You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
Instantly share code, notes, and snippets.
🚀
AI Powered DevOps
Alex Atkinson
AlexAtkinson
🚀
AI Powered DevOps
Very long-term DevOps/DevSecOps/SRE.
I build only self-healing, never-wakes-you-up-at-2am, level 9001 infra; and champion individual success.
Until the mid-2010's the "technology industry" was widely considered to be unregulated, resulting in tremendous harm. The colloquialism "move fast and break things" is from these times, and despite being a proven travesty, continues to influence leadership across industry.
Fortunately, today, both data and related business operations are regulated.
Unfortunately, there are many in leadership roles who see the compliance-related fines and penalties as acceptable business risks -- especially as their expected tenure ostensibly limits personal exposure to said risks.
These processes comprise the bulk of the technical footprint necessary for developing and releasing software products.
Important
Like Git, there are too few who understand this material -- especially in startups.
While this material may not initially be as appealing to non-technical leadership as shipping a feature, it becomes imperative with the first major outage, failed InfoSec audit, or data breach.
From the merge hell of SVN and the early days of Git to the refined tactics we enjoy today, there have been many developments in branching strategies, but only a few remain relevant. This document covers these strategies as well as their adoption considerations.
Branching Strategies
The first three strategies are the most commonly used, with the fourth highlighting a critical anti-pattern, and the last being used for Linux kernel development; and some other large projects. Skip learning about the last two for now, but know that they exist.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters