MITRE Defense Agile Acquisition Guide - Mar 2014
monthly. These frequent iterations effectively measure progress, reduce technical and programmatic risk, and respond to feedback and changes more quickly than traditional methods. Programs can adopt understand and appreciate each stakeholder’s risk tolerance and legal responsibilities, and provide clear and compelling evidence that an Agile approach can reduce risk. Application of Agile practices may appear appear at first glance to encroach upon traditional DoD risk reduction practices, which are optimized for weapon systems acquisition. These traditional methods most often involve extensive analysis, planning0 码力 | 74 页 | 3.57 MB | 5 月前3A Seat at the Table - IT Leadership in the Age of Agility
objectives. When combined with Agile and Lean practices, this approach can focus IT planning, reduce risk, eliminate waste, and provide a supportive environment for teams engaged in creating value. If you month, you can find the handout for Part 2 on the Agile4Defense GitHub page at: https://git.io/JeaO2 Risk The presence of uncertainty is the simple reason why Agile approaches work better than plan-driven business value by adopting an intelligent attitude toward risk. Risk is the chance of a negative impact resulting from uncertainty. We can reduce risk—often at a cost —but there is generally no way to eliminate0 码力 | 7 页 | 387.48 KB | 5 月前3A Seat at the Table: IT Leadership in the Age of Agility - Part 2
of custom-developing systems that preserve many of the advantages of buying off the shelf. The risk of developing a system incrementally and altering it based on user feedback is often lower than that away by frameworks and design patterns. Incremental delivery and staged investments reduce cost and risk. Custom code is almost not custom these days. A developer incorporates open source frameworks user-centric way and match the enterprise’s needs precisely. Risk is low, because the team is constantly adjusting. Option 2: Compare that to the risk of buying a vendor’s product, where the investment is0 码力 | 7 页 | 387.61 KB | 5 月前3The DevOps Handbook
information is evaluated and debated; more similar to R&D lab. f. REDEFINE FAILURE AND ENCOURAGE CALCULATED RISK-TAKING i. Leaders reinforce the culture through their actions ii. Roy Rappaport, Netflix – a single guidance as early as possible ii. Awareness and involvement provides better business context for risk-based decisions d. INTEGRATE SECURITY INTO DEFECT TRACKING AND POST-MORTEMS i. Track all open security the 10 exploits were over 10 years old. i. ENSURE SECURITY OF THE ENVIRONMENT i. Once a hardened, risk-reduced environment is put in place, it must be monitored to ensure it stays in known good states0 码力 | 9 页 | 25.13 KB | 5 月前3A Seat at the Table - IT Leadership in the Age of Agility
substitute for the outdated project view in my vision for what IT leadership must become. Uncertainty and Risk: Third, underlying all of these changes – all of the problems with plan-drive approaches, all of confusion about how to deal with uncertainty and risk. What I call the “contractor-control paradigm” – is really about trying to make risk go away, when risk really the essence of what we do. Complex Adaptive practices, this approach can focus IT planning, reduce risk, eliminate waste, and provide a supportive environment for teams engaged in creating value. Risk: The presence of uncertainty is the simple reason0 码力 | 4 页 | 379.23 KB | 5 月前3OpenAI 《A practical guide to building agents》
speech, harassment, violence) to maintain safe, respectful interactions. Tool safeguards Assess the risk of each tool available to your agent by assigning a rating—low, medium, or high—based on factors permissions, and financial impact. Use these risk ratings to trigger automated actions, such as pausing for guardrail checks before executing high-risk functions or escalating to a human if needed. "Churn Detection Agent" "Identify if the user message indicates a potential customer churn risk." agents Agent, GuardrailFunctionOutput, InputGuardrailTripwireTriggered, RunContextWrapper0 码力 | 34 页 | 7.00 MB | 5 月前3The DevOps Handbook
& practicing continuous integration & testing iv. Automating, enabling, and architecting for low-risk releases b. Integrating objectives of QA & Operations to improve outcomes 2. Ch. 9 – Create the and even higher job satisfaction and lower rates of burnout. 5. Ch. 12 Automate and Enable Low-Risk Releases a. Just like we reduce batch size and increase frequency of feedback during development control needs separate Operations groups have emerged ii. Widely accepted practice to “reduce the risk of production outages and fraud” iii. DevOps goal – shift reliance from separate groups to other0 码力 | 8 页 | 23.08 KB | 5 月前3Peering Forward: C++'s Next Decade
secrets, … Software safety (or “life safety” or similar) making software free from unacceptable risk of causing unintended harm to humans, property, or the environment examples: hospital equipment, simplification in Cpp2, because they let programmers declare their intent Because it carried the highest risk: Would the committee & community accept that huge a leap forward in compile-time programming? Would the language feature, not a divergent special-purpose extension” such as a different kind of loop Risk of bottom-up design is that we may end up with overlapping pieces that don’t fill in the whole picture0 码力 | 84 页 | 6.21 MB | 5 月前3The DevOps Handbook
– forces a termination iv. Examples of potentially significant events (Gartner’s GTP Security & Risk Management group) 1. Authentication/authorization decisions 2. System and data access 3. System Process to Increase Quality of Our Current Work a. Goal – enable Development and Operations to reduce risk before production changes are made. Keep the reviews and approvals close to those whom are knowledgeable control failure – seems valid since we can imagine better control practices could have detected the risk earlier prevent the issue or could have taken steps to detect and recover faster 2. Accident due0 码力 | 8 页 | 24.02 KB | 5 月前3Designing C++ Code Generator Guardrails
rich tool; and Made it far easier to continue modernizing the Code Generator. We did it without risk! And we did it with the consensus and participation of dozens of teams. Prologue© 2018 Bloomberg 18 Working under the hood to improving the Code Generator, her changes are invisible to users, risk free, and happen automatically. CB began silently saving massive amounts of space© 2018 Bloomberg remove existing support because a client somewhere could suffer a runtime failure. There is much less risk for new libraries, which can create the rules before they have clients. Sherry begins pushing teams0 码力 | 48 页 | 2.71 MB | 5 月前3
共 132 条
- 1
- 2
- 3
- 4
- 5
- 6
- 14