Endgame - Zero breach Tolerance: Earliest protection across the attac...
451 and Endgame - Zero breach Tolerance: Earliest protection across the attac...451 and Endgame - Zero breach Tolerance: Earliest protection across the attac...
451 and Endgame - Zero breach Tolerance: Earliest protection across the attac...Adrian Sanabria
 
Professional Hacking in 2011
Professional Hacking in 2011Professional Hacking in 2011
Professional Hacking in 2011securityaegis
 
Purple Teaming - The Collaborative Future of Penetration Testing
Purple Teaming - The Collaborative Future of Penetration TestingPurple Teaming - The Collaborative Future of Penetration Testing
Purple Teaming - The Collaborative Future of Penetration TestingFRSecure
 
Chaos Engineering Without Observability ... Is Just Chaos
Chaos Engineering Without Observability ... Is Just ChaosChaos Engineering Without Observability ... Is Just Chaos
Chaos Engineering Without Observability ... Is Just ChaosCharity Majors
 
Dev and Ops Collaboration and Awareness at Etsy and Flickr
Dev and Ops Collaboration and Awareness at Etsy and FlickrDev and Ops Collaboration and Awareness at Etsy and Flickr
Dev and Ops Collaboration and Awareness at Etsy and FlickrJohn Allspaw
 
How to not fail at security data analytics (by CxOSidekick)
How to not fail at security data analytics (by CxOSidekick)How to not fail at security data analytics (by CxOSidekick)
How to not fail at security data analytics (by CxOSidekick)Dinis Cruz
 
Real-time Search at Yammer - By Aleksandrovsky Boris
Real-time Search at Yammer - By Aleksandrovsky BorisReal-time Search at Yammer - By Aleksandrovsky Boris
Real-time Search at Yammer - By Aleksandrovsky Borislucenerevolution
 
Incident Management in the Age of DevOps and SRE
Incident Management in the Age of DevOps and SRE Incident Management in the Age of DevOps and SRE
Incident Management in the Age of DevOps and SRE Rundeck
 
Stop that Release, There's a Vulnerability!
Stop that Release, There's a Vulnerability!Stop that Release, There's a Vulnerability!
Stop that Release, There's a Vulnerability!Priyanka Aash
 
NH Bankers 10 08 07 Kamens
NH Bankers 10 08 07 KamensNH Bankers 10 08 07 Kamens
NH Bankers 10 08 07 Kamenskamensm02
 
From Duke of DevOps to Queen of Chaos - Api days 2018
From Duke of DevOps to Queen of Chaos - Api days 2018From Duke of DevOps to Queen of Chaos - Api days 2018
From Duke of DevOps to Queen of Chaos - Api days 2018Christophe Rochefolle
 

Similar to Lssc12.emergent.patterns.in.it (20)

Lkce12.emergent patternsit ops
Lkce12.emergent patternsit opsLkce12.emergent patternsit ops
Lkce12.emergent patternsit ops
 
Structured Software Design
Structured Software DesignStructured Software Design
Structured Software Design
 
Incident Management in the Age of DevOps and SRE
Incident Management in the Age of DevOps and SRE Incident Management in the Age of DevOps and SRE
Incident Management in the Age of DevOps and SRE
 
Ground rules
Ground rulesGround rules
Ground rules
 
What to Expect When You're Expecting (to Own Production)
What to Expect When You're Expecting (to Own Production)What to Expect When You're Expecting (to Own Production)
What to Expect When You're Expecting (to Own Production)
 
PuppetConf2012GeneKim
PuppetConf2012GeneKimPuppetConf2012GeneKim
PuppetConf2012GeneKim
 
SRE Topics with Charity Majors and Liz Fong-Jones of Honeycomb
SRE Topics with Charity Majors and Liz Fong-Jones of HoneycombSRE Topics with Charity Majors and Liz Fong-Jones of Honeycomb
SRE Topics with Charity Majors and Liz Fong-Jones of Honeycomb
 
451 and Endgame - Zero breach Tolerance: Earliest protection across the attac...
451 and Endgame - Zero breach Tolerance: Earliest protection across the attac...451 and Endgame - Zero breach Tolerance: Earliest protection across the attac...
451 and Endgame - Zero breach Tolerance: Earliest protection across the attac...
 
