Charles-Henri Lison

12%
Flag icon
Identify the system’s constraint. Decide how to exploit the system’s constraint. Subordinate everything else to the above decisions. Elevate the system’s constraint. If in the previous steps a constraint has been broken, go back to step one, but do not allow inertia to cause a system constraint.
The DevOps Handbook: How to Create World-Class Agility, Reliability, and Security in Technology Organizations
Rate this book
Clear rating