MITRE Defense Agile Acquisition Guide - Mar 2014technologically advanced. That is the force for the future.” - Secretary Panetta, Defense Security Review, 5 Jan 12iii Foreword Department of Defense (DoD) program managers and executives have struggled for .............................................................................................. 8 5 Agile Teams ...................................................................................... the stories into tasks. Typically, the scrum master and development team manage the sprint backlog.5 The scope of a sprint, unlike that of a release, is locked. During sprint execution, the development0 码力 | 74 页 | 3.57 MB | 5 月前3
The DevOps HandbookThe DevOps Handbook – Parts 5 & 6 – Part 5: The Third Way – The Technical Practices of Continual Learning and Experimentation; 1. Introduction a. Goal – practices to enable learning as quickly, frequently humans can decide to take action or not, and that the judgment of those decisions lies in hindsight 5. Propose countermeasures to prevent a similar accident from happening in the future and ensure these identified the problem 3. People who responded to the problem 4. People who diagnosed the problem 5. People who were affected by the problem 6. Anyone else who is interested in attending the meeting0 码力 | 9 页 | 25.13 KB | 5 月前3
The DevOps Handbookdependencies 2. Environment scripts & creation tools 3. DB scripts and reference data 4. Containers 5. Automated tests 6. Project artifacts – documentation, procedures, etc. 7. Application configuration the lifecycle. Downward spiral of pain b. HP LaserJet Firmware –i. Before CI: 2 releases per year. 5% of effort supporting new features, 20% on detailed planning, 25% on porting code amongst branches higher throughput and better stability, and even higher job satisfaction and lower rates of burnout. 5. Ch. 12 Automate and Enable Low-Risk Releases a. Just like we reduce batch size and increase frequency0 码力 | 8 页 | 23.08 KB | 5 月前3
The Goal - A Process of Ongoing Improvementof the constraint) STEP 4 ELEVATE the system’s constraint (Bringing back old machines) STEP 5 If, in a previous step, a constraint has been broken go back to Step 1Match Game Need: Dice Box If the roll of the die is a 4, 5, or 6 then record - respectively - a gain of .5, 1.5, or 2.5. And if the roll is a 1, 2, or 3, then record a loss of -2.5, -1.5, or -.5. The deviations have to be cumulative0 码力 | 6 页 | 100.81 KB | 5 月前3
The DevOps Handbookand will likely trigger an alert 4. Error – error conditions such as API failures, internal issues 5. Fatal – forces a termination iv. Examples of potentially significant events (Gartner’s GTP Security data access 3. System and application changes, especially privileged changes 4. Data changes (CRUD) 5. Invalid input, possible malicious injections or threats 6. Resources (RAM, disk, CPU, bandwidth, and has a service handback mechanism to the development team when production services become fragile 5. Ch. 17 – Integrate Hypothesis-Driven Development and A/B Testing into Our Daily Work a. INTRODUCTION0 码力 | 8 页 | 24.02 KB | 5 月前3
DoD CIO Enterprise DevSecOps Reference Design - Summaryalso be used to send notifications when there is anomalous behavior. 4. Vulnerability Management 5. A service mesh proxy to connect to the service mesh 6. Zero Trust down to the container level. Program-specific artifact repository 4. Runtime Behavior Analysis Artificial Intelligence (AI) service 5. DCAR for the hardened containers 6. Common Vulnerabilities and Exposures (CVE)Service / host-based0 码力 | 8 页 | 3.38 MB | 5 月前3
Topic Throwback Vote TallyMark Roth Release It (Agile Book Review!) 1 Ray Page Release Planning 2 Darin Plum Agile Coaching 5 Nick Wenner Clean Coder (book review) 2 Josh Sagucio Collaborative Work Environments 3 Scott Grimes Sep 2014 Oct 2014 Nov 2014 Dec 2014Speaker Topic Nov 2015 Vote Tally Darin Plum Agile Coaching 5 Shawn Stumme Continuous Delivery 4 Mike Ballou Pomodoro Technique 4 Mark Staroska Story Points 40 码力 | 2 页 | 132.33 KB | 5 月前3
The DevOps Handbookiv. Mean time to restore service (168 times faster) 4. An Introduction to The DevOps Handbook xxi 5. PART I—THE THREE WAYS 1 a. Introduction i. THE LEAN MOVEMENT 1. manufacturing lead time required step? g. What is your expected outcome? h. When can we check? 6. PART II—WHERE TO START 47 7. Ch. 5 Selecting Which Value Stream to Start With 51 a. GREENFIELD vs BROWNFIELD SERVICES i. DevOps is not0 码力 | 8 页 | 22.57 KB | 5 月前3
Flashcat 让监控分析变简单,Flashcat产品技术交流处理,缩短了整个故障处理 的时间。 六分科技: 基于虚拟参考站技术原理,依托在全国⾃建的约3000个CORS基站,⾃研终端RTK算法与组合 导航算法,以“⽹-云-端”⼀体化解决⽅案为海量⽤户提供5系统16频点、全天候、实时厘⽶级和 亚⽶级的⾼精度定位服务。公司⾼精度定位服务已覆盖智能驾驶、共享出⾏、精准农业、测量 测绘、智慧城市、⼤众应⽤等多个领域。 北京快猫星云科技有限公司 北京快猫星云科技有限公司 3. 缺乏对重要故障场景的应急预案的梳理和演练 效果: 1. 通过落地Flashcat平台,公司A级产品线北极星指标监控实现了全覆盖,P3级 及以上故障北极星监控发现率为100%,MTTI控制在5分钟以内。真正做到了先 于⽤户发现问题,让故障处理变被动为主动。 。 2. 故障定位能⼒建设也已取得重要进展,我们和业务⼀起梳理了公司A级产品线 核⼼主流程依赖的接⼝和模块,并将梳理结果落地到Flashcat灭⽕图系统,并0 码力 | 43 页 | 6.54 MB | 1 年前3
HW弹药库之红队作战⼿册之前的版本 fileserver存在 PUT任意写 CVE-2015-5254 Apache Solr CVE-2017-12629 CVE-2019-0193 [ Apache Solr 5.x - 8.2.0 ] Apache Zookeeper 未授权访问,敏感信息泄露 Apache Shiro 反序列化 fastjson <= 1.2.47 反序列化利⽤ 针对各类 Xampp 宝塔 PhpStudy ...... 针对各类开源程序的 已知 Nday 漏洞利⽤ Dedecms 后台弱⼝令,系列已知nday漏洞利⽤ thinkphp 5.x 后台弱⼝令,系列已知nday漏洞利⽤ phpcms 后台弱⼝令,系列已知nday漏洞利⽤ ecshop 后台弱⼝令,系列已知nday漏洞利⽤ Metinfo 后台弱⼝令0 码力 | 19 页 | 1.20 MB | 1 年前3
共 15 条
- 1
- 2













