Browse Definitions :
Definition

CALMS

Contributor(s): Ivy Wigmore

CALMS is a conceptual framework for the integration of development and operations (DevOps) teams, functions and systems within an organization. The CALMS framework is often used as a maturity model, helping managers to evaluate whether or not their organization is ready for DevOps -- and if not, what needs to change. The acronym CALMS is credited to Jez Humble, co-author of "The DevOps Handbook."

The five pillars of the CALMS framework for DevOps are:

Culture - there is a culture of shared responsibility.

Automation -  team members seek out ways to automate as many tasks as possible and are comfortable with the idea of continuous delivery.

Lean - team members are able to visualize work in progress (WIP), limit batch sizes and manage queue lengths. 

Measurement - data is collected on everything and there are mechanisms in place that provide visibility into all systems.

Sharing - there are user-friendly communication channels that encourage ongoing communication between development and operations.

The CALMS framework is sometimes considered an alternative to ITSM (Information Technology Service Management), a strategic approach to designing, delivering, managing and improving the way IT is used within an organization. ITSM, which is often associated with ITIL (Information Technology Infrastructure Library) is considered by some IT administrators to be too rigid and therefore incompatible with DevOps. CALMS is sometimes thought of as a way of negotiating the differences between the two approaches.

This was last updated in September 2017

Continue Reading About CALMS

Join the conversation

1 comment

Send me notifications when other members comment.

Please create a username to comment.

I believe this acronym is correctly attributed to John Willis and Damon Edwards in its original form - CAMS - Jez Humble later added the L. See here: https://itrevolution.com/devops-culture-part-1/
Cancel

-ADS BY GOOGLE

File Extensions and File Formats

SearchCompliance

SearchSecurity

  • cybersecurity

    Cybersecurity is the protection of internet-connected systems, including hardware, software and data, from cyberattacks.

  • asymmetric cryptography (public key cryptography)

    Asymmetric cryptography, also called public key cryptography, uses a pair of numerical keys that are mathematically related to ...

  • digital signature

    A digital signature is a mathematical technique used to validate the authenticity and integrity of a message, software or digital...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

  • hard disk drive (HDD)

    A computer hard disk drive (HDD) is a non-volatile memory hardware device that controls the positioning, reading and writing of ...

  • byte

    In most computer systems, a byte is a unit of data that is eight binary digits long. Bytes are often used to represent a ...

  • network-attached storage (NAS)

    Network-attached storage (NAS) is dedicated file storage that enables multiple users and heterogeneous client devices to retrieve...

Close