积分充值
 首页
前端开发
AngularDartElectronFlutterHTML/CSSJavaScriptReactSvelteTypeScriptVue.js构建工具
后端开发
.NetC#C++C语言DenoffmpegGoIdrisJavaJuliaKotlinLeanMakefilenimNode.jsPascalPHPPythonRISC-VRubyRustSwiftUML其它语言区块链开发测试微服务敏捷开发架构设计汇编语言
数据库
Apache DorisApache HBaseCassandraClickHouseFirebirdGreenplumMongoDBMySQLPieCloudDBPostgreSQLRedisSQLSQLiteTiDBVitess数据库中间件数据库工具数据库设计
系统运维
AndroidDevOpshttpdJenkinsLinuxPrometheusTraefikZabbix存储网络与安全
云计算&大数据
Apache APISIXApache FlinkApache KarafApache KyuubiApache OzonedaprDockerHadoopHarborIstioKubernetesOpenShiftPandasrancherRocketMQServerlessService MeshVirtualBoxVMWare云原生CNCF机器学习边缘计算
综合其他
BlenderGIMPKiCadKritaWeblate产品与服务人工智能亿图数据可视化版本控制笔试面试
文库资料
前端
AngularAnt DesignBabelBootstrapChart.jsCSS3EchartsElectronHighchartsHTML/CSSHTML5JavaScriptJerryScriptJestReactSassTypeScriptVue前端工具小程序
后端
.NETApacheC/C++C#CMakeCrystalDartDenoDjangoDubboErlangFastifyFlaskGinGoGoFrameGuzzleIrisJavaJuliaLispLLVMLuaMatplotlibMicronautnimNode.jsPerlPHPPythonQtRPCRubyRustR语言ScalaShellVlangwasmYewZephirZig算法
移动端
AndroidAPP工具FlutterFramework7HarmonyHippyIoniciOSkotlinNativeObject-CPWAReactSwiftuni-appWeex
数据库
ApacheArangoDBCassandraClickHouseCouchDBCrateDBDB2DocumentDBDorisDragonflyDBEdgeDBetcdFirebirdGaussDBGraphGreenPlumHStreamDBHugeGraphimmudbIndexedDBInfluxDBIoTDBKey-ValueKitDBLevelDBM3DBMatrixOneMilvusMongoDBMySQLNavicatNebulaNewSQLNoSQLOceanBaseOpenTSDBOracleOrientDBPostgreSQLPrestoDBQuestDBRedisRocksDBSequoiaDBServerSkytableSQLSQLiteTiDBTiKVTimescaleDBYugabyteDB关系型数据库数据库数据库ORM数据库中间件数据库工具时序数据库
云计算&大数据
ActiveMQAerakiAgentAlluxioAntreaApacheApache APISIXAPISIXBFEBitBookKeeperChaosChoerodonCiliumCloudStackConsulDaprDataEaseDC/OSDockerDrillDruidElasticJobElasticSearchEnvoyErdaFlinkFluentGrafanaHadoopHarborHelmHudiInLongKafkaKnativeKongKubeCubeKubeEdgeKubeflowKubeOperatorKubernetesKubeSphereKubeVelaKumaKylinLibcloudLinkerdLonghornMeiliSearchMeshNacosNATSOKDOpenOpenEBSOpenKruiseOpenPitrixOpenSearchOpenStackOpenTracingOzonePaddlePaddlePolicyPulsarPyTorchRainbondRancherRediSearchScikit-learnServerlessShardingSphereShenYuSparkStormSupersetXuperChainZadig云原生CNCF人工智能区块链数据挖掘机器学习深度学习算法工程边缘计算
UI&美工&设计
BlenderKritaSketchUI设计
网络&系统&运维
AnsibleApacheAWKCeleryCephCI/CDCurveDevOpsGoCDHAProxyIstioJenkinsJumpServerLinuxMacNginxOpenRestyPrometheusServertraefikTrafficUnixWindowsZabbixZipkin安全防护系统内核网络运维监控
综合其它
文章资讯
 上传文档  发布文章  登录账户
IT文库
  • 综合
  • 文档
  • 文章

