openEuler OS Technical Whitepaper
Innovation Projects
(June, 2023)for openEuler 059 OneAll 062 StratoVirt 063 Compiler Plugin Framework 065 CONTENTS Robust Security and Rocksolid Reliability 066 IMA 066 KunpengSecL 068 secCrypto 070 secGear 072 secPaver QuickIssue 106 Compatibility and Technical Assessment 107 OSV Technical Assessment 107 openEuler Compatibility List 108 openEuler Technical Assessment 110 Acknowledgment 111 001 openEuler OS Scenario collaboration Scenario enablement Linux kernel x86, Arm, RISC-V GPU NPU Real-time kernel Security kernel Database Big data Resource orchestration Desktop system Industrial application ... ..0 码力 | 116 页 | 3.16 MB | 1 年前3
MITRE Defense Agile Acquisition Guide - Mar 2014and technologically advanced. That is the force for the future.” - Secretary Panetta, Defense Security Review, 5 Jan 12iii Foreword Department of Defense (DoD) program managers and executives have development practices. Table 1 Traditional Versus Agile Considerations Consider Agile Practices Assessment Areas Consider Traditional Practices Requirements cannot be well defined upfront due to a dynamic iterative development User Timelines Operational environment does not7 Consider Agile Practices Assessment Areas Consider Traditional Practices and require frequent capability upgrades (<1 year).0 码力 | 74 页 | 3.57 MB | 5 月前3
How GitOps Boosts
Business Performance:
The Factssoftware development, there is more than one way to implement DevOps. As the DevOps Research and Assessment group (DORA) found in their recent report, ‘Accelerate: The State of DevOps 2019’, there are significant cloud-native world, GitOps makes developers more productive while improving application stability, security and compliance – and it does all this without the need for developers to learn new tools. On the way to implement GitOps is to use Git, since it already includes many advantages such as built-in security guarantees with full audit trails. Another key concept behind GitOps is the fact that Kubernetes0 码力 | 9 页 | 506.50 KB | 1 年前3
THE GITOPS GUIDE
TO BUILDING &
MANAGING INTERNAL
PLATFORMSdevelopers to be more effective, by making the good thing the easy thing – in areas such as testing, security and observability this is increasingly important. Good DX allows for shift left.” — James Governor DevOps report The 2021 State of DevOps report released by Puppet and DORA (DevOps Research & Assessment) has surveyed many organizations and organized them by low, mid, and high DevOps maturity. The cloud to edge Scale infrastructure to meet demands Enable built-in compliance Enforce zero-trust security Let’s look at each of these reasons in detail. 1 2 3 4 weave.works THE GITOPS GUIDE TO BUILDING0 码力 | 15 页 | 623.52 KB | 1 年前3
大学霸 Kali Linux 安全渗透教程Linux的前身是BackTrack Linux发行版。Kali Linux是一个基于Debian的Linux 发行版,包括很多安全和取证方面的相关工具。它由Offensive Security Ltd维护和 资助,最先由Offensive Security的MatiAharoni和Devon Kearns通过重写Back Track来完成。Back Track是基于Ubuntu的一个Linux发行版。 Kali 以SD卡为内存硬盘。为了方便携带,在树莓派上安装Kali Linux是一个不错的选 择。本小节将介绍在树莓派上安装Kali Linux操作系统。 (1)从http://www.offensive-security.com/kali-linux-vmware-arm-image-download/ 网站下载树莓派的映像文件,其文件名为kali-linux-1.0.6a-rpi.img.xz。 (2)下 http://mirrors.neusoft.edu.cn/kali/ kali main non-free contrib deb http://mirrors.neusoft.edu.cn/kali-security kali/updates main contrib non-free 添加完以上几个源后,将保存sources.list文件并退出。在该文件中,添加的软件源 是根据不同的软件库分类的。其中0 码力 | 444 页 | 25.79 MB | 1 年前3
A Seat at the Table - IT Leadership in the Age of Agilityanalysis will prove invaluable to leaders who must execute it.” – Jez Humble, CTO, DevOps Research & Assessment, LLC A Few Themes Getting in Our Own Way: First, that we have locked ourselves into a frame of AWS he was the CIO of US Citizenship and Immigration Service (part of the Department of Homeland Security), CIO of Intrax, and CEO of Auctiva. He has an MBA from Wharton, a BS in Computer Science from0 码力 | 4 页 | 379.23 KB | 5 月前3
Cilium v1.11 Documentationsmall Cilium setup on your laptop. Intended as an easy way to get your hands dirty applying Cilium security policies between containers. Concepts: Describes the components of Cilium, and the different models Installation Observability Network Policy Security Tutorials Advanced Networking Cluster Mesh Operations Istio Concepts Component Overview Terminology Networking Network Security eBPF Datapath Observability Kubernetes Integration Multi-Cluster (Cluster Mesh) Getting Help FAQ Slack GitHub Training Enterprise support Security Bugs Operations System Requirements Summary Architecture Support Linux Distribution Compatibility0 码力 | 1373 页 | 19.37 MB | 1 年前3
Cilium v1.5 Documentationsmall Cilium setup on your laptop. Intended as an easy way to get your hands dirty applying Cilium security policies between containers. Concepts: Describes the components of Cilium, and the different models Guides Installa�on Security Tutorials Advanced Networking Opera�ons Is�o Other Orchestrators Concepts Component Overview Assurances Terminology Address Management Mul� Host Networking Security Architecture Datapath Datapath Scale Kubernetes Integra�on Ge�ng Help FAQ Slack GitHub Security Bugs Integra�ons Kubernetes Introduc�on Concepts Requirements Configura�on Network Policy Endpoint CRD Kubernetes Compa�bility0 码力 | 740 页 | 12.52 MB | 1 年前3
Cilium v1.6 Documentationsmall Cilium setup on your laptop. Intended as an easy way to get your hands dirty applying Cilium security policies between containers. Concepts: Describes the components of Cilium, and the different models Guides Installation Security Tutorials Advanced Networking Operations Istio Other Orchestrators Concepts Component Overview Terminology Address Management Multi Host Networking Security Datapath Failure Failure Behavior Architecture Datapath Scale Kubernetes Integration Getting Help FAQ Slack GitHub Security Bugs Integrations Kubernetes Introduction Concepts Requirements Configuration Network Policy0 码力 | 734 页 | 11.45 MB | 1 年前3
Cilium v1.7 Documentationsmall Cilium setup on your laptop. Intended as an easy way to get your hands dirty applying Cilium security policies between containers. Concepts: Describes the components of Cilium, and the different models Installation Network Policy Security Tutorials Advanced Networking Operations Istio Other Orchestrators Concepts Component Overview Terminology Address Management Multi Host Networking Security Datapath Failure Failure Behavior Architecture Datapath Scale Kubernetes Integration Getting Help FAQ Slack GitHub Security Bugs Integrations Kubernetes Introduction Concepts Requirements Configuration Network Policy0 码力 | 885 页 | 12.41 MB | 1 年前3
共 153 条
- 1
- 2
- 3
- 4
- 5
- 6
- 16













