A Seat at the Table: IT Leadership in the Age of Agility - Part 2reduce cost and risk. Custom code is almost not custom these days. A developer incorporates open source frameworks, uses standardized design patterns, and orchestrates services that are already available from a vendor who doesn’t know your business and doesn’t have financial incentives to supportyou. Text “1” to @obvious if you like the first option, or “2” to @/dev/null if you prefer the second. Governance0 码力 | 7 页 | 387.61 KB | 6 月前3
The Phoenix Projectof server names in one of the text boxes. Most of the time, there’s not enough room in the field! A hundred server names are supposed to fit in a sixty-four-character text box? What idiot built that form0 码力 | 3 页 | 154.45 KB | 6 月前3
The DevOps Handbookasking consumer for follow-up action (phone call, return postcard, etc.) 1. Campaigns would modify text, layouts, packaging, etc. 2. Very expensive c. INTEGRATING A/B TESTING INTO OUR FEATURE TESTING0 码力 | 8 页 | 24.02 KB | 6 月前3
The DevOps Handbookpolicies are expressed as code.” c. CREATE A SINGLE, SHARED SOURCE CODE REPOSITORY FOR OUR ENTIRE ORGANIZATION i. Firm-wide shared source code repository is powerful way to share local discoveries to transfer security knowledge to the teams E. INTEGRATE PREVENTIVE SECURITY CONTROLS INTO SHARED SOURCE CODE REPOSITORIES AND SHARED SERVICES i. Add mechanisms & tools ii. Add security’s pre-blessed Dependency Scanning – inventory the dependencies for vulnerabilities or malicious binaries 4. Source code integrity and code signing – all contributors should have their own key and sign all commits0 码力 | 9 页 | 25.13 KB | 6 月前3
MITRE Defense Agile Acquisition Guide - Mar 2014track progress during a sprint. Figure 3: Example Burn Down Chart Program Backlog – Primary source of all requirements/desired functionality for the program Release Backlog – Subset of the program features the team considers relevant to building the product. The program backlog serves as the primary source for all program requirements and user stories, and the team must prioritize the contents to ensure Figure 12, the four sides of the IT Box identified in the IS-ICD include: Figure 12 IT Box (Source JCIDS Manual 19 Jan 12) As long as the program operates within these four sides of the IT Box,0 码力 | 74 页 | 3.57 MB | 6 月前3
The DevOps Handbookf. Myth—DevOps is Just “Infrastructure as Code” or Automation: g. Myth—DevOps is Only for Open Source Software: 2. Foreword xix 3. Imagine a World Where Dev and Ops Become DevOps: a. THE CORE, CHRONIC Heroics: d. The Second Way: The Principles of Feedback 27 i. KEEP PUSHING QUALITY CLOSER TO THE SOURCE 1. In complex systems, adding more inspection steps and approval processes actually increases the0 码力 | 8 页 | 22.57 KB | 6 月前3
DoD CIO Enterprise DevSecOps Reference Design - Summarypresenting https://www.csiac.org/podcast/dod-enterprise-devsecops-initiative/ DoD Centralized Container Source Code Repository (DCCSCR) https://dcar.dsop.io/ DSOP Group Workspace https://dccscr.dsop.io/dsopDCCSCR0 码力 | 8 页 | 3.38 MB | 6 月前3
Predictably IrrationalThings, but Not When We Are Paid to Do Them Example: AARP, Employer/Employee Relationships, Open Source Software Observations: o “we live simultaneously in two different worlds – one where social norms0 码力 | 3 页 | 234.46 KB | 6 月前3
The DevOps HandbookAll streams of work were significantly behind schedule. Surprising discovery: only 50% of the source code in Dev/Test environments matched Prod. They fixed forward, but changes not put back into version0 码力 | 8 页 | 23.08 KB | 6 月前3
A Seat at the Table - IT Leadership in the Age of Agilitydecisions in the normal course of work. Let’s say that we are deciding between two different open source products for building a piece of the system and do not know enough of their impacts to make the0 码力 | 7 页 | 387.48 KB | 6 月前3
共 10 条
- 1













