Documentation Best Practices
Documentation Best Practices “Say what you mean, simply and directly.” - [Brian Kernighan] (https://en.wikipedia.org/wiki/The_Elements_of_Programming_Style) Contents: 1. Minimum viable documentation0 码力 | 3 页 | 23.57 KB | 1 年前3Best Practices for MySQL with SSDs
Best Practices for MySQL with SSDs Page 1 Best Practices for MySQL with SSDs A whitepaper by: Vijay Balakrishnan Changho Choi Veronica Lagrange Lagrange Hubbert Smith Samsung Semiconductor, Inc. Best Practices for MySQL with SSDs Page 2 Table of Contents 1. Introduction ......................................................... Configurations ........................................................................... 12 Best Practices for MySQL with SSDs Page 3 1. Introduction Imagine a world where networking speeds became0 码力 | 14 页 | 416.88 KB | 1 年前3Best practices for building Kubernetes Operators
Best practices for building Kubernetes Operators Patryk WasielewskiAbout me ● DevOps Consultant at Amazon Web Services (AWS) ● 6 years professional experience as DevOps / SRE / Developer ● Cloud-native0 码力 | 36 页 | 2.19 MB | 5 月前31.3 Go practices in TiDB 姚维
Go Practices in TiDB 姚维 PingCAP wink@pingcap.com Agenda ● How to build a stable database ○ Schrodinger-test platform ○ Failpoint injection ○ Goroutine-leak detection ● Optimization ○ Chunk vs interface{}0 码力 | 32 页 | 1.76 MB | 6 月前3Building Effective Embedded Systems: Architectural Best Practices
@Blitz motorsToday’s spotlight: Exploring best practices in embedded systems, with a focus on operating systemsToday’s spotlight: Exploring best practices in embedded systems, with a focus on operating0 码力 | 241 页 | 2.28 MB | 5 月前3Practices of Go Microservices on Post-Kubernetes-Wei Zheng
Practices of Go Microservices on Post-Kubernetes 郑伟 ⽯墨⽂档 Background in Shimo Language • Go • Node • Rust Background in Shimo Framework • Gin • Echo • gRPC • … Background in Shimo Platform0 码力 | 59 页 | 5.66 MB | 1 年前3Service mesh security best practices: from implementation to verification
Anthony Roman, Lei Tang Google April 26, 2022 Service mesh security best practices: from implementation to verification Who are we? Anthony Roman Istio Github: anthony-roman Lei Tang Istio agenda 1. Service mesh security architecture and implementation. 2. Service mesh security best practices. 3. Lifecycle of service mesh security and demo. Service mesh security architecture ● Attack Complete Security Coverage Consistency Depth Visibility Completeness Service mesh security best practices 2 Cluster security Edge security Workload security Operation security Mesh security Edge0 码力 | 29 页 | 1.77 MB | 1 年前3Unraveling string_view: Basics, Benefits, and Best Practices
'; } 1 2 3 4 5 44 Fix of Broken Range-based for loop Compiler Support for C++23span: best practices for usage Use as argument to function which accepts any contiguous container. Use as return value0 码力 | 61 页 | 1.11 MB | 5 月前3Performance tuning and best practices in a Knative based, large-scale serverless platform with Istio
#IstioCon Performance tuning and best practices in a Knative based, large-scale serverless platform with Istio 张龚, Gong Zhang, IBM China Development Lab 庄宇, Yu Zhuang, IBM China Development Lab #IstioCon0 码力 | 23 页 | 2.51 MB | 1 年前3MITRE Defense Agile Acquisition Guide - Mar 2014
operations, including the challenges associated with information assurance. Agile development practices can help the DoD to transform IT acquisition by delivering capabilities faster and responding more budgets. This guide provides DoD acquisition professionals with details on how to adopt Agile practices within each element of their programs, thus helping them to succeed in an increasingly complex development methodology, and has seen growing adoption across the DoD and other federal agencies. Agile practices enable the DoD to achieve reforms directed by Congress and DoD Acquisition Executives. DoD Instruction0 码力 | 74 页 | 3.57 MB | 5 月前3
共 1000 条
- 1
- 2
- 3
- 4
- 5
- 6
- 100