Professional Hacking in 2011
Professional Hacking in 2011Professional Hacking in 2011
Professional Hacking in 2011
 
Purple Teaming - The Collaborative Future of Penetration Testing
Purple Teaming - The Collaborative Future of Penetration TestingPurple Teaming - The Collaborative Future of Penetration Testing
Purple Teaming - The Collaborative Future of Penetration Testing
 
Chaos Engineering Without Observability ... Is Just Chaos
Chaos Engineering Without Observability ... Is Just ChaosChaos Engineering Without Observability ... Is Just Chaos
Chaos Engineering Without Observability ... Is Just Chaos
 
Dev and Ops Collaboration and Awareness at Etsy and Flickr
Dev and Ops Collaboration and Awareness at Etsy and FlickrDev and Ops Collaboration and Awareness at Etsy and Flickr
Dev and Ops Collaboration and Awareness at Etsy and Flickr
 
How to not fail at security data analytics (by CxOSidekick)
How to not fail at security data analytics (by CxOSidekick)How to not fail at security data analytics (by CxOSidekick)
How to not fail at security data analytics (by CxOSidekick)
 
Realtime search at Yammer
Realtime search at YammerRealtime search at Yammer
Realtime search at Yammer
 
Real Time Search at Yammer
Real Time Search at YammerReal Time Search at Yammer
Real Time Search at Yammer
 
Real-time Search at Yammer - By Aleksandrovsky Boris
Real-time Search at Yammer - By Aleksandrovsky BorisReal-time Search at Yammer - By Aleksandrovsky Boris
Real-time Search at Yammer - By Aleksandrovsky Boris
 
Incident Management in the Age of DevOps and SRE
Incident Management in the Age of DevOps and SRE Incident Management in the Age of DevOps and SRE
Incident Management in the Age of DevOps and SRE
 
Stop that Release, There's a Vulnerability!
Stop that Release, There's a Vulnerability!Stop that Release, There's a Vulnerability!
Stop that Release, There's a Vulnerability!
 
NH Bankers 10 08 07 Kamens
NH Bankers 10 08 07 KamensNH Bankers 10 08 07 Kamens
NH Bankers 10 08 07 Kamens
 
From Duke of DevOps to Queen of Chaos - Api days 2018
From Duke of DevOps to Queen of Chaos - Api days 2018From Duke of DevOps to Queen of Chaos - Api days 2018
From Duke of DevOps to Queen of Chaos - Api days 2018
 

More from Dominica DeGrandis

The Balanced Calendar: How to optimize your time (DOES17 SFO)
The Balanced Calendar: How to optimize your time (DOES17 SFO)The Balanced Calendar: How to optimize your time (DOES17 SFO)
The Balanced Calendar: How to optimize your time (DOES17 SFO)Dominica DeGrandis
 
Time Theft - How Hidden & Unplanned Work Commit the Perfect Crime
Time Theft - How Hidden & Unplanned Work Commit the Perfect CrimeTime Theft - How Hidden & Unplanned Work Commit the Perfect Crime
Time Theft - How Hidden & Unplanned Work Commit the Perfect CrimeDominica DeGrandis
 
Make Work Visible - Unmask Capacity Killing WIP
Make Work Visible - Unmask Capacity Killing WIPMake Work Visible - Unmask Capacity Killing WIP
Make Work Visible - Unmask Capacity Killing WIPDominica DeGrandis
 
Time Theft - How Hidden & Unplanned Work Commit the Perfect Crime.
Time Theft - How Hidden & Unplanned Work Commit the Perfect Crime.Time Theft - How Hidden & Unplanned Work Commit the Perfect Crime.
Time Theft - How Hidden & Unplanned Work Commit the Perfect Crime.Dominica DeGrandis
 
Getting Business Exec Buy-in for Architecture Change
Getting Business Exec Buy-in for Architecture ChangeGetting Business Exec Buy-in for Architecture Change
Getting Business Exec Buy-in for Architecture ChangeDominica DeGrandis
 
