openEuler OS Technical Whitepaper
Innovation Projects
(June, 2023)Scenario enablement Linux kernel x86, Arm, RISC-V GPU NPU Real-time kernel Security kernel Database Big data Resource orchestration Desktop system Industrial application ... ... openEuler OpenHarmony libraries are needed for compilation. Additionally, the application of multiple hardware-related parallel and communication technologies lead to the increasing complexity of porting between different compatible with the required library and tool chain versions, making it easy to upgrade compilers and parallel libraries. Furthermore, HPCRunner automates and simplifies the deployment of software packages of0 码力 | 116 页 | 3.16 MB | 1 年前3
Cilium v1.8 DocumentationKafka cluster How to secure gRPC Getting Started Securing Elasticsearch How to Secure a Cassandra Database Getting Started Securing Memcached Locking down external access using AWS metadata Creating policies Policy Enforcement Locking down external access with DNS-based policies How to Secure a Cassandra Database Securing a Kafka cluster Getting Started Using MicroK8s This guide uses microk8s [https://microk8s Policy Enforcement Locking down external access with DNS-based policies How to Secure a Cassandra Database Securing a Kafka cluster Getting Started Using K3s This guide walks you through installation of0 码力 | 1124 页 | 21.33 MB | 1 年前3
Cilium v1.7 DocumentationKafka cluster How to secure gRPC Getting Started Securing Elasticsearch How to Secure a Cassandra Database Getting Started Securing Memcached Locking down external access using AWS metadata Advanced Networking Policy Enforcement Locking down external access with DNS-based policies How to Secure a Cassandra Database Securing a Kafka cluster Getting Started Using MicroK8s This guide uses microk8s [https://microk8s Policy Enforcement Locking down external access with DNS-based policies How to Secure a Cassandra Database Securing a Kafka cluster Getting Started Using K3s This guide walks you through installation of0 码力 | 885 页 | 12.41 MB | 1 年前3
Cilium v1.9 DocumentationKafka cluster How to secure gRPC Getting Started Securing Elasticsearch How to Secure a Cassandra Database Getting Started Securing Memcached Locking down external access using AWS metadata Creating policies Policy Enforcement Locking down external access with DNS-based policies How to Secure a Cassandra Database Securing a Kafka cluster Getting Started Using MicroK8s This guide uses microk8s [https://microk8s Policy Enforcement Locking down external access with DNS-based policies How to Secure a Cassandra Database Securing a Kafka cluster Getting Started Using K3s This guide walks you through installation of0 码力 | 1263 页 | 18.62 MB | 1 年前3
Cilium v1.10 DocumentationKafka cluster How to secure gRPC Getting Started Securing Elasticsearch How to Secure a Cassandra Database Getting Started Securing Memcached Locking down external access using AWS metadata Creating policies Policy Enforcement Locking down external access with DNS-based policies How to Secure a Cassandra Database Securing a Kafka cluster Installation using Rancher Pre-Requisites Rancher Version 2.x [https://rancher both external services provided by AWS, Google, Twilio, Stripe, etc., and internal services such as database clusters running in private subnets outside Kubernetes. CIDR or IP-based policies are cumbersome0 码力 | 1307 页 | 19.26 MB | 1 年前3
Cilium v1.11 DocumentationKafka cluster How to secure gRPC Getting Started Securing Elasticsearch How to Secure a Cassandra Database Getting Started Securing Memcached Locking down external access using AWS metadata Creating policies Policy Enforcement Locking down external access with DNS-based policies How to Secure a Cassandra Database Securing a Kafka cluster Installation using Rancher Pre-Requisites Rancher Version 2.x [https://rancher both external services provided by AWS, Google, Twilio, Stripe, etc., and internal services such as database clusters running in private subnets outside Kubernetes. CIDR or IP-based policies are cumbersome0 码力 | 1373 页 | 19.37 MB | 1 年前3
Cilium v1.6 DocumentationKafka cluster How to secure gRPC Getting Started Securing Elasticsearch How to Secure a Cassandra Database Getting Started Securing Memcached Locking down external access using AWS metadata Advanced Networking call authorization Locking down external access with DNS-based policies How to Secure a Cassandra Database Securing a Kafka cluster Getting Started Using MicroK8s This guide uses microk8s [https://microk8s call authorization Locking down external access with DNS-based policies How to Secure a Cassandra Database Securing a Kafka cluster Self-Managed Kubernetes The following guides are available for installation0 码力 | 734 页 | 11.45 MB | 1 年前3
Ubuntu Desktop Training 2009system and search for files • How to connect to and use the Internet • How to perform basic word-processing and spreadsheet functions using OpenOffice.org • How to Install and play games • How to add, viruses Customisation • Easy to design and personalise • Can run different flavours of Ubuntu in parallel • Standard OS with limited options to personalise • Paid for additional applications Data Storage course, Ubuntu is yours to design and personalise. You can have different flavours of Ubuntu running parallel; for example, you can install the Kubuntu (KDE) desktop together with Ubuntu (GNOME) and then select0 码力 | 428 页 | 57.45 MB | 1 年前3
This Debian Reference (version 2.109) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 1.6 Unix-like text processing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 208 11.2.2 XML processing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 209 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 221 12.1.6 The shell command-line processing sequence . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 222 12.1.7 Utility programs0 码力 | 266 页 | 1.25 MB | 1 年前3
openEuler 21.03 技术白皮书to match each type of workload with the most appropriate computing power unit, improve the parallel processing capability through software optimization, and unleash the full power of diversified computing token management, creation, and modification functions for other OpenStack components, and uses a database such as MySQL to store authentication information. • Nova provides VM creation, running, migration a fault within 10 seconds and complete the switchover within 1 second. Application scenario 2: database and system service protection The HA cluster solution supports mainstream OSs and application software0 码力 | 21 页 | 948.66 KB | 1 年前3
共 52 条
- 1
- 2
- 3
- 4
- 5
- 6













