Browse Definitions :
Reference

The history of DevOps: A visual timeline

DevOps is a shared philosophy in which development and operations teams work together. The practice promotes better communication and collaboration between those two teams, as well as other teams in an organization, such as security.

DevOps' rise in popularity grew with the publication of books like The Phoenix Project by authors Gene Kim, George Spafford and Kevin Behr. Published in 2013, the book is a narrative-style novel that follows a fictional American company going through a digital transformation. Below is a timeline of the history of DevOps and major moments that have helped develop the concept.

DevOps has grown since its initial conception in 2007-2008, and now large companies such as Amazon, Netflix, Target and Adobe are embracing the idea. In 2014, 16% of organizations participated in DevOps, growing little by little over the years to 27% in 2018.

With the growth of DevOps, vendors have begun to offer services aligned with the concept. Vendors in 2020 include Atlassian, CloudBees, GitHub, HashiCorp and Google.

Here's a timeline that shows the evolution of DevOps through the years. Click on the image to view it at full-size.

DevOps timeline
This was last updated in July 2020

Continue Reading About The history of DevOps: A visual timeline

Networking
  • firewall as a service (FWaaS)

    Firewall as a service (FWaaS), also known as a cloud firewall, is a service that provides cloud-based network traffic analysis ...

  • private 5G

    Private 5G is a wireless network technology that delivers 5G cellular connectivity for private network use cases.

  • NFVi (network functions virtualization infrastructure)

    NFVi (network functions virtualization infrastructure) encompasses all of the networking hardware and software needed to support ...

Security
  • virus (computer virus)

    A computer virus is a type of malware that attaches itself to a program or file. A virus can replicate and spread across an ...

  • Certified Information Security Manager (CISM)

    Certified Information Security Manager (CISM) is an advanced certification that indicates that an individual possesses the ...

  • cryptography

    Cryptography is a method of protecting information and communications using codes, so that only those for whom the information is...

CIO
  • IT project management

    IT project management is the process of planning, organizing and delineating responsibility for the completion of an ...

  • chief financial officer (CFO)

    A chief financial officer (CFO) is the corporate title for the person responsible for managing a company's financial operations ...

  • chief strategy officer (CSO)

    A chief strategy officer (CSO) is a C-level executive charged with helping formulate, facilitate and communicate an ...

HRSoftware
  • HR automation

    Human resources automation (HR automation) is a method of using software to automate and streamline repetitive and laborious HR ...

  • compensation management

    Compensation management is the discipline and process for determining employees' appropriate pay and benefits.

  • HR technology (human resources tech)

    HR technology (human resources technology) is an umbrella term for hardware and software used to automate the human resource ...

Customer Experience
  • martech (marketing technology)

    Martech (marketing technology) refers to the integration of software tools, platforms, and applications designed to streamline ...

  • transactional marketing

    Transactional marketing is a business strategy that focuses on single, point-of-sale transactions.

  • customer profiling

    Customer profiling is the detailed and systematic process of constructing a clear portrait of a company's ideal customer by ...

Close