积分充值
 首页
前端开发
AngularDartElectronFlutterHTML/CSSJavaScriptReactSvelteTypeScriptVue.js构建工具
后端开发
.NetC#C++C语言DenoffmpegGoIdrisJavaJuliaKotlinLeanMakefilenimNode.jsPascalPHPPythonRISC-VRubyRustSwiftUML其它语言区块链开发测试微服务敏捷开发架构设计汇编语言
数据库
Apache DorisApache HBaseCassandraClickHouseFirebirdGreenplumMongoDBMySQLPieCloudDBPostgreSQLRedisSQLSQLiteTiDBVitess数据库中间件数据库工具数据库设计
系统运维
AndroidDevOpshttpdJenkinsLinuxPrometheusTraefikZabbix存储网络与安全
云计算&大数据
Apache APISIXApache FlinkApache KarafApache KyuubiApache OzonedaprDockerHadoopHarborIstioKubernetesOpenShiftPandasrancherRocketMQServerlessService MeshVirtualBoxVMWare云原生CNCF机器学习边缘计算
综合其他
BlenderGIMPKiCadKritaWeblate产品与服务人工智能亿图数据可视化版本控制笔试面试
文库资料
前端
AngularAnt DesignBabelBootstrapChart.jsCSS3EchartsElectronHighchartsHTML/CSSHTML5JavaScriptJerryScriptJestReactSassTypeScriptVue前端工具小程序
后端
.NETApacheC/C++C#CMakeCrystalDartDenoDjangoDubboErlangFastifyFlaskGinGoGoFrameGuzzleIrisJavaJuliaLispLLVMLuaMatplotlibMicronautnimNode.jsPerlPHPPythonQtRPCRubyRustR语言ScalaShellVlangwasmYewZephirZig算法
移动端
AndroidAPP工具FlutterFramework7HarmonyHippyIoniciOSkotlinNativeObject-CPWAReactSwiftuni-appWeex
数据库
ApacheArangoDBCassandraClickHouseCouchDBCrateDBDB2DocumentDBDorisDragonflyDBEdgeDBetcdFirebirdGaussDBGraphGreenPlumHStreamDBHugeGraphimmudbIndexedDBInfluxDBIoTDBKey-ValueKitDBLevelDBM3DBMatrixOneMilvusMongoDBMySQLNavicatNebulaNewSQLNoSQLOceanBaseOpenTSDBOracleOrientDBPostgreSQLPrestoDBQuestDBRedisRocksDBSequoiaDBServerSkytableSQLSQLiteTiDBTiKVTimescaleDBYugabyteDB关系型数据库数据库数据库ORM数据库中间件数据库工具时序数据库
云计算&大数据
ActiveMQAerakiAgentAlluxioAntreaApacheApache APISIXAPISIXBFEBitBookKeeperChaosChoerodonCiliumCloudStackConsulDaprDataEaseDC/OSDockerDrillDruidElasticJobElasticSearchEnvoyErdaFlinkFluentGrafanaHadoopHarborHelmHudiInLongKafkaKnativeKongKubeCubeKubeEdgeKubeflowKubeOperatorKubernetesKubeSphereKubeVelaKumaKylinLibcloudLinkerdLonghornMeiliSearchMeshNacosNATSOKDOpenOpenEBSOpenKruiseOpenPitrixOpenSearchOpenStackOpenTracingOzonePaddlePaddlePolicyPulsarPyTorchRainbondRancherRediSearchScikit-learnServerlessShardingSphereShenYuSparkStormSupersetXuperChainZadig云原生CNCF人工智能区块链数据挖掘机器学习深度学习算法工程边缘计算
UI&美工&设计
BlenderKritaSketchUI设计
网络&系统&运维
AnsibleApacheAWKCeleryCephCI/CDCurveDevOpsGoCDHAProxyIstioJenkinsJumpServerLinuxMacNginxOpenRestyPrometheusServertraefikTrafficUnixWindowsZabbixZipkin安全防护系统内核网络运维监控
综合其它
文章资讯
 上传文档  发布文章  登录账户
IT文库
  • 综合
  • 文档
  • 文章

无数据

分类

全部系统运维(11)网络与安全(11)

语言

全部英语(11)

格式

全部DOC文档 DOC(10)PDF文档 PDF(1)
 
本次搜索耗时 0.015 秒,为您找到相关结果约 11 个.
  • 全部
  • 系统运维
  • 网络与安全
  • 全部
  • 英语
  • 全部
  • DOC文档 DOC
  • PDF文档 PDF
  • 默认排序
  • 最新排序
  • 页数排序
  • 大小排序
  • 全部时间
  • 最近一天
  • 最近一周
  • 最近一个月
  • 最近三个月
  • 最近半年
  • 最近一年
  • pdf文档 MITRE Defense Agile Acquisition Guide - Mar 2014

