Perhaps you have skipped ahead to this chapter rather than reading all previous chapters. That’s ok, but the other topics were intentionally placed ahead of this one. It is true that until we actually deploy bits to an environment, no one can use them. However, the deployment pipeline is where all prior techniques provide their value of squeezing out defects, so they are not promoted to our users. In this chapter, you will learn the model for designing your deployment pipeline, the types of environment to configure therein, and the types of activities necessary during deployment.