Cynefin - Agile for Defense
Codify them & make them teaching storiesManaging in a Complex Domain • Open discussion - need interactive communication, try crowd-sourcing or positive deviance - allow people to discuss solutions that0 码力 | 17 页 | 3.75 MB | 5 月前3Velocity Conference 2015
Patrick Lightbody (New Relic) Monitoring evolved from servers and networks to applications to what users do with applications Reflections on mountain moving, from the first year of USDS Mikey Dickerson0 码力 | 4 页 | 176.79 KB | 5 月前3DoD CIO Enterprise DevSecOps Reference Design - Summary
failure rate: how often software fails during production. Mean-time to recovery: how long it takes applications in the production stage to recover from failure. Key Principles to implementing a successful infrastructure must be measured and quantified, so that the total risks and impacts to software applications are understood. Deploy immutable infrastructure, such as containers. The concept of immutable0 码力 | 8 页 | 3.38 MB | 5 月前3The DevOps Handbook
recorded for auditing h. ENSURE SECURITY OF OUR SOFTWARE SUPPLY CHAIN i. Were often assembling applications from third-party components and integrating them with our business logic. We inherit the vulnerabilities objectives and integrate security telemetry into the same tools k. CREATING SECURITY TELEMETRY IN OUR APPLICATIONS i. Create relevant telemetry 1. Successful/unsuccessful logins 2. Password resets 3. Email0 码力 | 9 页 | 25.13 KB | 5 月前3The DevOps Handbook
haven’t been introduced iv. Integration tests – ensure correct interaction with other production applications and services g. CATCH ERRORS AS EARLY IN OUR AUTOMATED TESTING AS POSSIBLE i. A test suite’s configuration of middleware 4. Copying packages to production servers 5. Restarting VMs, containers, applications, etc. 6. Generating configuration files 7. Run automated smoke tests 8. Running test procedures0 码力 | 8 页 | 23.08 KB | 5 月前3MITRE Defense Agile Acquisition Guide - Mar 2014
a subset of the IS ICD scope and/or Capability Drop (CD) documents for smaller items such as applications (see Figure 13). Services and requirements oversight organizations have the flexibility to identify environment with enterprise platforms, IT programs will deliver capabilities via a series of applications or web services. IT systems must therefore be designed, developed, and maintained in concert The architecture can also promote the use of open source software and reuse of existing code or applications.29 Throughout the IT acquisition lifecycle, the enterprise architects serve as essential members0 码力 | 74 页 | 3.57 MB | 5 月前3Open Discussion on Project Planning
a subset of the IS ICD scope and/or Capability Drop (CD) documents for smaller items such as applications o Replace comprehensive Preliminary Design Reviews (PDRs) and Critical Design Reviews (CDRs)0 码力 | 2 页 | 49.30 KB | 5 月前3The Phoenix Project
impossible to use. There’s a million mandatory fields and most of the time, the drop down boxes for ‘applications affected’ don’t even have what I need. It’s why I’ve stopped even putting in change requests0 码力 | 3 页 | 154.45 KB | 5 月前3No Silver Bullet – Essence and Accident in Software Engineering
life of the machine for which it is first written • Software is embedded in a cultural matrix of applications, users, laws, and machine vehiclesInvisibility • Software is invisible and unvisualizable0 码力 | 35 页 | 1.43 MB | 5 月前3The DevOps Handbook
deployability? iii. Successful Brownfield transformations 1. CSG – COBOL mainframe and supporting applications a. They 2X release frequency b. Resulted in increased application reliability c. Reduced deployment0 码力 | 8 页 | 22.57 KB | 5 月前3
共 11 条
- 1
- 2