Documentation Best PracticesDocumentation Best Practices “Say what you mean, simply and directly.” - [Brian Kernighan] (https://en.wikipedia.org/wiki/The_Elements_of_Programming_Style) Contents: 1. Minimum viable documentation0 码力 | 3 页 | 23.57 KB | 1 年前3
Best Practices for MySQL with SSDsBest Practices for MySQL with SSDs Page 1 Best Practices for MySQL with SSDs A whitepaper by: Vijay Balakrishnan Changho Choi Veronica Lagrange Lagrange Hubbert Smith Samsung Semiconductor, Inc. Best Practices for MySQL with SSDs Page 2 Table of Contents 1. Introduction ......................................................... Configurations ........................................................................... 12 Best Practices for MySQL with SSDs Page 3 1. Introduction Imagine a world where networking speeds became0 码力 | 14 页 | 416.88 KB | 1 年前3
Best practices for building Kubernetes OperatorsBest practices for building Kubernetes Operators Patryk WasielewskiAbout me ● DevOps Consultant at Amazon Web Services (AWS) ● 6 years professional experience as DevOps / SRE / Developer ● Cloud-native0 码力 | 36 页 | 2.19 MB | 6 月前3
1.3 Go practices in TiDB 姚维Go Practices in TiDB 姚维 PingCAP wink@pingcap.com Agenda ● How to build a stable database ○ Schrodinger-test platform ○ Failpoint injection ○ Goroutine-leak detection ● Optimization ○ Chunk vs interface{}0 码力 | 32 页 | 1.76 MB | 6 月前3
Building Effective Embedded Systems: Architectural Best Practices@Blitz motorsToday’s spotlight: Exploring best practices in embedded systems, with a focus on operating systemsToday’s spotlight: Exploring best practices in embedded systems, with a focus on operating0 码力 | 241 页 | 2.28 MB | 6 月前3
Practices of Go Microservices on Post-Kubernetes-Wei ZhengPractices of Go Microservices on Post-Kubernetes 郑伟 ⽯墨⽂档 Background in Shimo Language • Go • Node • Rust Background in Shimo Framework • Gin • Echo • gRPC • … Background in Shimo Platform0 码力 | 59 页 | 5.66 MB | 1 年前3
Service mesh security best practices: from implementation to verificationAnthony Roman, Lei Tang Google April 26, 2022 Service mesh security best practices: from implementation to verification Who are we? Anthony Roman Istio Github: anthony-roman Lei Tang Istio agenda 1. Service mesh security architecture and implementation. 2. Service mesh security best practices. 3. Lifecycle of service mesh security and demo. Service mesh security architecture ● Attack Complete Security Coverage Consistency Depth Visibility Completeness Service mesh security best practices 2 Cluster security Edge security Workload security Operation security Mesh security Edge0 码力 | 29 页 | 1.77 MB | 1 年前3
Unraveling string_view: Basics, Benefits, and Best Practices'; } 1 2 3 4 5 44 Fix of Broken Range-based for loop Compiler Support for C++23span: best practices for usage Use as argument to function which accepts any contiguous container. Use as return value0 码力 | 61 页 | 1.11 MB | 6 月前3
Performance tuning and best practices in a Knative based, large-scale serverless platform with Istio#IstioCon Performance tuning and best practices in a Knative based, large-scale serverless platform with Istio 张龚, Gong Zhang, IBM China Development Lab 庄宇, Yu Zhuang, IBM China Development Lab #IstioCon0 码力 | 23 页 | 2.51 MB | 1 年前3
MITRE Defense Agile Acquisition Guide - Mar 2014operations, including the challenges associated with information assurance. Agile development practices can help the DoD to transform IT acquisition by delivering capabilities faster and responding more budgets. This guide provides DoD acquisition professionals with details on how to adopt Agile practices within each element of their programs, thus helping them to succeed in an increasingly complex development methodology, and has seen growing adoption across the DoD and other federal agencies. Agile practices enable the DoD to achieve reforms directed by Congress and DoD Acquisition Executives. DoD Instruction0 码力 | 74 页 | 3.57 MB | 5 月前3
共 1000 条
- 1
- 2
- 3
- 4
- 5
- 6
- 100













