MITRE Defense Agile Acquisition Guide - Mar 2014monthly. These frequent iterations effectively measure progress, reduce technical and programmatic risk, and respond to feedback and changes more quickly than traditional methods. Programs can adopt understand and appreciate each stakeholder’s risk tolerance and legal responsibilities, and provide clear and compelling evidence that an Agile approach can reduce risk. Application of Agile practices may appear appear at first glance to encroach upon traditional DoD risk reduction practices, which are optimized for weapon systems acquisition. These traditional methods most often involve extensive analysis, planning0 码力 | 74 页 | 3.57 MB | 5 月前3
A Seat at the Table - IT Leadership in the Age of Agilityobjectives. When combined with Agile and Lean practices, this approach can focus IT planning, reduce risk, eliminate waste, and provide a supportive environment for teams engaged in creating value. If you month, you can find the handout for Part 2 on the Agile4Defense GitHub page at: https://git.io/JeaO2 Risk The presence of uncertainty is the simple reason why Agile approaches work better than plan-driven business value by adopting an intelligent attitude toward risk. Risk is the chance of a negative impact resulting from uncertainty. We can reduce risk—often at a cost —but there is generally no way to eliminate0 码力 | 7 页 | 387.48 KB | 5 月前3
A Seat at the Table: IT Leadership in the Age of Agility - Part 2of custom-developing systems that preserve many of the advantages of buying off the shelf. The risk of developing a system incrementally and altering it based on user feedback is often lower than that away by frameworks and design patterns. Incremental delivery and staged investments reduce cost and risk. Custom code is almost not custom these days. A developer incorporates open source frameworks user-centric way and match the enterprise’s needs precisely. Risk is low, because the team is constantly adjusting. Option 2: Compare that to the risk of buying a vendor’s product, where the investment is0 码力 | 7 页 | 387.61 KB | 5 月前3
The DevOps Handbookinformation is evaluated and debated; more similar to R&D lab. f. REDEFINE FAILURE AND ENCOURAGE CALCULATED RISK-TAKING i. Leaders reinforce the culture through their actions ii. Roy Rappaport, Netflix – a single guidance as early as possible ii. Awareness and involvement provides better business context for risk-based decisions d. INTEGRATE SECURITY INTO DEFECT TRACKING AND POST-MORTEMS i. Track all open security the 10 exploits were over 10 years old. i. ENSURE SECURITY OF THE ENVIRONMENT i. Once a hardened, risk-reduced environment is put in place, it must be monitored to ensure it stays in known good states0 码力 | 9 页 | 25.13 KB | 5 月前3
A Seat at the Table - IT Leadership in the Age of Agilitysubstitute for the outdated project view in my vision for what IT leadership must become. Uncertainty and Risk: Third, underlying all of these changes – all of the problems with plan-drive approaches, all of confusion about how to deal with uncertainty and risk. What I call the “contractor-control paradigm” – is really about trying to make risk go away, when risk really the essence of what we do. Complex Adaptive practices, this approach can focus IT planning, reduce risk, eliminate waste, and provide a supportive environment for teams engaged in creating value. Risk: The presence of uncertainty is the simple reason0 码力 | 4 页 | 379.23 KB | 5 月前3
The DevOps Handbook& practicing continuous integration & testing iv. Automating, enabling, and architecting for low-risk releases b. Integrating objectives of QA & Operations to improve outcomes 2. Ch. 9 – Create the and even higher job satisfaction and lower rates of burnout. 5. Ch. 12 Automate and Enable Low-Risk Releases a. Just like we reduce batch size and increase frequency of feedback during development control needs separate Operations groups have emerged ii. Widely accepted practice to “reduce the risk of production outages and fraud” iii. DevOps goal – shift reliance from separate groups to other0 码力 | 8 页 | 23.08 KB | 5 月前3
The DevOps Handbook– forces a termination iv. Examples of potentially significant events (Gartner’s GTP Security & Risk Management group) 1. Authentication/authorization decisions 2. System and data access 3. System Process to Increase Quality of Our Current Work a. Goal – enable Development and Operations to reduce risk before production changes are made. Keep the reviews and approvals close to those whom are knowledgeable control failure – seems valid since we can imagine better control practices could have detected the risk earlier prevent the issue or could have taken steps to detect and recover faster 2. Accident due0 码力 | 8 页 | 24.02 KB | 5 月前3
Trends Artificial Intelligence
Modernization (2020 Letter to Shareholders: ‘We already extensively use AI, quite successfully, in fraud and risk, marketing, prospecting, idea generation, operations, trading and in other areas—to great effect, conditions… …Any technological advance which requires huge capital expenditure always runs a real risk of disappointing returns in the early years, even if it is ultimately successful... …Any technology expenditure and requires returns to be earned over an extended period is always going to be a high-risk undertaking – unless, that is, there is some form of protection against competition... …The winners0 码力 | 340 页 | 12.14 MB | 4 月前3
OpenAI - AI in the Enterprisetimelines from weeks to hours. The impact was felt across many disciplines and departments: The Credit Risk team Uses ChatGPT to determine creditworthiness faster and more accurately. The Legal team Uses analysis of NPS surveys. 16 AI in the EnterpriseAnd the wins continue to spread across Marketing, Risk Management, Operations, and beyond. All because they got AI in the hands of the people who know how0 码力 | 25 页 | 9.48 MB | 5 月前3
Tornado 6.5 Documentationnetworks. Appropriate host patterns must be used (instead of the default of r'.*') to prevent this risk. The default_host argument must not be used in applications that may be vulnerable to DNS rebinding on ExceptionStackContext to handle errors and prevent leaked connec- tions. In order to avoid the risk of silently introducing subtle leaks (and to consolidate all of Tornado’s interfaces behind the coroutine as they do for most other browser-initiated communications. This can be surprising and a security risk, so we disallow these connections on the server side by default. To accept cross-origin websocket0 码力 | 272 页 | 1.12 MB | 3 月前3
共 23 条
- 1
- 2
- 3