The Misaligned Middle - Getting on board with Change
The Misaligned Middle - Getting on board with ChangeThe Misaligned Middle - Getting on board with Change
The Misaligned Middle - Getting on board with ChangeDominica DeGrandis
 
Aligning Business and Technology Teams
Aligning Business and Technology TeamsAligning Business and Technology Teams
Aligning Business and Technology TeamsDominica DeGrandis
 
From Divided to United - Aligning Technical and Business Teams
From Divided to United - Aligning Technical and Business TeamsFrom Divided to United - Aligning Technical and Business Teams
From Divided to United - Aligning Technical and Business TeamsDominica DeGrandis
 
Why don'we just say "No" - Devopsdays Silicon Valley Jun 2014
Why don'we just say "No" -  Devopsdays Silicon Valley Jun 2014Why don'we just say "No" -  Devopsdays Silicon Valley Jun 2014
Why don'we just say "No" - Devopsdays Silicon Valley Jun 2014Dominica DeGrandis
 
Kanban Patterns for Dependencies
Kanban Patterns for DependenciesKanban Patterns for Dependencies
Kanban Patterns for DependenciesDominica DeGrandis
 
Devopsdays Mountain View 2012 Ignite on Letting Go
Devopsdays Mountain View 2012 Ignite on Letting GoDevopsdays Mountain View 2012 Ignite on Letting Go
Devopsdays Mountain View 2012 Ignite on Letting GoDominica DeGrandis
 

More from Dominica DeGrandis (17)

The Balanced Calendar: How to optimize your time (DOES17 SFO)
The Balanced Calendar: How to optimize your time (DOES17 SFO)The Balanced Calendar: How to optimize your time (DOES17 SFO)
The Balanced Calendar: How to optimize your time (DOES17 SFO)
 
Time Theft - How Hidden & Unplanned Work Commit the Perfect Crime
Time Theft - How Hidden & Unplanned Work Commit the Perfect CrimeTime Theft - How Hidden & Unplanned Work Commit the Perfect Crime
Time Theft - How Hidden & Unplanned Work Commit the Perfect Crime
 
Make Work Visible - Unmask Capacity Killing WIP
Make Work Visible - Unmask Capacity Killing WIPMake Work Visible - Unmask Capacity Killing WIP
Make Work Visible - Unmask Capacity Killing WIP
 
The Art of Lean Performance
The Art of Lean PerformanceThe Art of Lean Performance
The Art of Lean Performance
 
LeanAgileUS.feb27.2017
LeanAgileUS.feb27.2017LeanAgileUS.feb27.2017
LeanAgileUS.feb27.2017
 
Time Theft - How Hidden & Unplanned Work Commit the Perfect Crime.
Time Theft - How Hidden & Unplanned Work Commit the Perfect Crime.Time Theft - How Hidden & Unplanned Work Commit the Perfect Crime.
Time Theft - How Hidden & Unplanned Work Commit the Perfect Crime.
 
Getting Business Exec Buy-in for Architecture Change
Getting Business Exec Buy-in for Architecture ChangeGetting Business Exec Buy-in for Architecture Change
Getting Business Exec Buy-in for Architecture Change
 
The Misaligned Middle - Getting on board with Change
The Misaligned Middle - Getting on board with ChangeThe Misaligned Middle - Getting on board with Change
The Misaligned Middle - Getting on board with Change
 
Aligning Business and Technology Teams
Aligning Business and Technology TeamsAligning Business and Technology Teams
Aligning Business and Technology Teams
 
From Divided to United - Aligning Technical and Business Teams
From Divided to United - Aligning Technical and Business TeamsFrom Divided to United - Aligning Technical and Business Teams
From Divided to United - Aligning Technical and Business Teams
 
The Shape of Uncertainty
The Shape of UncertaintyThe Shape of Uncertainty
The Shape of Uncertainty
 
DevOpsdays Austin 2015
DevOpsdays Austin 2015DevOpsdays Austin 2015
DevOpsdays Austin 2015
 
LeanUX2015.KanbanforDevops
LeanUX2015.KanbanforDevopsLeanUX2015.KanbanforDevops
LeanUX2015.KanbanforDevops
 