无数据

分类

全部系统运维(22)网络与安全(22)

语言

全部英语(21)中文(简体)(1)

格式

全部DOC文档 DOC(15)PDF文档 PDF(5)PPT文档 PPT(2)
 
本次搜索耗时 0.014 秒,为您找到相关结果约 22 个.
  • 全部
  • 系统运维
  • 网络与安全
  • 全部
  • 英语
  • 中文(简体)
  • 全部
  • DOC文档 DOC
  • PDF文档 PDF
  • PPT文档 PPT
  • 默认排序
  • 最新排序
  • 页数排序
  • 大小排序
  • 全部时间
  • 最近一天
  • 最近一周
  • 最近一个月
  • 最近三个月
  • 最近半年
  • 最近一年
  • word文档 The DevOps Handbook

    OUR CENTRALIZED TELEMETRY INFRASTRUCTURE i. Remove the silos of information – Developers don’t just log what’s interesting to development. Operations don’t just monitor what’s up or down. ii. Modern Monitoring ON UNDESIRED OUTCOMES i. An approach 1. Analyze most severe incident in recent past. 2. Create list of telemetry that could have enabled earlier detection and diagnosis as well as confirmation 3. effective monitoring in place, reliable deployments, and architecturally suitable to fast, frequent change b. Identifies any regulatory or contractual compliance objectives2. Ops engineers consult with teams
    0 码力 | 8 页 | 24.02 KB | 5 月前
    3
  • pdf文档 MITRE Defense Agile Acquisition Guide - Mar 2014

    requires team members to follow disciplined processes that require training, guidance, and culture change. While Agile does impose some rigor, the method does not consist of simply following a set of prescribed testing, certification, product owner approval, and release build. The “definition of done” does not change during a sprint, but should be reviewed periodically and updated as processes improve. “To become counter to those in the long-established defense acquisition enterprise. The Agile model represents a change in the way DoD conducts business, and programs must rethink how they are staffed, organized, and
    0 码力 | 74 页 | 3.57 MB | 5 月前
    3
  • word文档 The DevOps Handbook

    Creating performance testing environments can easily be more complex than the application itself iv. Log performance results and evaluate compared to previous results l. INTEGRATE NON-FUNCTIONAL REQUIREMENTS OUR ANDON CORD WHEN THE DEPLOYMENT PIPELINE BREAKS i. Keep the build in a green state ii. When a change causes the build or automated tests to fail: 1. No new work is allowed to enter the system until deployment 3. Peer reviews iv. 2013 State of DevOps Report – no statistically significant difference in change success rates between organizations where Development deployed code and those where Operations deployed
    0 码力 | 8 页 | 23.08 KB | 5 月前
    3
  • ppt文档 No Silver Bullet – Essence and Accident in Software Engineering

    the most conformableChangeability • The software entity is constantly subject to pressures for change • All successful software gets changed, and successful software survives beyond the normal life security I need… • a Container scanning and monitoring service, and to monitor it more I need… • a Log Aggregation and Search service, but to install it I need… • root access on a bunch of servers, but
    0 码力 | 35 页 | 1.43 MB | 5 月前
    3
  • word文档 Velocity Conference 2015

