Browse Definitions :
Reference

The history of DevOps: A visual timeline

DevOps is a shared philosophy in which development and operations teams work together. The practice promotes better communication and collaboration between those two teams, as well as other teams in an organization, such as security.

DevOps' rise in popularity grew with the publication of books like The Phoenix Project by authors Gene Kim, George Spafford and Kevin Behr. Published in 2013, the book is a narrative-style novel that follows a fictional American company going through a digital transformation. Below is a timeline of the history of DevOps and major moments that have helped develop the concept.

DevOps has grown since its initial conception in 2007-2008, and now large companies such as Amazon, Netflix, Target and Adobe are embracing the idea. In 2014, 16% of organizations participated in DevOps, growing little by little over the years to 27% in 2018.

With the growth of DevOps, vendors have begun to offer services aligned with the concept. Vendors in 2020 include Atlassian, CloudBees, GitHub, HashiCorp and Google.

Here's a timeline that shows the evolution of DevOps through the years. Click on the image to view it at full-size.

DevOps timeline
This was last updated in July 2020

Continue Reading About The history of DevOps: A visual timeline

SearchNetworking
  • virtual network functions (VNFs)

    Virtual network functions (VNFs) are virtualized tasks formerly carried out by proprietary, dedicated hardware.

  • network functions virtualization (NFV)

    Network functions virtualization (NFV) is a network architecture model designed to virtualize network services that have ...

  • overlay network

    An overlay network is a virtual or logical network that is created on top of an existing physical network.

SearchSecurity
  • X.509 certificate

    An X.509 certificate is a digital certificate that uses the widely accepted international X.509 public key infrastructure (PKI) ...

  • directory traversal

    Directory traversal is a type of HTTP exploit in which a hacker uses the software on a web server to access data in a directory ...

  • malware

    Malware, or malicious software, is any program or file that is intentionally harmful to a computer, network or server.

SearchCIO
  • data latency

    Data latency is the time it takes for data packets to be stored or retrieved. In business intelligence (BI), data latency is how ...

  • chief data officer (CDO)

    A chief data officer (CDO) in many organizations is a C-level executive whose position has evolved into a range of strategic data...

  • information technology (IT) director

    An information technology (IT) director is the person in charge of technology within an organization. IT directors manage ...

SearchHRSoftware
SearchCustomerExperience
  • implementation

    Implementation is the execution or practice of a plan, a method or any design, idea, model, specification, standard or policy for...

  • first call resolution (FCR)

    First call resolution (FCR) is when customer service agents properly address a customer's needs the first time they call.

  • customer intelligence (CI)

    Customer intelligence (CI) is the process of collecting and analyzing detailed customer data from internal and external sources ...

Close