    DoD’s IT acquisition challenges, but offers a set of principles that can help reduce cycle times and risks to deliver IT in a complex environment. “The US joint force will be smaller and leaner. But its Program supports a critical mission in which defects may result in loss of life or high security risks. Industry has relevant domain experience and Agile development expertise. Developer Expertise must determine the optimal timelines for releases and sprints on the basis of various constraints, risks, and factors. The primary drivers include how frequently the operational community wants and can
    0 码力 | 74 页 | 3.57 MB | 5 月前
    3
  • word文档 DoD CIO Enterprise DevSecOps Reference Design - Summary

    waiting to apply each skill set sequentially.  Security risks of the underlying infrastructure must be measured and quantified, so that the total risks and impacts to software applications are understood Mesh 3. Program-specific artifact repository 4. Runtime Behavior Analysis Artificial Intelligence (AI) service 5. DCAR for the hardened containers 6. Common Vulnerabilities and Exposures (CVE)Service
    0 码力 | 8 页 | 3.38 MB | 5 月前
    3
  • word文档 The DevOps Handbook

    environment. Helps identify compensatory behaviors and workarounds driven by un/usability ii. Same benefits applies with internal customers (infrastructure, operations, etc.) iii. Gene Kim – “One of the requests – sufficient detail on why the change is made, how the change was made, and identified risks and resulting countermeasures j. FEARLESSLY CUT BUREAUCRATIC PROCESSES i. Adrian Cockcroft – “A
    0 码力 | 8 页 | 24.02 KB | 5 月前
    3
  • word文档 A Seat at the Table: IT Leadership in the Age of Agility - Part 2

    process involve project sponsors (1) developing a formal proposal that incorporates estimated benefits, risks, and resource requirements and (2) submitting the proposal to decision makers who select
    0 码力 | 7 页 | 387.61 KB | 5 月前
    3
  • word文档 A Seat at the Table - IT Leadership in the Age of Agility

    transformation, when we see them as tightly integrated into an EA, and when we realize that the costs and risks of custom development have been radically reduced, the economics often now favor custom development potential risks, actively working to prevent them, and, if necessary, building slack into the plan to manage the potential impact of the risk on schedule.  Such an approach assumes that the risks are bounded bounded and can be itemized, that we can know the risks in advance, and that we have a way to (try to) control them.  The relationship between uncertainty, risk, and change is far too complicated for
    0 码力 | 7 页 | 387.48 KB | 5 月前
    3
  • word文档 The Phoenix Project

    Third Way is about creating a culture that fosters two things: continual experimentation, taking risks and learning from failure; and understanding that repetition and practice is the prerequisite to allocating time for the improvement of daily work, creating rituals that reward the team for taking risks, and introducing faults into the system to increase resilience. Four Types of Work 1. Business projects
    0 码力 | 3 页 | 154.45 KB | 5 月前
    3
  • word文档 A Seat at the Table - IT Leadership in the Age of Agility

     What are the key risks to delivery? What assumptions are contained in the plans? How will the team move quickly to test those assumptions and gain information to manage the risks? I want to understand
    0 码力 | 4 页 | 379.23 KB | 5 月前
    3
  • word文档 The DevOps Handbook

    quality and safety problems ii. high-trust culture 1. we are all lifelong learners who must take risks in our daily work 2. we learn from our successes and failures, identifying which ideas don’t work
    0 码力 | 8 页 | 22.57 KB | 5 月前
    3
  • word文档 The DevOps Handbook

    AND COMPLIANCE INTO CHANGE APPROVAL PROCESSES i. Effective change management recognized different risks associated with different types of changes, to be handled differently 1. Standard changes: lower-risk
    0 码力 | 9 页 | 25.13 KB | 5 月前
    3
  • word文档 The DevOps Handbook

    iii. DevOps goal – shift reliance from separate groups to other control mechanisms to mitigate risks more effectively using 1. Automated testing 2. Automated deployment 3. Peer reviews iv. 2013 State
    0 码力 | 8 页 | 23.08 KB | 5 月前
    3
共 11 条
  • 1
  • 2
前往
页
相关搜索词
MITREDefenseAgileAcquisitionGuideMar2014DoDCIOEnterpriseDevSecOpsReferenceDesignSummaryTheDevOpsHandbookSeatattheTableITLeadershipinAgeofAgilityPartPhoenixProject
IT文库
关于我们 文库协议 联系我们 意见反馈 免责声明
本站文档数据由用户上传或本站整理自互联网,不以营利为目的,供所有人免费下载和学习使用。如侵犯您的权益,请联系我们进行删除。
IT文库 ©1024 - 2025 | 站点地图
Powered By MOREDOC AI v3.3.0-beta.70
  • 关注我们的公众号【刻舟求荐】,给您不一样的精彩
    关注我们的公众号【刻舟求荐】,给您不一样的精彩