MITRE Defense Agile Acquisition Guide - Mar 2014structure and methods to apply. Agile requires a set of processes, roles, and culture that will take time to employ. This guide is intended to show how the DoD could tailor the Defense Acquisition Framework lessons learned by these early Agile adopters. Broader, more successful Agile execution will take time, trial and error, and shaping of processes, policies, and culture, but with support from oversight of releases and sprints, changing operational priorities, or technical considerations. Story Points – Unit of measurement to estimate relative complexity of user stories Velocity – The amount of work0 码力 | 74 页 | 3.57 MB | 5 月前3
openEuler 21.09 技术白皮书built on the latest trends of interconnect buses and storage media, and offers a distributed, real-time acceleration engine and base services. It provides competitive advantages in edge and embedded scenarios deployments of online and offline cloud services. Its innovative CPU scheduling algorithm ensures real-time CPU preemption and jitter suppression for online services. Additionally, its innovative memory reclamation solution, the iSulad+shimv2+StratoVirt secure container solution reduces the memory overhead and boot time by 40%. • Dual-plane deployment tool eggo: OSs can be installed with one click for ARM and x86 hybrid0 码力 | 36 页 | 3.40 MB | 1 年前3
Cilium v1.6 Documentationdemand. This results in a large number of application containers to be started in a short period of time. Typical container firewalls secure workloads by filtering on source IP addresses and destination In order for the entire system to come up, the following components have to be running at the same time: kube-dns or coredns cilium-xxx cilium-etcd-operator etcd-operator etcd-xxx All timeouts are configured CrashLoopBackoff, bootstrapping can be expedited by restarting the pods to reset the CrashLoopBackoff time. CoreDNS: Enable reverse lookups In order for the TLS certificates between etcd peers to work correctly0 码力 | 734 页 | 11.45 MB | 1 年前3
The Path to GitOpsSpecifically, continuous integration (CI) and continuous delivery (CD) tooling. My mindset at the time was, “We can do better.” We had new, declarative tools for infrastructure and a new paradigm to work At the time, someone was trying to do better: A small, scrappy startup called Weaveworks. They’re the ones who coined the term GitOps in 2017. Our futures would be entwined for a significant time after multiple workshops and GitOpsCons and attended regular meetings to help shape GitOps. The entire time, Christian Hernandez established himself as one of the preeminent experts in GitOps. He deftly fielded0 码力 | 45 页 | 1.09 MB | 1 年前3
This Debian Reference (version 2.109) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 1.1.13 Play time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144 9.3.4 Customized display of time and date . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144 9.3.5 Colorized . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155 9.5.5 System and hardware time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155 9.5.6 The0 码力 | 266 页 | 1.25 MB | 1 年前3
Cilium v1.7 Documentationdemand. This results in a large number of application containers to be started in a short period of time. Typical container firewalls secure workloads by filtering on source IP addresses and destination Cluster Mesh With Kind we can simulate Cluster Mesh in a sandbox too. Kind Configuration This time we need to create (2) config.yaml, one for each kubernetes cluster. We will explicitly configure their In order for the entire system to come up, the following components have to be running at the same time: kube-dns or coredns cilium-xxx cilium-etcd-operator etcd-operator etcd-xxx All timeouts are configured0 码力 | 885 页 | 12.41 MB | 1 年前3
Cilium v1.5 Documentationterminal window for A-Wing, set A-wing’s coordinates: >>> client.set("awing-coord","4309.432,918.980",time=2400) True >>> client.get("awing-coord") '4309.432,918.980' In your main terminal window, have "0.0,0.0",time=2400) True >>> client.get("xwing-coord") '0.0,0.0' From A-Wing, set the X-Wing coordinates back to their proper posi�on: >>> client.set("xwing-coord","8893.34,234.3290",time=2400) True window: >>> client.get("xwing-coord") '8893.34,234.3290' >>> client.set("awing-coord","0.0,0.0",time=1200) Traceback (most recent call last): File "", line 1, in File "/usr/local/lib/python3 0 码力 | 740 页 | 12.52 MB | 1 年前3
The Linux Commands Handbook
Conclusion 4 Preface The Linux Commands Handbook follows the 80/20 rule: learn in 20% of the time the 80% of a topic. I find this approach gives a well-rounded overview. This book does not try to and its commands. It focuses on the small core commands that you will use the 80% or 90% of the time, trying to simplify the usage of the more complex ones. All those commands work on Linux, macOS users and a community of people around it, so you can do what you need to do without losing too much time reinventing the wheel and figuring out answers to common problems. Some desktop computers and laptops0 码力 | 135 页 | 14.14 MB | 1 年前3
The Linux Commands Handbook
Linux Handbook Conclusion 2 Preface The Linux Handbook follows the 80/20 rule: learn in 20% of the time the 80% of a topic. In particular, the goal is to get you up to speed quickly with Linux. This users and a community of people around it, so you can do what you need to do without losing too much time reinventing the wheel and figuring out answers to common problems. Some desktop computers and laptops will give you the ability to run Linux in a very easy way on your PC. But the vast majority of the time you will run a Linux computer in the cloud via a VPS (Virtual Private Server) like DigitalOcean.0 码力 | 112 页 | 13.74 MB | 1 年前3
Cilium v1.8 Documentationdemand. This results in a large number of application containers to be started in a short period of time. Typical container firewalls secure workloads by filtering on source IP addresses and destination Cluster Mesh With Kind we can simulate Cluster Mesh in a sandbox too. Kind Configuration This time we need to create (2) config.yaml, one for each kubernetes cluster. We will explicitly configure their In order for the entire system to come up, the following components have to be running at the same time: kube-dns or coredns cilium-xxx cilium-operator-xxx cilium-etcd-operator etcd-operator cilium-etcd-xxx0 码力 | 1124 页 | 21.33 MB | 1 年前3
共 168 条
- 1
- 2
- 3
- 4
- 5
- 6
- 17













