Skip to main content
USENIX
  • Conferences
  • Students
Sign in
  • Home
  • Attend
    • Registration
    • Discounts
    • Venue, Hotel, and Travel
    • Why Attend?
    • Students and Grants
  • Program
    • Program at a Glance
    • Conference Program
    • Training Program
      • Training Program - Details
    • Workshops
    • Conference Topics
      • Systems and Network Engineering
      • Monitoring and Metrics
      • SRE and Software Engineering
      • Culture
    • UCMS '15
    • URES '15
    • Puppet Camp DC
  • Activities
    • Birds-of-a-Feather
    • LISA Build
    • LISA Lab
  • Sponsors and Expo
    • LISA15 Expo
    • Sponsor and Exhibitor List
    • Exhibitor Services
  • Participate
    • Call for Participation
    • Call for Research Papers and Posters
      • Submitting Papers and Posters
    • Speaker Resources
  • About
    • Conference Organizers
    • Help Promote
    • Services
    • Code of Conduct
    • Past Conferences

connect with us


  •  Twitter
  •  Facebook
  •  LinkedIn
  •  Google+
  •  YouTube

Why Attend LISA?

"In a world where technology changes rapidly, it's hard to find great resources for in-depth expertise. LISA has a terrific combination of people who create the technology and people who implement it effectively for their companies."

Matt Simmons, Northeastern University

"I like seeing where the industry is heading, how SysAdmins/engineers are evolving, tools they are using, common problems and solutions across the world."

LISA14 Attendee

"If you're a sysadmin slaving away in a metaphorical basement and re-inventing the wheel every time your employer's business goals change slightly, LISA will help pull you into the light."

Marc Chiarini, Long-Time IT Admin and Researcher, MarkLogic Corp

"LISA is the home of ops people who do ops correctly. I’m always motivated by the conference content and hallway conversations to be better, and I take home the knowledge needed to move closer to that goal. "

Tony Del Porto, Cisco Systems, Inc.

"LISA is the best mix of training, talks, and networking of any events I've been to. That's the reason I've been to 11 of them.”

LISA14 Attendee

"This was my first LISA. It was great attending a conference that focused on my role without trying to shoehorn every challenge into a specific vendor's solution. The same mix of awesome sessions, speakers, and other attendees will bring me back every year."

LISA14 Attendee

"No matter if you are dealing with the latest tech or trying to maintain something from the dark ages of the ‘90s, there are people at LISA who are experienced with it. Heck, many of the people who _developed_ this tech attend. This is a great place to get answers and ideas."

Lee Damon, University of Washington

"Great sessions, great presenters, great community. I feel like I can make up a year of following news and forums on the subject in a week."

LISA14 Attendee

help promote

LISA16 CFP button

Get more
Help Promote graphics!

sponsors

Gold Sponsor
Gold Sponsor
Gold Sponsor
Gold Sponsor
Silver Sponsor
Silver Sponsor
Silver Sponsor
Silver Sponsor
Bronze Sponsor
Bronze Sponsor
Bronze Sponsor
Bronze Sponsor
Bronze Sponsor
General Sponsor
General Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Industry Partner
Industry Partner
Industry Partner
Industry Partner
Industry Partner
Industry Partner

usenix conference policies

  • Event Code of Conduct
  • Conference Network Policy
  • Statement on Environmental Responsibility Policy

twitter

Tweets by @LISAConference

You are here

Home » Continuous Acceleration: Why Continuous Everything Needs a Supply Chain Approach
Tweet

connect with us

Continuous Acceleration: Why Continuous Everything Needs a Supply Chain Approach

Invited Talk
Wednesday, November 11, 2015 - 4:00pm-4:45pm

Joshua Corman, CTO, Sonatype

Abstract: 

With continuous development, we write less code and consume more re-usable open source code. Innovation is accelerated and so is application complexity. Complexity is the enemy of quality. Poor quality creates unplanned/unscheduled work. Re-work creates a drag on development speed. It’s a continuous loop. While Agile and DevOps have made us faster and more efficient, they can only take us so far... and worse, the year of OpenSource attacks we've just had commands better practices.

What if we could deliver applications on-time (even faster), on-budget (even more efficiently) and with a natural byproduct of more acceptable quality and risk?

The good news: other industries have figured this out with supply chain management. Applying supply chain approaches to software raises the bar on continuous goals.

A few of the patterns we can take from the rigor of things like the Toyota Supply Chain:

  • Scrutinize the number and quality of your “suppliers”
  • Manage out avoidable risk, complexity, and code bloat
  • Improve traceability and visibility
  • Ensure prompt agile responses when things go wrong

Pending legislation with the Cyber Supply Chain Transparency Act makes this a particularly important topic for Federal Agencies and the ISVs and SIs who provide software to them. This session will also provide background on this act and provide practical guidance on how respond to and benefit from it.

Joshua Corman, Sonatype, CTO

Joshua Corman is a Founder of I am The Cavalry (dot org) and the CTO for Sonatype. Corman has served key research and strategy roles at Akamai Technologies, The 451 Group, and IBM Internet Security Systems. He co-founded @RuggedSoftware and @IamTheCavalry to encourage new security approaches in response to the world’s increasing dependence on digital infrastructure. Josh's unique approach to security in the context of human factors, adversary motivations and social impact has helped position him as one of the most trusted names in security. He is an adjunct faculty for Carnegie Mellon’s Heinz College and Advisor to DHS S&T. Josh received his bachelor's degree in philosophy, graduating summa cum laude, from the University of New Hampshire.

Open Access Media

USENIX is committed to Open Access to the research presented at our events. Papers and proceedings are freely available to everyone once the event begins. Any video, audio, and/or slides that are posted after the event are also free and open to everyone. Support USENIX and our commitment to Open Access.

Presentation Video 

Presentation Audio

MP3 Download

Download Audio

  • Log in or    Register to post comments

Gold Sponsors

Silver Sponsors

Bronze Sponsors

General Sponsors

Media Sponsors & Industry Partners

© USENIX

LISA is a registered trademark of the USENIX Association.

  • Privacy Policy
  • Contact Us