 Pomodoro Techniqueof behavioral science examining connections between satisfaction and daily activities. A flow state ensues when one is engaged in self-controlled, goal-related, meaningful actions. Data regarding flow0 码力 | 3 页 | 289.16 KB | 5 月前3 Pomodoro Techniqueof behavioral science examining connections between satisfaction and daily activities. A flow state ensues when one is engaged in self-controlled, goal-related, meaningful actions. Data regarding flow0 码力 | 3 页 | 289.16 KB | 5 月前3
 A Seat at the Table - IT Leadership in the Age of Agilitystewarding three critical assets: the Enterprise Architecture asset, the IT people asset, and the data asset. These three assets represent the capabilities of the company and its ability to address the Homeland Security), CIO of Intrax, and CEO of Auctiva. He has an MBA from Wharton, a BS in Computer Science from Yale, and an MA in Philosophy from Yale. Mark and Mike first met at the 2019 AWS Public Sector0 码力 | 7 页 | 387.48 KB | 5 月前3 A Seat at the Table - IT Leadership in the Age of Agilitystewarding three critical assets: the Enterprise Architecture asset, the IT people asset, and the data asset. These three assets represent the capabilities of the company and its ability to address the Homeland Security), CIO of Intrax, and CEO of Auctiva. He has an MBA from Wharton, a BS in Computer Science from Yale, and an MA in Philosophy from Yale. Mark and Mike first met at the 2019 AWS Public Sector0 码力 | 7 页 | 387.48 KB | 5 月前3
 MITRE Defense Agile Acquisition Guide - Mar 2014small-medium-large as units for assigning story points. Over time, as the teams accumulate performance data, this iterative and incremental4 process improves accuracy in allocating points. Point values are typically is the contractor team of software developers, including software and security engineers, data specialists, testers, quality assurance, and configuration managers. Ideally these participants Six-Month Release Structure 1 Defense Science Board Report on IT Acquisition, Mar 200917 An alternative structure ( Figure 10) is to construct0 码力 | 74 页 | 3.57 MB | 5 月前3 MITRE Defense Agile Acquisition Guide - Mar 2014small-medium-large as units for assigning story points. Over time, as the teams accumulate performance data, this iterative and incremental4 process improves accuracy in allocating points. Point values are typically is the contractor team of software developers, including software and security engineers, data specialists, testers, quality assurance, and configuration managers. Ideally these participants Six-Month Release Structure 1 Defense Science Board Report on IT Acquisition, Mar 200917 An alternative structure ( Figure 10) is to construct0 码力 | 74 页 | 3.57 MB | 5 月前3
 The DevOps Handbookproblem-solving. ii. Telemetry – An automated communications process by which measurements and other data are collected at remote points and are subsequently transmitted to receiving equipment for monitoring make tracking anything easy…We enable engineers to track what they need to track, at the drop of a hat, without requiring time-sucking configuration changes or complicated processes.” iv. 2015 State of development. Operations don’t just monitor what’s up or down. ii. Modern Monitoring architecture 1. Data Collection at business logic, application, & environments layer a. Events, logs, & metrics b. Common0 码力 | 8 页 | 24.02 KB | 5 月前3 The DevOps Handbookproblem-solving. ii. Telemetry – An automated communications process by which measurements and other data are collected at remote points and are subsequently transmitted to receiving equipment for monitoring make tracking anything easy…We enable engineers to track what they need to track, at the drop of a hat, without requiring time-sucking configuration changes or complicated processes.” iv. 2015 State of development. Operations don’t just monitor what’s up or down. ii. Modern Monitoring architecture 1. Data Collection at business logic, application, & environments layer a. Events, logs, & metrics b. Common0 码力 | 8 页 | 24.02 KB | 5 月前3
 A Seat at the Table - IT Leadership in the Age of AgilityHomeland Security), CIO of Intrax, and CEO of Auctiva. He has an MBA from Wharton, a BS in Computer Science from Yale, and an MA in Philosophy from Yale. Mark and Mike first met at the 2019 AWS Public Sector0 码力 | 4 页 | 379.23 KB | 5 月前3 A Seat at the Table - IT Leadership in the Age of AgilityHomeland Security), CIO of Intrax, and CEO of Auctiva. He has an MBA from Wharton, a BS in Computer Science from Yale, and an MA in Philosophy from Yale. Mark and Mike first met at the 2019 AWS Public Sector0 码力 | 4 页 | 379.23 KB | 5 月前3
