Search icon CANCEL
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Continuous Testing, Quality, Security, and Feedback

You're reading from   Continuous Testing, Quality, Security, and Feedback Essential strategies and secure practices for DevOps, DevSecOps, and SRE transformations

Arrow left icon
Product type Paperback
Published in Sep 2024
Publisher Packt
ISBN-13 9781835462249
Length 350 pages
Edition 1st Edition
Languages
Concepts
Arrow right icon
Author (1):
Arrow left icon
Marc Hornbeek Marc Hornbeek
Author Profile Icon Marc Hornbeek
Marc Hornbeek
Arrow right icon
View More author details
Toc

Table of Contents (22) Chapters Close

Preface 1. Part 1: Understanding Continuous Testing, Quality, Security, and Feedback FREE CHAPTER
2. Chapter 1: Principles of Continuous Testing, Quality, Security, and Feedback 3. Chapter 2: The Importance of Continuous Testing, Quality, Security, and Feedback 4. Chapter 3: Experiences and Pitfalls with Continuous Testing, Quality, Security, and Feedback 5. Part 2: Determining Solutions Priorities
6. Chapter 4: Engineering Approach to Continuous Testing, Quality, Security, and Feedback 7. Chapter 5: Determining Transformation Goals 8. Chapter 6: Discovery and Benchmarking 9. Chapter 7: Selecting Tool Platforms and Tools 10. Chapter 8: Applying AL/ML to Continuous Testing, Quality, Security, and Feedback 11. Part 3: Deep Dive into Roadmaps, Implementation Patterns, and Measurements
12. Chapter 9: Use Cases for Integrating with DevOps, DevSecOps, and SRE 13. Chapter 10: Building Roadmaps for Implementation 14. Chapter 11: Understanding Transformation Implementation Patterns 15. Chapter 12: Measuring Progress and Outcomes 16. Part 4: Exploring Future Trends and Continuous Learning
17. Chapter 13: Emerging Trends 18. Chapter 14: Exploring Continuous Learning and Improvement 19. Glossary and References 20. Index 21. Other Books You May Enjoy

Determining model applications

It is critical to choose the model application carefully. This section describes the methodology that I use to help organizations choose an application.

Figure 5.5 depicts a detailed application transformation scorecard. The list that follows shows how the scorecard can be used to select a model application for transformations with the given criteria:

Figure 5.5 – Model application transformation scorecard

Figure 5.5 – Model application transformation scorecard

Some applications can benefit from DevOps more readily than others. An average rating score of 3 or more is preferred.

  1. Define evaluation criteria: The scorecard includes specific criteria for evaluating each application’s suitability for a DevOps or DevSecOps transformation.
  2. Assign weightings: Assign weightings to each criterion based on its importance to achieving the organization’s DevOps transformation objectives. This could vary depending on the organization’s specific goals...
lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at €18.99/month. Cancel anytime