    GitHub Pull Requests by Ralph Bodenner (New Relic) https://bit.ly/pull-request-your-culture  How you change your process matters  Terms: culture, metaprocess, process, entropy  Actively discourage email: com/devops-web-performance-2015/public/schedule/proceedings [2] YouTube Playlist: https://www.youtube.com/playlist?list=PL055Epbe6d5Y86GSg3nhUH3o_v62FGpCI
    0 码力 | 4 页 | 176.79 KB | 5 月前
    3
  • word文档 The Phoenix Project

    total of nine hours time the seven steps…” Change Control  “We need to tighten up our change controls… what’s preventing us from getting there?”  “That change management tool is impossible to use. There’s boxes for ‘applications affected’ don’t even have what I need. It’s why I’ve stopped even putting in change requests.”  “I have to manually type in hundreds of server names in one of the text boxes. Most to fit in a sixty-four-character text box? What idiot built that form?”  “When my guys put in a change request, they have to wait a lifetime to get approvals, let alone get on the schedule. We have the
    0 码力 | 3 页 | 154.45 KB | 5 月前
    3
  • word文档 The DevOps Handbook

    kick start testing efforts – Part 6: The Technical Practices of Integrating Information Security, Change Management, and Compliance 1. Introduction a. Goal to simultaneously achieve Information Security and recovery v. Protect our deployment pipeline vi. Integrate our deployment activities with our change approval process vii. Reduce reliance on separation of duties 2. Ch. 22 – Information Security Protecting the Deployment Pipeline a. INTEGRATE SECURITY AND COMPLIANCE INTO CHANGE APPROVAL PROCESSES i. Effective change management recognized different risks associated with different types of changes
    0 码力 | 9 页 | 25.13 KB | 5 月前
    3
  • word文档 A Seat at the Table: IT Leadership in the Age of Agility - Part 2

    should make a plan and then stick to it is a terrible idea in an environment of uncertainty and change. It has dominated the IT world because it appears to offer predictability, control, and efficiency hollow and missing needed capabilities.  We want a smooth ball of EA, an EA shaped to facilitate change and reuse, something you can easily roll in any direction you choose. That is its latent value; it based on user feedback is often lower than that of buying a finished product that is hard to change.  The advantages of the agility that can be gained through a flexible, changeable, custom system
    0 码力 | 7 页 | 387.61 KB | 5 月前
    3
  • word文档 The DevOps Handbook

    DEVOPS i. Code and change deployments (thirty times more frequent) ii. Code and change deployment lead time (two hundred times faster) iii. Production deployments (sixty times higher change success rate) in poor flow and poor quality outcomes. This validates our common experience that the larger the change going into production, the more difficult the production errors are to diagnose and fix, and the Critical Mass & Silent Majority 3. Identify the Holdouts ii. Ron van Kemenade, CIO of ING, “Leading change requires courage, especially in corporate envrionments where people are scared and fight you. But
    0 码力 | 8 页 | 22.57 KB | 5 月前
    3
  • word文档 A Seat at the Table - IT Leadership in the Age of Agility

    that we have a way to (try to) control them.  The relationship between uncertainty, risk, and change is far too complicated for such control when delivering IT systems, where complexity is overwhelming changing this paradigm, but IT organizations have not thoroughly absorbed this message. The critical change is that of moving from a plan-driven approach to an Agile approach, based on learning and adapting and also be Agile, which is to say that you cannot strictly adhere to a plan and also facilitate change and organizational responsiveness. It is not a conflict in execution—it is a conflict of values
    0 码力 | 7 页 | 387.48 KB | 5 月前
    3
共 22 条
  • 1
  • 2
  • 3
前往
页
相关搜索词
TheDevOpsHandbookMITREDefenseAgileAcquisitionGuideMar2014NoSilverBulletEssenceandAccidentinSoftwareEngineeringVelocityConference2015PhoenixProjectSeatattheTableITLeadershipAgeofAgilityPart
IT文库
关于我们 文库协议 联系我们 意见反馈 免责声明
本站文档数据由用户上传或本站整理自互联网,不以营利为目的,供所有人免费下载和学习使用。如侵犯您的权益,请联系我们进行删除。
IT文库 ©1024 - 2025 | 站点地图
Powered By MOREDOC AI v3.3.0-beta.70
  • 关注我们的公众号【刻舟求荐】,给您不一样的精彩
    关注我们的公众号【刻舟求荐】,给您不一样的精彩