The DevOps Handbooktypically structured as:1. Standardized Model – where routine and systems govern everything; including strict compliance with budget and schedule 2. Experimental Model – every day every exercise and new piece code2. Dynamic Analysis – tests executed while a program is in operation. Monitor items such as memory, functional behavior, and other elements. Testing from the outside-in 3. Dependency Scanning –0 码力 | 9 页 | 25.13 KB | 5 月前3
MITRE Defense Agile Acquisition Guide - Mar 2014culture often run counter to those in the long-established defense acquisition enterprise. The Agile model represents a change in the way DoD conducts business, and programs must rethink how they are staffed funding models that support an acquisition are structured to support Agile. To succeed, the Agile model depends on strong commitments at all levels of the acquisition process. First, Agile requires dedicated team in addition to the development contactors. Close, dedicated acquisition teams facilitate this model, but it must be further reinforced at the top. Leadership can signal that trust by empowering team0 码力 | 74 页 | 3.57 MB | 5 月前3
A Seat at the Table: IT Leadership in the Age of Agility - Part 2appears to offer predictability, control, and efficiency, the key values of the contractor-control model. But it doesn’t. Requirements: Requirements are a way of controlling the development team by constraining Characteristics of an Agile governance and oversight model: Before we dive into an Agile governance and oversight model, let’s think about what characteristics such a model should have in order to both take advantage0 码力 | 7 页 | 387.61 KB | 5 月前3
A Seat at the Table - IT Leadership in the Age of Agilitydecisions under uncertainty, and then have the courage to face the consequences. In the plan-driven model, quality was easier to understand. We specified what the system should do, and then measured quality that, either. We are constantly making quality decisions, especially in a Continuous Delivery model, as we decide whether the quality of each individual feature is adequate for the feature to be deployed that we have not yet learned to take advantage of, caught up as we are in the contractor-control model of IT. Shadow IT is what happens when the IT organization is unable to meet the needs of a part of0 码力 | 7 页 | 387.48 KB | 5 月前3
DoD CIO Enterprise DevSecOps Reference Design - Summaryemulation of common infrastructure components to achieve consistent and predictable resultConceptual Model DevSecOps LifecycleDevSecOps Pillars DevSecOps EcosystemDevSecOps Software Factory DevSecOps MVP correlated and centralized logs, container security, east/west traffic management, a zero-trust model, a whitelist, Role-Based Access Control (RBAC), continuous monitoring, signature-based continuous0 码力 | 8 页 | 3.38 MB | 5 月前3
Coaching Agile Teamsoutcomes • Take it to the team • Be a mirror • Master your words & face • Let there be silence • Model being outrageous • Let the team fail • Be their biggest fan Lyssa Adkins Self-Assess FirstSelf0 码力 | 15 页 | 608.54 KB | 5 月前3
Cynefin - Agile for Defenseexperiences that influence us in ways we don’t understand Developed by David SnowdenFramework A model tries to represent reality Framework is a way of looking at reality Not a modelCategorization0 码力 | 17 页 | 3.75 MB | 5 月前3
The DevOps Handbookinto Our Daily Work a. INTRODUCTION i. Jez Humble, “The most inefficient way to test a business model or product idea is to build the complete product to see whether the predicted demand actually exists0 码力 | 8 页 | 24.02 KB | 5 月前3
The DevOps Handbookright” 2. Type 2 – System of Engagement – “Doing it fast” ii. DevOps helps reject the bi-modal IT model and lets you do both c. START WITH THE MOST SYMPATHETIC AND INNOVATION GROUPS i. Chrossing the Chasm0 码力 | 8 页 | 22.57 KB | 5 月前3
共 9 条
- 1













