manage.py Startapp CMDB
This creates a app,django, called the CMDB, that automatically generates a "CMDB" folder.
4. Writing a route
The route is in the URLs file, which maps the URL entered by the browser to the appropriate business processing logic.
The simple way to write URLs is as follows:
5. Writing Business processing logic
The business processing logic i
Django Installation:
Pip Install Django (window version, note the latest version of Django does not support python2.7 below)
Django Creation Project:
Django-admin startproject ProjectName (Custom)
command to execute manage.py:
CD into the project path, enter manage.py to see the Django command
Example: Runserver the project hangs on the site, as shown below:
Create an app
You can include multiple apps in each Django project, like sub-systems, sub-modules, features, and so
1.--Creating table SpacesCreate tablespace cmdb_db datafile ' \home\cmdb_11.dbf ' size 100m autoextend on next 50m extent management local;2.--Build UsersCreate user cmdb_1023 identified by admin default Tablespace cmdb_db;3.--give permissionGrant CONNECT,RESOURCE,DBA to cmdb_db;4.--Import data (executed in command window)Imp cmdb/admin file=/home/cmdb_henan.dmp fromuser=cmdb_l Touser=cmdb;5.--Exporting dat
PIP General ConfigurationPip is a Python package management tool, 3.x version directly with, can be used directly, and yum, in order to use the domestic image, the following configurationLinux systems:$ mkdir ~/.pip$vim ~/.pip/pip.conf[Global]Index-url=index-url = Https://pypi.tuna.tsinghua.edu.cn/simpleRedis is already installed.If the hint says PIP version is too low, follow the prompts to upgrade directly$ pip Install--upgrade PIP-VVVTo see the installation information for the Redis packageBa
security events from the user perspective. As we all know, security always has potential. When there is no problem, security is often not paid enough attention, and the business may be abandoned when it is busy, it is common for users to think about security when problems arise. If the security work to be done cannot be connected with the decision-making and the Mission and business value of the Organization, the work will not succeed, and how to reach the decision should be the key considerati
for OpenSSL?) It's really ugly.)14) Software testing related to: Purifyplus, VTune, Codeanalyst, Jprofiler ... Open Source: Valgrind, Gprof.15) in-house IT management software, you can look at three companies: IBM,BMC,CA, we can see what they do what kind of ITIL software (about ITIL please Google yourself).16) Industry software: Integrated circuit design software, oil exploration software, aviation softwa
Performance Web Solution Solutions
Virtualization of
VMware VSphere Installation and Configuration
Virtualization Aftermarket EngineerVirtualization Pre-Sales engineer
Project: VMware IV after-sales implementation
Microsoft Hyper-V Installation and Configuration
KVM Installation and Configuration
Xen ( Citrix , Oracle ) Installation and configuration
Project: Enterprise Virtual Project Construction (Team P
exceed this number. In any case, when an incident occurs, the project is put on hold and resources are exchanged until the crisis is mitigated. This will cause project backlog and management failure.
· All things are the same. A system accident may be due to a change. Yes, environmental problems and hardware faults may be one reason, but their probability is lower. People often spend 80% of their repair time trying to find out what has actually changed. If you can solve the problem as soon as p
1Preface
At present, enterprise management of domestic IT companies is taking projects as the core, and projects are not only a single software project or system integration project, but also various types of projects coexist, or a customer or contract should be divided into several different types of projects for implementation and implementation, or even organize and manage these projects according to the customer's requirements. This creates a problem: how to manage projects of different type
same function as paper notes, but more convenient and easier to recognize (Text + pictures), expand the screen, an electronic black (white) Board can be formed with audio. if the input is changed to a shadow (more advanced input mode), the screen is changed to a projection (change the output mode ).....
The theoretical and practical methods of table store are to list the key features of products to be invented. Then, based on the existing successful invention principles, we can improve the feat
Attempt: Read the node from XML and dynamically create an object.Reference: http://www.cnblogs.com/Arlen/archive/2007/05/30/765506.html
In factoryCode:
Public
Class
Publicsoftwareconfigfactory
{ Protected Hashtable item = New Hashtable (); Public Ipublicsoftwareconfig This [Publicsoftwareconfigtype] { Get { If (Item. containskey (type. tostring ())) Return (Ipublicsoftwareconfig) item [type. tostring ()]; Else Return Null ;} } Public Publicsoftwar
, performance, supervision capability, and talent strength
Information system supervision is divided into three levels: A, B, and C. The main supervision content is "four control, three management, and one coordination ".
Four controls: quality control, progress control, investment control, and change control
Three management: information management, security management, and contract management
I. Coordination: Project Personnel coordination
4. ITIL a
=" spacer.gif "/> 650) This. width = 650; "src ="/e/u261/themes/default/images/spacer.gif "style =" Background: URL ("/e/u261/lang/ZH-CN/images/localimage.png") No-repeat center; Border: 1px solid # DDD; "alt =" spacer.gif "/>From now on, huizhe has launched the cissp certification training mode in 5 + 1, 5 days of training + 1 day of the cissp Chinese simulated test. The training fee remains unchanged, and the training fee is free of charge. He has been teaching staff for 10 years and has many
Itop7, the Administrator account settings, select the language is Chinese, first do not set the password8. Other Parameters Note language9, service mode here I choose for an enterprise internal service:10, Order Management mode Select ITIL Mode, tick user request management and incident management11. Change management mode, choose ITIL Mode12. Known error management and problem management hook up13, finall
"Drip travel" changed the traditional way of taxi, and cultivate the modern way of travel in the era of the big mobile Internet. As a member of the more than 2 million Beijing wave, the Drip app has been my common tool, such as booking taxis, riding a ride to work, weekends called fast-track to play with the baby .... Long-time use, the discovery of drip service delivery process, worthy of ITSM practitioners of research and learning, may be more than a few days of
important, the most critical, this is the new Year should be in the first place.Ii. direction of development everyone has their own personal future, which determines the nature of the training courses you want to choose. Especially related to the occupations to be undertaken. such as project management, product management, product research and development management, business analysis, business needs management, process management, etc. can be from the occupation or related professional busine
live, brother.2012-2014: Responsible for the operation of the network I buy the work, with the team began crazy to engage in automated operations, learning methodology. The company provides PMP, ITIL training, began to engage in Zabbix, Saltstack, OpenStack, but also willing to participate in various sharing activities, sharing "ITIL-based Operation Management system", sharing the practical experience of t
information, but also on the site members of the group management, currently tentatively will use the department will be BI department, marketing department and customer service department
Data and Marketing (SHAMPU)
19
Noc
Intelligent Operation Command Center
Network Operation Center
Similar to command center, IBM is a department that is based on the concept of the service desk in ITIL best practices plus
links. In the network, these elements are interlocking, there is a problem, the result is likely to be the problem of the whole network. In the overall management of the enterprise network, we need to pay attention to: how to ensure the universality and relevance of the collected data.
The definition of ITSM-oriented network management system
What are the characteristics of the "network management system designed for ITSM" or the "IT Infrastructure management platform in ITSM"? Beita network
A Java-developed Python path -------------- (1 ),
I recently started to learn Python, mainly because I am writing a cmdb o M management platform for HNA through JAVA. I am the only developer sitting in the O M room, and I am also a father and mother, front-end, backend, test, design, requirements,
Release all !! I have also searched related CMDB on GitHub, but most of them are written through Python, so I
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.