Information Technology Reference
In-Depth Information
Deming, W. (2000). Out of the Crisis , Massachusetts Institute of Technology, Center for
Advanced Engineering Study.
DevOps-Toolchain. (2010). A set of best practices useful to those practicing DevOps
methodology.
http://code.google.com/p/devops-toolchain/wiki/
BestPractices
Dickson, C. (2013). A working theory of monitoring, presented as part of the 27th Large
Installation System Administration Conference, USENIX, Berkeley, CA.
https://www.usenix.org/conference/lisa13/working-theory-
monitoring
Edwards, D. (2010). DevOps is not a technology problem.
http://dev2ops.org/2010/11/devops-is-not-a-technology-
problem-devopsis-a-business-problem
Edwards, D. (2012). Use DevOps to turn IT into a strategic weapon.
http://dev2ops.org/2012/09/use-devops-to-turn-it-into-a-
strategic-weapon
Edwards, D., & Shortland, A. (2012). Integrating DevOps tools into a service delivery
platform.
http://dev2ops.org/2012/07/integrating-devops-tools-into-
a-service-delivery-platform-video
England, R. (2009). Owning ITIL: A Skeptical Guide for Decision-Makers , Two Hills.
Fitts, P. (1951). Human engineering for an effective air navigation and traffic-control sys-
tem, Technical Report ATI-133954 , Ohio State Research Foundation.
http://www.skybrary.aero/bookshelf/books/355.pdf
Flack,M.,&Wiese,K.(1977). The Story about Ping ,PicturePuffinBooks,PuffinBooks.
Gallagher, S. (2012). Built to win: Deep inside Obama's campaign tech.
http://arstechnica.com/information-technology/2012/11/
built-to-win-deep-inside-obamas-campaign-tech
Ghemawat, S., Gobioff, H., & Leung, S.-T. (2003). The Google file system, Proceedings
of the Nineteenth ACM Symposium on Operating Systems Principles , SOSP '03, ACM,
New York, NY, pp. 29-43.
http://doi.acm.org/10.1145/945445.945450
Search WWH ::




Custom Search