积分充值
 首页
前端开发
AngularDartElectronFlutterHTML/CSSJavaScriptReactSvelteTypeScriptVue.js构建工具
后端开发
.NetC#C++C语言DenoffmpegGoIdrisJavaJuliaKotlinLeanMakefilenimNode.jsPascalPHPPythonRISC-VRubyRustSwiftUML其它语言区块链开发测试微服务敏捷开发架构设计汇编语言
数据库
Apache DorisApache HBaseCassandraClickHouseFirebirdGreenplumMongoDBMySQLPieCloudDBPostgreSQLRedisSQLSQLiteTiDBVitess数据库中间件数据库工具数据库设计
系统运维
AndroidDevOpshttpdJenkinsLinuxPrometheusTraefikZabbix存储网络与安全
云计算&大数据
Apache APISIXApache FlinkApache KarafApache KyuubiApache OzonedaprDockerHadoopHarborIstioKubernetesOpenShiftPandasrancherRocketMQServerlessService MeshVirtualBoxVMWare云原生CNCF机器学习边缘计算
综合其他
BlenderGIMPKiCadKritaWeblate产品与服务人工智能亿图数据可视化版本控制笔试面试
文库资料
前端
AngularAnt DesignBabelBootstrapChart.jsCSS3EchartsElectronHighchartsHTML/CSSHTML5JavaScriptJerryScriptJestReactSassTypeScriptVue前端工具小程序
后端
.NETApacheC/C++C#CMakeCrystalDartDenoDjangoDubboErlangFastifyFlaskGinGoGoFrameGuzzleIrisJavaJuliaLispLLVMLuaMatplotlibMicronautnimNode.jsPerlPHPPythonQtRPCRubyRustR语言ScalaShellVlangwasmYewZephirZig算法
移动端
AndroidAPP工具FlutterFramework7HarmonyHippyIoniciOSkotlinNativeObject-CPWAReactSwiftuni-appWeex
数据库
ApacheArangoDBCassandraClickHouseCouchDBCrateDBDB2DocumentDBDorisDragonflyDBEdgeDBetcdFirebirdGaussDBGraphGreenPlumHStreamDBHugeGraphimmudbIndexedDBInfluxDBIoTDBKey-ValueKitDBLevelDBM3DBMatrixOneMilvusMongoDBMySQLNavicatNebulaNewSQLNoSQLOceanBaseOpenTSDBOracleOrientDBPostgreSQLPrestoDBQuestDBRedisRocksDBSequoiaDBServerSkytableSQLSQLiteTiDBTiKVTimescaleDBYugabyteDB关系型数据库数据库数据库ORM数据库中间件数据库工具时序数据库
云计算&大数据
ActiveMQAerakiAgentAlluxioAntreaApacheApache APISIXAPISIXBFEBitBookKeeperChaosChoerodonCiliumCloudStackConsulDaprDataEaseDC/OSDockerDrillDruidElasticJobElasticSearchEnvoyErdaFlinkFluentGrafanaHadoopHarborHelmHudiInLongKafkaKnativeKongKubeCubeKubeEdgeKubeflowKubeOperatorKubernetesKubeSphereKubeVelaKumaKylinLibcloudLinkerdLonghornMeiliSearchMeshNacosNATSOKDOpenOpenEBSOpenKruiseOpenPitrixOpenSearchOpenStackOpenTracingOzonePaddlePaddlePolicyPulsarPyTorchRainbondRancherRediSearchScikit-learnServerlessShardingSphereShenYuSparkStormSupersetXuperChainZadig云原生CNCF人工智能区块链数据挖掘机器学习深度学习算法工程边缘计算
UI&美工&设计
BlenderKritaSketchUI设计
网络&系统&运维
AnsibleApacheAWKCeleryCephCI/CDCurveDevOpsGoCDHAProxyIstioJenkinsJumpServerLinuxMacNginxOpenRestyPrometheusServertraefikTrafficUnixWindowsZabbixZipkin安全防护系统内核网络运维监控
综合其它
文章资讯
 上传文档  发布文章  登录账户
IT文库
  • 综合
  • 文档
  • 文章

无数据

分类

全部系统运维(15)网络与安全(15)

语言

全部英语(13)中文(简体)(1)

格式

全部DOC文档 DOC(8)PDF文档 PDF(7)
 
本次搜索耗时 0.020 秒,为您找到相关结果约 15 个.
  • 全部
  • 系统运维
  • 网络与安全
  • 全部
  • 英语
  • 中文(简体)
  • 全部
  • DOC文档 DOC
  • PDF文档 PDF
  • 默认排序
  • 最新排序
  • 页数排序
  • 大小排序
  • 全部时间
  • 最近一天
  • 最近一周
  • 最近一个月
  • 最近三个月
  • 最近半年
  • 最近一年
  • pdf文档 MITRE Defense Agile Acquisition Guide - Mar 2014

    technologically advanced. That is the force for the future.” - Secretary Panetta, Defense Security Review, 5 Jan 12iii Foreword Department of Defense (DoD) program managers and executives have struggled for .............................................................................................. 8 5 Agile Teams ...................................................................................... the stories into tasks. Typically, the scrum master and development team manage the sprint backlog.5 The scope of a sprint, unlike that of a release, is locked. During sprint execution, the development
    0 码力 | 74 页 | 3.57 MB | 5 月前
    3
  • word文档 The DevOps Handbook

    The DevOps Handbook – Parts 5 & 6 – Part 5: The Third Way – The Technical Practices of Continual Learning and Experimentation; 1. Introduction a. Goal – practices to enable learning as quickly, frequently humans can decide to take action or not, and that the judgment of those decisions lies in hindsight 5. Propose countermeasures to prevent a similar accident from happening in the future and ensure these identified the problem 3. People who responded to the problem 4. People who diagnosed the problem 5. People who were affected by the problem 6. Anyone else who is interested in attending the meeting
    0 码力 | 9 页 | 25.13 KB | 5 月前
    3
  • word文档 The DevOps Handbook

    dependencies 2. Environment scripts & creation tools 3. DB scripts and reference data 4. Containers 5. Automated tests 6. Project artifacts – documentation, procedures, etc. 7. Application configuration the lifecycle. Downward spiral of pain b. HP LaserJet Firmware –i. Before CI: 2 releases per year. 5% of effort supporting new features, 20% on detailed planning, 25% on porting code amongst branches higher throughput and better stability, and even higher job satisfaction and lower rates of burnout. 5. Ch. 12 Automate and Enable Low-Risk Releases a. Just like we reduce batch size and increase frequency
    0 码力 | 8 页 | 23.08 KB | 5 月前
    3
  • pdf文档 The Goal - A Process of Ongoing Improvement

    of the constraint) STEP 4 ELEVATE the system’s constraint (Bringing back old machines) STEP 5 If, in a previous step, a constraint has been broken go back to Step 1Match Game Need: Dice Box If the roll of the die is a 4, 5, or 6 then record - respectively - a gain of .5, 1.5, or 2.5. And if the roll is a 1, 2, or 3, then record a loss of -2.5, -1.5, or -.5. The deviations have to be cumulative
    0 码力 | 6 页 | 100.81 KB | 5 月前
    3
  • word文档 The DevOps Handbook

    and will likely trigger an alert 4. Error – error conditions such as API failures, internal issues 5. Fatal – forces a termination iv. Examples of potentially significant events (Gartner’s GTP Security data access 3. System and application changes, especially privileged changes 4. Data changes (CRUD) 5. Invalid input, possible malicious injections or threats 6. Resources (RAM, disk, CPU, bandwidth, and has a service handback mechanism to the development team when production services become fragile 5. Ch. 17 – Integrate Hypothesis-Driven Development and A/B Testing into Our Daily Work a. INTRODUCTION
    0 码力 | 8 页 | 24.02 KB | 5 月前
    3
  • word文档 DoD CIO Enterprise DevSecOps Reference Design - Summary

    also be used to send notifications when there is anomalous behavior. 4. Vulnerability Management 5. A service mesh proxy to connect to the service mesh 6. Zero Trust down to the container level. Program-specific artifact repository 4. Runtime Behavior Analysis Artificial Intelligence (AI) service 5. DCAR for the hardened containers 6. Common Vulnerabilities and Exposures (CVE)Service / host-based
    0 码力 | 8 页 | 3.38 MB | 5 月前
    3
  • pdf文档 Topic Throwback Vote Tally

