Skip to main content

No broken windows (create technical documentation)

The relevance of the broken windows theory, first coined by Kelling and Wilson, to determining the underlying, root causes for major incidents in Information Technology (IT) is important. The broken windows theory describes the purported phenomenon whereby an abandoned building with no broken windows is mostly left undisturbed, but as soon as one window is broken, it acts as an open invitation to passers-by that it's open-season for rock-throwing.
I have previously written about the techie curse.  Read about it here. The fundamental techie curse is the reluctance to create documentation. My corollary to the broken windows theory as applied to IT is that more major incidents will happen to infrastructure where the processes, resources (vendors and technicians), products and tools are not fully documented.
Infrastructure that is not fully documented leads to tardy habits, which become bad processes that ultimately results in an increased rate of major incidents.
One of the major benefits a Configuration Management Database (CMDB) provides is the ability to provide and act as a repository for documenting infrastructure. This basic feature is the most important and it is time that IT professionals stop taking short cuts and start documenting! NO BROKEN WINDOWS!


Popular posts from this blog

easywall - Web interface for easy use of the IPTables firewall on Linux systems written in Python3.

Firewalls are becoming increasingly important in today’s world. Hackers and automated scripts are constantly trying to invade your system and use it for Bitcoin mining, botnets or other things. To prevent these attacks, you can use a firewall on your system. IPTables is the strongest firewall in Linux because it can filter packets in the kernel before they reach the application. Using IPTables is not very easy for Linux beginners. We have created easywall - the simple IPTables web interface . The focus of the software is on easy installation and use. Access this neat software over on github: easywall

No Scrubs: The Architecture That Made Unmetered Mitigation Possible

When building a DDoS mitigation service it’s incredibly tempting to think that the solution is scrubbing centers or scrubbing servers. I, too, thought that was a good idea in the beginning, but experience has shown that there are serious pitfalls to this approach. Read the post of at Cloudflare's blog: N o Scrubs: The Architecture That Made Unmetered Mitigation Possible

Should You Buy A UniFi Dream Machine, USG, USG Pro, or Dream Machine Pro?