 The DevOps Handbookdependencies – eliminates “worked on my machine” 3. Package the application to enable repeatable installation and configuration into an environment 4. Environments can be more production-like in a consistent Creating performance testing environments can easily be more complex than the application itself iv. Log performance results and evaluate compared to previous results l. INTEGRATE NON-FUNCTIONAL REQUIREMENTS0 码力 | 8 页 | 23.08 KB | 5 月前3 The DevOps Handbookdependencies – eliminates “worked on my machine” 3. Package the application to enable repeatable installation and configuration into an environment 4. Environments can be more production-like in a consistent Creating performance testing environments can easily be more complex than the application itself iv. Log performance results and evaluate compared to previous results l. INTEGRATE NON-FUNCTIONAL REQUIREMENTS0 码力 | 8 页 | 23.08 KB | 5 月前3
 MITRE Defense Agile Acquisition Guide - Mar 2014programs with software costs over $15M and with COTS or Government off-the-Shelf (GOTS) hardware installation or technology refresh. It does not apply to business systems or IS embedded in weapon systems [user role], I want to [goal], so I can [reason].24 For example, “As a registered user, I want to log in so I can access subscriber-only content.” User stories should have the following characteristics:0 码力 | 74 页 | 3.57 MB | 5 月前3 MITRE Defense Agile Acquisition Guide - Mar 2014programs with software costs over $15M and with COTS or Government off-the-Shelf (GOTS) hardware installation or technology refresh. It does not apply to business systems or IS embedded in weapon systems [user role], I want to [goal], so I can [reason].24 For example, “As a registered user, I want to log in so I can access subscriber-only content.” User stories should have the following characteristics:0 码力 | 74 页 | 3.57 MB | 5 月前3
 DoD CIO Enterprise DevSecOps Reference Design - Summaryrather than blacklisting. Services that support the security sidecar include: 1. Program-specific Log Storage and Retrieval Service 2. Service Mesh 3. Program-specific artifact repository 4. Runtime0 码力 | 8 页 | 3.38 MB | 5 月前3 DoD CIO Enterprise DevSecOps Reference Design - Summaryrather than blacklisting. Services that support the security sidecar include: 1. Program-specific Log Storage and Retrieval Service 2. Service Mesh 3. Program-specific artifact repository 4. Runtime0 码力 | 8 页 | 3.38 MB | 5 月前3
 No Silver Bullet – Essence and Accident in Software Engineeringsecurity I need… • a Container scanning and monitoring service, and to monitor it more I need… • a Log Aggregation and Search service, but to install it I need… • root access on a bunch of servers, but0 码力 | 35 页 | 1.43 MB | 5 月前3 No Silver Bullet – Essence and Accident in Software Engineeringsecurity I need… • a Container scanning and monitoring service, and to monitor it more I need… • a Log Aggregation and Search service, but to install it I need… • root access on a bunch of servers, but0 码力 | 35 页 | 1.43 MB | 5 月前3
 The DevOps HandbookOUR CENTRALIZED TELEMETRY INFRASTRUCTURE i. Remove the silos of information – Developers don’t just log what’s interesting to development. Operations don’t just monitor what’s up or down. ii. Modern Monitoring0 码力 | 8 页 | 24.02 KB | 5 月前3 The DevOps HandbookOUR CENTRALIZED TELEMETRY INFRASTRUCTURE i. Remove the silos of information – Developers don’t just log what’s interesting to development. Operations don’t just monitor what’s up or down. ii. Modern Monitoring0 码力 | 8 页 | 24.02 KB | 5 月前3
共 5 条
- 1