Why don'we just say "No" - Devopsdays Silicon Valley Jun 2014
Why don'we just say "No" -  Devopsdays Silicon Valley Jun 2014Why don'we just say "No" -  Devopsdays Silicon Valley Jun 2014
Why don'we just say "No" - Devopsdays Silicon Valley Jun 2014
 
Devopsdays.austin.2013
Devopsdays.austin.2013Devopsdays.austin.2013
Devopsdays.austin.2013
 
Kanban Patterns for Dependencies
Kanban Patterns for DependenciesKanban Patterns for Dependencies
Kanban Patterns for Dependencies
 
Devopsdays Mountain View 2012 Ignite on Letting Go
Devopsdays Mountain View 2012 Ignite on Letting GoDevopsdays Mountain View 2012 Ignite on Letting Go
Devopsdays Mountain View 2012 Ignite on Letting Go
 

Recently uploaded

How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 

Recently uploaded (20)

How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 

Lssc12.emergent.patterns.in.it

  • 1. Emergent Patterns for Kanban Systems in IT Operations Dominica DeGrandis @dominicad dominica@djaa.com Lean Systems & Software Boston, MA May 2012
  • 2. Emergent Patterns for Kanban Systems in IT Operations Dominica DeGrandis @dominicad dominica@djaa.com www.djaa.com kanbanops yahoo group Kanban Roundup
  • 3.  Things  that  Plague  IT  Ops  teams 1.  How do we not get killed by dependencies? 2.  How do we deal with Brent? 3.  How can we get important work done with so many interruptions?  
  • 4. Things  that  Plague  IT  Ops  teams   Next  (3)   Study  (1)   Validate   Specialization Dependencies Interrupts
  • 5. Ge3ng  Visibility  on  Dependencies  
  • 6. Issue  a4ached  to   change  request  –    
  • 8. Dependencies carry some level of risk.   How much Risk?
  • 9. Levels of risk? Outside of control: Team Department Company 3rd party vendor in a different time zone
  • 10. Understanding the risk cost? history? criteria?
  • 11. Example 1 A dependency on the data team down the hall. They have changes that impact our CI scripts. If we don’t get them by next week, we’ll need a manual step in the build process to upgrade the DB.                        Strategy?
  • 12. Courtesy David Lutz Duplicate ticket from other teams board placed on Ops board.
  • 13. Data  Team  Kanban  Board   Input   Design   Data   Test   Deliver   work item tagged as impacting Ops team.
  • 14. If  an  issue  comes  up,  the  card   gets  moved  to  “blocked”  area  for   extra  visibility.  
  • 16. Example 2 A dependency on the marketing department located in a different city. They want new images deployed to the website, but image rights have not been cleared yet. Marketing campaign is tied to next months press release. Strategy?
  • 17. Waiting area for items with external dependencies 5 4 4 2 Input Investigate Action Test Complete Queue Doing Done Doing Done Dependency risk placed in separate Waiting for (3) “Waiting For” area for management to deal with.
  • 18. WaiHng  area  for  external  dependencies   5 4 3 4 2 2 = 20 total Analysis Input Ready Implementation Build Release ... Queue In Prog Done In Prog Done Ready Test Ready Waiting on External Group Dots denote clock ticking on SLA Late against SLA
  • 19. Courtesy Ian Carroll Blocked” area for transparency.
  • 20. External  Blocker  Box   medium-term blocked Cards at the top are higher priority that cards at the bottom. long-term Blocked Courtesy Ian Carroll
  • 21. Design for Visibility on SLA status Time remaining to meet SLA Input Done I I I I I I I I I I I I I Priority
  • 23. Example 3 The CFO promises the owner of the company that we can deliver a regulatory requirement by the end of the year and avoid legal penalties. The request is dependent on input from Company C who has a terrible track record. Strategy?
  • 24. Short term tactical plan: Policy set for company C where dependencies are pulled into the ready queue after confirmation of completion on their part.
  • 25. Long term strategic fix: Contracts modified with vendors to contain sufficient remedies to ensure SLAs are met.
