The DevOps Handbook
Myth—DevOps is Only for Startups: b. Myth—DevOps Replaces Agile c. Myth—DevOps is incompatible with ITIL d. Myth—DevOps is Incompatible with Information Security and Compliance: e. Myth—DevOps Means Eliminating follows this progression: a. Environment creation: b. Code deployment: c. Test setup and run: d. Overly tight architecture: iv. ELIMINATE HARDSHIPS AND WASTE IN THE VALUE STREAM 1. In the book Implementing work: b. Extra processes: c. Extra features: d. Task switching: e. Waiting: f. Motion: g. Defects: h. Nonstandard or manual work:i. Heroics: d. The Second Way: The Principles of Feedback 270 码力 | 8 页 | 22.57 KB | 5 月前3The DevOps Handbook
I took that action?” 5. Brainstorm on real, implementable countermeasures – not Be more Careful d. PUBLISH OUR POST-MORTEMS AS WIDELY AS POSSIBLE i. After the meeting, widely publish the minutes, artifacts every day every exercise and new piece of information is evaluated and debated; more similar to R&D lab. f. REDEFINE FAILURE AND ENCOURAGE CALCULATED RISK-TAKING i. Leaders reinforce the culture through Single repository with over 1B files and over 2B SLOC, over 25K engineers for every Google property d. SPREAD KNOWLEDGE BY USING AUTOMATED TESTS AS DOCUMENTATION AND COMMUNITIES OF PRACTICE i. Ensure0 码力 | 9 页 | 25.13 KB | 5 月前3The DevOps Handbook
version control by Ops was the highest predictor of both IT performance & organizational performance d. MAKE INFRASTRUCTURE EASIER TO REBUILD THAN TO REPAIR i. Quickly building enables quickly re-creating – lose the ability to learn from mistakes and diminish integrating that learning into future work d. Google Web Server (GWS) team was struggling with changes – Hard line: no changes would be accepted potential rework and merge problems 1. Cross-cutting dependency improvements often provide high-payoffs d. ADOPT TRUNK-BASED DEVELOPMENT PRACTICES i. CI and Trunk-based development (TBD) are countermeasures0 码力 | 8 页 | 23.08 KB | 5 月前3MITRE Defense Agile Acquisition Guide - Mar 2014
.................................................................................... 61 Appendix D: DoD 5000 Information Requirements ................................................................ team’s ability to focus on capability delivery. Figure 11 Capstone Documentation Example Appendix D lists required DoDI 5000.02 and BCL acquisition documents, and contains a table that identifies the currently available. User feedback, in turn, guides developers and acquirers in shaping the program and R&D investments. Allow the full community to contribute to the program’s future by holding discussions0 码力 | 74 页 | 3.57 MB | 5 月前3The DevOps Handbook
Startups & shutdowns 9. Faults & errors 10. Circuit breaker trips 11. Delays 12. Backup success/failure d. USE TELEMETRY TO GUIDE PROBLEM-SOLVING i. Don’t practice “Mean Time until Declared Innocent” – culture probably a better way to do this.” Unfortunately, there wasn’t a better way to do that operation.” d. HAVE DEVELOPERS INITIALLY SELF-MANAGE THEIR PRODUCTION SERVICE i. Google has development groups self-manage add features to the baseline that also increase maintenance costs and identify opportunity costs. d. INTEGRATE A/B TESTING INTO OUR RELEASE i. A/B testing requires fast CD to support ii. Use feature0 码力 | 8 页 | 24.02 KB | 5 月前3Government Excerpt
bad behavior?” I truly doubt that any of the Beltway bandits sees themselves as bad people, and I’d bet that most are truly well-meaning. It’s the system that has failed them, and us. But how do we change and accountability? You know the answer: Scrum. Let’s start a few thousand miles west of Washington, D.C., in the Washington state capital, Olympia. There, the past two administrations—first a Republican goals. This is what people should expect from their government. The very fact that they sound clichéd is an indicator of their importance. A cliché, after all, is just a truth repeated enough times to0 码力 | 3 页 | 414.99 KB | 5 月前3Pomodoro Technique
• No conversations • No meetings • No eating • No preening How does it work? 1. Choose a task you’d like to get done 2. Set the Pomodoro for 25 minutes 3. Work on the task until the Pomodoro rings Personal Productivity Using The Pomodoro Technique, Daniel Hinojosa, https://docs.google.com/presentation/d/1ufjcILARuowbv3Y9r-FP9-x3kmlIzq7bvOJBxRVh3-w/ present#slide=id.i0 [3] Flow: The Psychology of Optimal0 码力 | 3 页 | 289.16 KB | 5 月前3Velocity Conference 2015
public/schedule/proceedings [2] YouTube Playlist: https://www.youtube.com/playlist?list=PL055Epbe6d5Y86GSg3nhUH3o_v62FGpCI0 码力 | 4 页 | 176.79 KB | 5 月前3DoD CIO Enterprise DevSecOps Reference Design - Summary
Image from https://github.com/jondavid-black/DevOpsForDefense/raw/master/Meetup/2019/2019-10%20DO4D%20- %20DevSecOps%20Reference%20Design.pdfContainerized Software Factory Reference DesignSoftware Factory0 码力 | 8 页 | 3.38 MB | 5 月前3HW弹药库之红队作战⼿册
vps)直接反控⽬标管理员个⼈机 CVE- 2019-0887 ] 利⽤补丁服务器下发执⾏ 利⽤EDR主控端定向下发执⾏ 从 Windows 平台 横向⾄ *inux 平台 li k 或者 基于Wi d SSH库⾃⾏开发各种远程执⾏⼩⼯具 plink 或者 基于Windows SSH库⾃⾏开发各种远程执⾏⼩⼯具 从 *inux 平台 横向⾄ Windows 平台 ⼀般都会将 impack0 码力 | 19 页 | 1.20 MB | 1 年前3
共 10 条
- 1