DoD CIO Enterprise DevSecOps Reference Design - SummaryDoD Enterprise DevSecOps Reference Design from the DoD CIO – A Summary Content referenced from: https://dodcio.defense.gov/Portals/0/Documents/DoD%20Enterprise%20DevSecOps%20Reference %20Design%20v1.0_Public%20Release of DevSecOps is to automate, monitor, and apply security at all phases of the software lifecycle: plan, develop, build, test, release, deliver, deploy, operate, and monitor. In DevSecOps, testing and security security sidecar container CSIAC Webinars - DoD Enterprise DevSecOps Initiative – Nicolas Chaillan presenting https://www.csiac.org/podcast/dod-enterprise-devsecops-initiative/ DoD Centralized Container0 码力 | 8 页 | 3.38 MB | 5 月前3
The DevOps Handbookinformation – Developers don’t just log what’s interesting to development. Operations don’t just monitor what’s up or down. ii. Modern Monitoring architecture 1. Data Collection at business logic, application Development and Operation Can Safely Deploy Code a. USE TELEMETRY TO MAKE DEPLOYMENTS SAFER i. Actively monitor production telemetry whenever anyone performs deployment; focus on the metrics associated with the feature as a hypothesis and use real users to prove/disprove the hypothesis 1. Barry O’Reilly, Lean Enterprise describes as: We Believe thatWill Result in . We 0 码力 | 8 页 | 24.02 KB | 5 月前3
A Seat at the Table: IT Leadership in the Age of Agility - Part 2month, you can find this on the Agile4Defense GitHub page at: https://git.io/JeaOu Enterprise Architecture Enterprise Architecture, the domain of the IT bureaucrats, is the place we must look for the solution overrated. A Better Way – Treat IT as an Enterprise Asset (EA): When we add all of our current IT capabilities together, we arrive at an asset that enables the enterprise to earn future revenues and reduce they have produced. As a result, the code can be developed in a user-centric way and match the enterprise’s needs precisely. Risk is low, because the team is constantly adjusting. Option 2: Compare0 码力 | 7 页 | 387.61 KB | 5 月前3
A Seat at the Table - IT Leadership in the Age of AgilityTime in Part 2 Enterprise Architecture: The job of IT leaders is not to execute projects on behalf of the business; it is to steward the asset that is the total of all of the enterprise’s IT capabilities—an robust feedback cycles and flexible decision-making processes, by creating options and grooming enterprise capabilities so that they will be responsive to change, and by demonstrating the value of information Assets: senior IT leadership has the responsibility for stewarding three critical assets: the Enterprise Architecture asset, the IT people asset, and the data asset. These three assets represent the0 码力 | 7 页 | 387.48 KB | 5 月前3
A Seat at the Table - IT Leadership in the Age of Agilityintangible asset, which I will call – despite some disconcerting connotations of the term – the Enterprise Architecture. The asset view of IT will substitute for the outdated project view in my vision cannot be done in an Agile way without the strangler pattern.Coming up in Part Two Enterprise Architecture: Enterprise Architecture, the domain of the IT bureaucrats, is the place we must look for the hope. And that’s what this book is meant to be, really. About the Author Mark Schwartz is an Enterprise Strategist at Amazon Web Services and the author of The Art of Business Value and A Seat at the0 码力 | 4 页 | 379.23 KB | 5 月前3
安全简介Requirements for Teams Programs and the Enterprise (2011) and Scaling Software Agility: Best Practices for Large Enterprieses (2007) Implementing agile practices at enterprise scale Synchronizes alignment, collaboration epics architectural epics kanban epic system – limit WIP program portfolio management, enterprise architect value streams investment themes - provide operating budgets for release trains0 码力 | 2 页 | 304.16 KB | 5 月前3
The DevOps HandbookOperations to improve outcomes 2. Ch. 9 – Create the Foundations of Our Deployment Pipeline a. Enterprise Data Warehouse program by Em Campbell-Pretty - $200M, All streams of work were significantly behind rarely works at scale 10X or 100X d. USE THE STRANGLER APPLICATION PATTERN TO SAFELY EVOLVE OUR ENTERPRISE ARCHITECTURE i. Coined by Martin Fowler in 2004 ii. Strangler Application 1. Put existing functionality architecture 3. Make calls to old system when necessary 4. Repeat for next critical areas of the enterprise0 码力 | 8 页 | 23.08 KB | 5 月前3
Open Discussion on Project Planningthese reviews should focus on the relatively small scope of a release and how it aligns to the enterprise architecture. Similar technical reviews can be decomposed to the release level. DO continuous0 码力 | 2 页 | 49.30 KB | 5 月前3
Redis操作手册keyxx #查看指定key对应的值 "valuexx" ★可视化客户端工具 官网: h�ps://redis.com/redis-enterprise/redis-insight/ 下 载 链 接 : h�ps://download.redisinsight.redis.com/latest/RedisInsight-v2-win- installer0 码力 | 5 页 | 80.37 KB | 1 年前3
The DevOps Handbookpotentially malicious code2. Dynamic Analysis – tests executed while a program is in operation. Monitor items such as memory, functional behavior, and other elements. Testing from the outside-in 3. Dependency0 码力 | 9 页 | 25.13 KB | 5 月前3
共 11 条
- 1
- 2