  • 26. Consensus Dependencies  need  visibility  on   risk.     Show the risk
  • 27. Ways to Illustrate Risks for Dependencies 1.  Show cost associated with delay. 2.  Show projected delay (history/simulation). 3.  Display explicit policies for dependencies. 4.  Put risk info on work item
  • 28.  Things  that  Plague  IT  Ops  teams 1.  How do we not get killed by dependencies? 2.  How do we deal with Brent? 3.  How can we get important work done with so many interruptions?  
  • 29. Things  that  Plague  IT  Ops  teams   Next  (3)   Study  (1)   Validate   Interrupts Specialization Dependencies
  • 30.
  • 33. PaJern  or  anH-­‐paJern? “… they are willing to take responsibility for the work their own work, but not of the whole team.”
  • 34. PaJern  or  anH-­‐paJern? “Upper management wants visibility on individuals work.”
  • 35. Kanban Design for Visibility on Specializations Operations Board Investigate Committed Test Delivered SysAdmin Jason Config/Automate Kris Network/Monitor Pat DBA Mark Security Joe Visibility on types of demand
  • 36. Highly  specialized  workforces  are   not  very  flexible,  but  it  might  be   the  workforce  that  enables  you  to   win.      
  • 37. Skill  Level  Rankings  Example   Master Journeyman Practitioner Novice Newb
  • 38. Skill  Level  Rankings  Example   10 yrs exp or 10,000 hours of practice, mentors others. Master Knows when to break the rules. Journeyman 6-9 yrs exp, can handle > 80% of requests, trains others. Practitioner 3-5 yrs exp, can handle > 50% of requests. Novice 1-2 yrs exp, in training Newb Newbie
  • 39. Tools & skill level of team Puppet Apache Ruby MySQL Oracle Linux
  • 40.  Things  that  Plague  IT  Ops  teams 1.  How do we not get killed by dependencies? 2.  How do we deal with Brent? 3.  How can we get important work done with so many interruptions?  
  • 41. Things  that  Plague  IT  Ops  teams   Next  (3)   Study  (1)   Validate   Interrupts Dependencies Specialization
  • 42. Making Interrupts visible Operations Investigate Implement Buyoff Done Planned 25% Unplanned 75%
  • 43. Pattern - The Goalie Handles small interrupts Rotates weekly Expands knowledge base Gains flexibility in team  
  • 44. Help Desk Board Fire Lane Input Implement Test Delivered Priority 1. 2. 3. 4. 5.
  • 45. What is the threshold for creating a ticket? Transaction cost vs. value
  • 46.  PaJerns  for  Task  Size  Policies Example:            If  <  n  min,  just  do  it     ExcepHons….    1.  Dependency    2.  Only  Brent  knows  how  to  do  it    3.  Visibility  of  small  tasks  in  reporHng      
  • 47. Showing impact of Interrupts Interrupts Investigate Doing Buy off Done Small 6 Medium 3 Large 2 S = 1 day, M = 2-3 days, L= 1+week (LT)
  • 48. Caution! Consider the context It’s likely different. Using another design for your situation can be dangerous.  
  • 49. Things  that  Plague  IT  Ops  teams   Next  (3)   Study  (1)   Validate   What’s the Dependencies point? Specialization Interrupts
  • 50. Things  that  Plague  IT  Ops  teams   Next  (3)   Study  (1)   Validate   Dependencies Questions? What’s the point? Specialization Interrupts
  • 51. What’s the Point? 1. Show the risk Improving recognition of risks in IT is powerful!
  • 52. What’s the Point? 1. Show the risk Improving recognition of risks in IT is powerful! 2. Show the types of work Understanding demand helps to meet it.
  • 53. What’s the Point? 1. Show the risk! Improving recognition of risks in IT is powerful. 2. Show the types of work Studying/understanding demand helps to meet it. 3. Track interrupts for visibility Making invisible work visible reduces unknowns.
  • 54. Things  that  Plague  IT  Ops  teams   Next  (3)   Study  (1)   Validate   Dependencies Questions? Specialization Interrupts What’s the point?
  • 55. Emergent Patterns for Kanban Systems in IT Operations Delivered   Dominica DeGrandis Dependencies @dominicad Specialization dominica@djaa.com Interrupts What’s the point? Questions?