DoD CIO Enterprise DevSecOps Reference Design - SummaryDoD Enterprise DevSecOps Reference Design from the DoD CIO – A Summary Content referenced from: https://dodcio.defense.gov/Portals/0/Documents/DoD%20Enterprise%20DevSecOps%20Reference %20Design%20v1.0_Public%20Release 0_Public%20Release.pdf?ver=2019-09-26-115824-583 DevSecOps – Defined by DoD CIO DevSecOps is an organizational software engineering culture and practice that aims at unifying software development (Dev) sidecar container CSIAC Webinars - DoD Enterprise DevSecOps Initiative – Nicolas Chaillan presenting https://www.csiac.org/podcast/dod-enterprise-devsecops-initiative/ DoD Centralized Container Source Code0 码力 | 8 页 | 3.38 MB | 5 月前3
MITRE Defense Agile Acquisition Guide - Mar 2014Public Release; Distribution Unlimited. 14-0391ii Executive Summary The Department of Defense (DoD) needs an acquisition framework for information technology (IT) that can keep pace with rapidly changing can help the DoD to transform IT acquisition by delivering capabilities faster and responding more effectively to changes in operations, technology, and budgets. This guide provides DoD acquisition professionals seen growing adoption across the DoD and other federal agencies. Agile practices enable the DoD to achieve reforms directed by Congress and DoD Acquisition Executives. DoD Instruction 5000.02 (Dec 2013)0 码力 | 74 页 | 3.57 MB | 5 月前3
Can Data-Oriented-Design be Improved?programming • Modules • 2000s • Template metaprogramming • Concurrency • 2020s • ??? 3What is DoD about? • DoD (“Data oriented design”) • Not about cache lines, nor struct layout (at its core) • From wikipedia: 4Minimalist definition of DoD 𝐷𝑎𝑡𝑎!"#$"# = 𝐹(𝐷𝑎𝑡𝑎%&$"#) Transformation Input Data Output Data Specific transformation Previous transformation Next transformation 5How DoD is used in actual ChatGPT… 7 That’s cool, but it won’t get us very far…How can we improve it? (second try) • At its core DoD is just: 𝐷𝑎𝑡𝑎!"#$"# = 𝐹(𝐷𝑎𝑡𝑎%&$"#) • … With a heavy focus on the data. • What if we looked0 码力 | 39 页 | 1.18 MB | 6 月前3
THE GITOPS GUIDE
TO BUILDING &
MANAGING INTERNAL
PLATFORMSorganization like the Department of Defense (DoD). With the world’s most powerful weapons arsenal in its control, there is no room for error with security. The DoD has been transforming itself in recent years they leveraged the platform approach to systems building. Security is baked into the platform at DoD so that developers only need to apply tags to certain resources to have capabilities, like authentication terms of security.” — Nicolas Chaillan, former Chief Software Officer of the U.S. Air Force The DoD leverages Istio as its service mesh, and one aspect of Istio is its reliance on sidecars for secure0 码力 | 15 页 | 623.52 KB | 1 年前3
Open Discussion on Project PlanningCost Estimation Cost estimation in an Agile environment is challenging The challenge within DoD is often a resistance to allocate budget for a program until all the requirements are fully defined0 码力 | 2 页 | 49.30 KB | 5 月前3
Embracing an Adversarial Mindset for Cpp SecurityMalware Research # @ Endgame 0x40200B Malware Research # @ Fireeye 0x40201A Computer Forensics # @ DoD PREVIOUS 0x40D021 Blackhat, RSA, DEFCON, 0x40D02B 44Con, CanSecWest 0x40D02E BsidesSF, WiCys 0x40D0320 码力 | 92 页 | 3.67 MB | 6 月前3
VMware Greenplum v6.18 Documentationenforcing federal security standards. Hardening the product is based on the US Department of Defense (DoD) guidelines Security Template Implementation Guides (STIG). Hardening removes unnecessary packages0 码力 | 1959 页 | 19.73 MB | 1 年前3
VMware Greenplum v6.19 Documentationenforcing federal security standards. Hardening the product is based on the US Department of Defense (DoD) guidelines Security Template Implementation Guides (STIG). Hardening removes unnecessary packages0 码力 | 1972 页 | 20.05 MB | 1 年前3
VMware Greenplum v6.17 Documentationenforcing federal security standards. Hardening the product is based on the US Department of Defense (DoD) guidelines Security Template Implementation Guides (STIG). Hardening removes unnecessary packages0 码力 | 1893 页 | 17.62 MB | 1 年前3
VMware Tanzu Greenplum v6.20 Documentationenforcing federal security standards. Hardening the product is based on the US Department of Defense (DoD) guidelines Security Template Implementation Guides (STIG). Hardening removes unnecessary packages0 码力 | 1988 页 | 20.25 MB | 1 年前3
共 17 条
- 1
- 2