    Mark Roth Release It (Agile Book Review!) 1 Ray Page Release Planning 2 Darin Plum Agile Coaching 5 Nick Wenner Clean Coder (book review) 2 Josh Sagucio Collaborative Work Environments 3 Scott Grimes Sep 2014 Oct 2014 Nov 2014 Dec 2014Speaker Topic Nov 2015 Vote Tally Darin Plum Agile Coaching 5 Shawn Stumme Continuous Delivery 4 Mike Ballou Pomodoro Technique 4 Mark Staroska Story Points 4
    0 码力 | 2 页 | 132.33 KB | 5 月前
    3
  • word文档 The DevOps Handbook

    iv. Mean time to restore service (168 times faster) 4. An Introduction to The DevOps Handbook xxi 5. PART I—THE THREE WAYS 1 a. Introduction i. THE LEAN MOVEMENT 1. manufacturing lead time required step? g. What is your expected outcome? h. When can we check? 6. PART II—WHERE TO START 47 7. Ch. 5 Selecting Which Value Stream to Start With 51 a. GREENFIELD vs BROWNFIELD SERVICES i. DevOps is not
    0 码力 | 8 页 | 22.57 KB | 5 月前
    3
  • pdf文档 Flashcat 让监控分析变简单,Flashcat产品技术交流

    处理,缩短了整个故障处理 的时间。 六分科技: 基于虚拟参考站技术原理,依托在全国⾃建的约3000个CORS基站,⾃研终端RTK算法与组合 导航算法,以“⽹-云-端”⼀体化解决⽅案为海量⽤户提供5系统16频点、全天候、实时厘⽶级和 亚⽶级的⾼精度定位服务。公司⾼精度定位服务已覆盖智能驾驶、共享出⾏、精准农业、测量 测绘、智慧城市、⼤众应⽤等多个领域。 北京快猫星云科技有限公司 北京快猫星云科技有限公司 3. 缺乏对重要故障场景的应急预案的梳理和演练 效果: 1. 通过落地Flashcat平台,公司A级产品线北极星指标监控实现了全覆盖,P3级 及以上故障北极星监控发现率为100%,MTTI控制在5分钟以内。真正做到了先 于⽤户发现问题,让故障处理变被动为主动。 。 2. 故障定位能⼒建设也已取得重要进展,我们和业务⼀起梳理了公司A级产品线 核⼼主流程依赖的接⼝和模块,并将梳理结果落地到Flashcat灭⽕图系统,并
    0 码力 | 43 页 | 6.54 MB | 1 年前
    3
  • pdf文档 HW弹药库之红队作战⼿册

    之前的版本 fileserver存在 PUT任意写 CVE-2015-5254 Apache Solr CVE-2017-12629 CVE-2019-0193 [ Apache Solr 5.x - 8.2.0 ] Apache Zookeeper 未授权访问,敏感信息泄露 Apache Shiro 反序列化 fastjson <= 1.2.47 反序列化利⽤ 针对各类 Xampp 宝塔 PhpStudy ...... 针对各类开源程序的 已知 Nday 漏洞利⽤ Dedecms 后台弱⼝令,系列已知nday漏洞利⽤ thinkphp 5.x 后台弱⼝令,系列已知nday漏洞利⽤ phpcms 后台弱⼝令,系列已知nday漏洞利⽤ ecshop 后台弱⼝令,系列已知nday漏洞利⽤ Metinfo 后台弱⼝令
    0 码力 | 19 页 | 1.20 MB | 1 年前
    3
共 15 条
  • 1
  • 2
前往
页
相关搜索词
MITREDefenseAgileAcquisitionGuideMar2014TheDevOpsHandbookGoalProcessofOngoingImprovementDoDCIOEnterpriseDevSecOpsReferenceDesignSummaryTopicThrowbackVoteTallyFlashcat监控分析简单产品技术交流HW弹药药库弹药库红队作战
IT文库
关于我们 文库协议 联系我们 意见反馈 免责声明
本站文档数据由用户上传或本站整理自互联网,不以营利为目的,供所有人免费下载和学习使用。如侵犯您的权益,请联系我们进行删除。
IT文库 ©1024 - 2025 | 站点地图
Powered By MOREDOC AI v3.3.0-beta.70
  • 关注我们的公众号【刻舟求荐】,给您不一样的精彩
    关注我们的公众号【刻舟求荐】,给您不一样的精彩