 The DevOps Handbookobserved in Toyota Kata that in the absence of improvements, processes don’t stay the same—due to chaos and entropy, processes actually degrade over time. 2. We improve daily work by explicitly reserving0 码力 | 8 页 | 22.57 KB | 5 月前3 The DevOps Handbookobserved in Toyota Kata that in the absence of improvements, processes don’t stay the same—due to chaos and entropy, processes actually degrade over time. 2. We improve daily work by explicitly reserving0 码力 | 8 页 | 22.57 KB | 5 月前3
 The DevOps Handbookavailability zone went down; Netflix was unaffected. Since 2008 they were building and testing with the Chaos Monkey; they architected for failure, tested for failure, and evolved beyond it b. ESTABLISH A JUST0 码力 | 9 页 | 25.13 KB | 5 月前3 The DevOps Handbookavailability zone went down; Netflix was unaffected. Since 2008 they were building and testing with the Chaos Monkey; they architected for failure, tested for failure, and evolved beyond it b. ESTABLISH A JUST0 码力 | 9 页 | 25.13 KB | 5 月前3
 A Seat at the Table - IT Leadership in the Age of Agilitycan help them achieve their outcomes; and explain, convince, and follow through. Orchestrator of Chaos: I began this book posing the question of how senior IT leadership can play a role in an environment0 码力 | 7 页 | 387.48 KB | 5 月前3 A Seat at the Table - IT Leadership in the Age of Agilitycan help them achieve their outcomes; and explain, convince, and follow through. Orchestrator of Chaos: I began this book posing the question of how senior IT leadership can play a role in an environment0 码力 | 7 页 | 387.48 KB | 5 月前3
 DoD CIO Enterprise DevSecOps Reference Design - Summarywhen there is anomalous behavior. 4. Vulnerability Management 5. A service mesh proxy to connect to the service mesh 6. Zero Trust down to the container level. Zero trust requires strict controls the security sidecar include: 1. Program-specific Log Storage and Retrieval Service 2. Service Mesh 3. Program-specific artifact repository 4. Runtime Behavior Analysis Artificial Intelligence (AI)0 码力 | 8 页 | 3.38 MB | 5 月前3 DoD CIO Enterprise DevSecOps Reference Design - Summarywhen there is anomalous behavior. 4. Vulnerability Management 5. A service mesh proxy to connect to the service mesh 6. Zero Trust down to the container level. Zero trust requires strict controls the security sidecar include: 1. Program-specific Log Storage and Retrieval Service 2. Service Mesh 3. Program-specific artifact repository 4. Runtime Behavior Analysis Artificial Intelligence (AI)0 码力 | 8 页 | 3.38 MB | 5 月前3
共 4 条
- 1