 A Seat at the Table: IT Leadership in the Age of Agility - Part 2Homeland Security), CIO of Intrax, and CEO of Auctiva. He has an MBA from Wharton, a BS in Computer Science from Yale, and an MA in Philosophy from Yale. Mark and Mike first met at the 2019 AWS Public Sector0 码力 | 7 页 | 387.61 KB | 5 月前3 A Seat at the Table: IT Leadership in the Age of Agility - Part 2Homeland Security), CIO of Intrax, and CEO of Auctiva. He has an MBA from Wharton, a BS in Computer Science from Yale, and an MA in Philosophy from Yale. Mark and Mike first met at the 2019 AWS Public Sector0 码力 | 7 页 | 387.61 KB | 5 月前3
 Cynefin - Agile for Defenseproceeds the data • Put the data in • Fast to use • Can lose subtle contexts • Good for exploitation; not for exploration & change Sense-making Frameworks Sense-making framework - the data proceeds proceeds the framework • Capture the data • Patterns emerge from the data • Provides context and awareness • Good for non-trivial domainsObvious • Cause & Effect Relationships exist • Relationships0 码力 | 17 页 | 3.75 MB | 5 月前3 Cynefin - Agile for Defenseproceeds the data • Put the data in • Fast to use • Can lose subtle contexts • Good for exploitation; not for exploration & change Sense-making Frameworks Sense-making framework - the data proceeds proceeds the framework • Capture the data • Patterns emerge from the data • Provides context and awareness • Good for non-trivial domainsObvious • Cause & Effect Relationships exist • Relationships0 码力 | 17 页 | 3.75 MB | 5 月前3
 The DevOps HandbookOperations to improve outcomes 2. Ch. 9 – Create the Foundations of Our Deployment Pipeline a. Enterprise Data Warehouse program by Em Campbell-Pretty - $200M, All streams of work were significantly behind schedule Application code & dependencies 2. Environment scripts & creation tools 3. DB scripts and reference data 4. Containers 5. Automated tests 6. Project artifacts – documentation, procedures, etc. 7. Application Smoke testing our deployments – test connections to supporting services and systems, run sample data/transaction tests, fail deployment if needed 3. Ensure we maintain consistent environments – continually0 码力 | 8 页 | 23.08 KB | 5 月前3 The DevOps HandbookOperations to improve outcomes 2. Ch. 9 – Create the Foundations of Our Deployment Pipeline a. Enterprise Data Warehouse program by Em Campbell-Pretty - $200M, All streams of work were significantly behind schedule Application code & dependencies 2. Environment scripts & creation tools 3. DB scripts and reference data 4. Containers 5. Automated tests 6. Project artifacts – documentation, procedures, etc. 7. Application Smoke testing our deployments – test connections to supporting services and systems, run sample data/transaction tests, fail deployment if needed 3. Ensure we maintain consistent environments – continually0 码力 | 8 页 | 23.08 KB | 5 月前3
 The DevOps Handbookenvironment and ensuring service levels are met v. Infosec – team responsible for securing systems and data vi. Release Managers – the people responsible for coordinating the production deployment processes PLANNING HORIZONS SHORT i. Act like a startup, strive to generate measurable improvement or actionable data within weeks f. RESERVE 20% OF CYCLES FOR NON-FUNCTIONAL REQUIREMENTS AND REDUCING TECHNICAL DEBT0 码力 | 8 页 | 22.57 KB | 5 月前3 The DevOps Handbookenvironment and ensuring service levels are met v. Infosec – team responsible for securing systems and data vi. Release Managers – the people responsible for coordinating the production deployment processes PLANNING HORIZONS SHORT i. Act like a startup, strive to generate measurable improvement or actionable data within weeks f. RESERVE 20% OF CYCLES FOR NON-FUNCTIONAL REQUIREMENTS AND REDUCING TECHNICAL DEBT0 码力 | 8 页 | 22.57 KB | 5 月前3
 The DevOps Handbookknown vulnerabilities and consolidate multiple versions of the same library iii. 2014 Verizon PCI Data Breach Investigation Report – studies over 85K cardholder breaches. 10 vulnerabilities accounted environments with infrastructure-as-code and auto- scaling. Must create alternatives methods of providing the data to show auditors controls are in place and operating. 1. Work closely to identify the evidence needed0 码力 | 9 页 | 25.13 KB | 5 月前3 The DevOps Handbookknown vulnerabilities and consolidate multiple versions of the same library iii. 2014 Verizon PCI Data Breach Investigation Report – studies over 85K cardholder breaches. 10 vulnerabilities accounted environments with infrastructure-as-code and auto- scaling. Must create alternatives methods of providing the data to show auditors controls are in place and operating. 1. Work closely to identify the evidence needed0 码力 | 9 页 | 25.13 KB | 5 月前3
共 12 条
- 1
- 2














 
 