Automation between Development and Operations – the key to successful change

This week, I was talking to my colleague and friend, Steve Solomon, about Software Configuration Management and its importance to the enterprise and the importance of reducing complexity.

This week, I was talking to my colleague and friend, Steve Solomon, about Software Configuration Management and its importance to the enterprise and the importance of reducing complexity. Steve reminded me of when Jeffrey Hammond, a lead analyst at Forrester, asked leading companies in 2008 and 2009 how many Software Configuration Management products were in use at their companies. I don’t think anyone in application development would be surprised that the average is 1.8 tools per development shop. Especially if companies (like CA Technologies) have grown through acquisition, then the company is likely to have many more.  As Jeffery states in “Software Configuration Management Tool Adoption Trends in the Americas”  (Forrester June 2009) “Fifty-three percent of the app dev professionals surveyed work in an organization that uses more than one configuration management tool.”

With developers using different tools and resistant to standardization, then there is a compelling challenge for good Service Management. A process must be created to break down and automate the barriers between production Operations and Application Development. An innovative Release Management solution has been developed by several CA customers using CA Software Change Manager for Federated Application Release Management, while letting application development use the versioning product of their choice.  The solution is to take a copy of the application code when it is ready for release and managing the release management process with CA SCM.  By using this approach you can standardize and automate secured software builds and have a single integration for automated software deployments.  This solution can also be integrated with CA Service Desk for management of the end to end process.    

Interested?  This innovative approach will be demonstrated in the June 15 Webcast by CA and OpenMake Software.  You can sign up for the webcast at:

Written by

Robert Stroud

Robert Stroud is VP of innovation and strategy for IT Business Management at CA Technologies.…

Published in

View this topic
  • James Holland

    This is great. Hooray for Disney’s imagineers!


    become a new brand in the share market research with its accurate research. Proven
    itself always right whether market is bull or bear. Last week all paid clients
    booked handsome profit in NIFTY, BANKINIFTY & STOCKS. Now for the coming
    week we expect more correction can come in NIFTY as the IRAQ issue is getting
    more tense, If it happens more then you will see a sharp fall in all world marketNSE BSE, STOCK TIPSbecause as we know all world run on
    crude & most of the crude comes from IRAQ. So be ready for a sharp fall so
    sell will be the best strategy for next week also. Traders can make a sell
    position in NIFTY around 7600-7650 with stoploss 7750 for the target of
    7300-7200.One can also make a sell call NIFTY 50 stocks as per NIFTY levels. You
    can also take our two days free trial to check our accuracy. For further updates
    you can visit our website.



  • king lear

    testing comment functionality, please do not publish this

  • Rachel Macik

    Love the personal pic :)

    • CAHighlight

      Thank you!

  • Plutora Inc

    This is a good case study. 2.3 sec’s off a login transaction is big.

  • Michele Hudnall

    While the analysts were hyping DevOps, I posted the oversight of not including security as part of that discussion as you are highlighting here. Instead of just talking DevOps, it should be DOS (what’s old is new again :-) – DevOpsSec. As a previous AppDev person, it’s the app, who’s using it, why and where rather than the device and having the service available.

    As you rightly point, out Security should be baked into the solution.

    Nice Post and Timely!


    • CAHighlight

      Thank you for your feedback Michele. Agreed – security cannot be overlooked. Appreciate your input!

  • Mitesh

    I would love a printed copy

  • Lars Johansson

    I love the idea of BYOID! This makes me choose if I am almost anonymous (with my Hotmail Nicname) or official with identity from an official organisation. My Identity Provider will attach identity with right level of LoA according to the need of the Service provider.

    • CAHighlight

      Thank you for your comment. BYOID has tangible benefits for end users and relying parties but it also has to be weighed in the balance with potential risks and liability concerns. It will be interesting to see how BYOID plays out in the enterprise.