Ubuntu Desktop GuideLauncher You can hide the Launcher if you only want to see it when you move your mouse or touchpad pointer to the left side of the screen. 1. Click the icon at the very right of the menu bar and select showing the Launcher, Ubuntu requires you to push a little bit harder with your mouse or touchpad pointer to make the Launcher show. You can adjust the force needed by setting the Reveal sensitivity lower buttons. Unity hides the app menus and the window management buttons unless you move your mouse pointer to the top left of the screen or press Alt + F10 . This feature enables you to see more of your0 码力 | 1709 页 | 5.81 MB | 1 年前3
openEuler OS Technical Whitepaper
Innovation Projects
(June, 2023)for the reliability and performance of NAS. However, traditional NFS only specifies one server IP address for a single mount point, which poses several challenges. • When an NIC or link is faulty, the accessing it from the host requires crossing three layers of networking. If one end is faulty, the IP address cannot detect the fault. File systems are manually mounted on the application layer, and active- container OS versions in the cluster. This requires a unified container OS management mechanism. To address these issues, we launched KubeOS, an OS O&M solution that uses Kubernetes to manage containers and0 码力 | 116 页 | 3.16 MB | 1 年前3
openEuler 21.09 技术白皮书be moved to map large memory blocks quickly. Pointer authentication codes (PACs): The register value is authenticated before being used as a pointer to access the data or code, so as to defend against Shared Virtual Addressing (SVA): It allows host processes and devices to use the same virtual address, avoiding the need for replicating resources between hosts and devices. SVA improves service fully utilized. The new file system, EulerFS, is equipped with metadata soft update technology. Its pointer-based directory and dual-view counting mechanism reduces metadata synchronization overheads to0 码力 | 36 页 | 3.40 MB | 1 年前3
Cilium v1.5 DocumentationNetworking Opera�ons Is�o Other Orchestrators Concepts Component Overview Assurances Terminology Address Management Mul� Host Networking Security Architecture Datapath Scale Kubernetes Integra�on Ge�ng between microservices. Tradi�onal Linux network security approaches (e.g., iptables) filter on IP address and TCP/UDP ports, but IP addresses frequently churn in dynamic microservices environments. The highly enforcement, but does so in a way that is based on service / pod / container iden�ty (in contrast to IP address iden�fica�on in tradi�onal systems) and can filter on applica�on-layer (e.g. HTTP). As a result,0 码力 | 740 页 | 12.52 MB | 1 年前3
Cilium v1.6 DocumentationAdvanced Networking Operations Istio Other Orchestrators Concepts Component Overview Terminology Address Management Multi Host Networking Security Datapath Failure Behavior Architecture Datapath Scale between microservices. Traditional Linux network security approaches (e.g., iptables) filter on IP address and TCP/UDP ports, but IP addresses frequently churn in dynamic microservices environments. The highly enforcement, but does so in a way that is based on service / pod / container identity (in contrast to IP address identification in traditional systems) and can filter on application-layer (e.g. HTTP). As a result0 码力 | 734 页 | 11.45 MB | 1 年前3
Cilium v1.7 DocumentationAdvanced Networking Operations Istio Other Orchestrators Concepts Component Overview Terminology Address Management Multi Host Networking Security Datapath Failure Behavior Architecture Datapath Scale between microservices. Traditional Linux network security approaches (e.g., iptables) filter on IP address and TCP/UDP ports, but IP addresses frequently churn in dynamic microservices environments. The highly enforcement, but does so in a way that is based on service / pod / container identity (in contrast to IP address identification in traditional systems) and can filter on application-layer (e.g. HTTP). As a result0 码力 | 885 页 | 12.41 MB | 1 年前3
Linux Lab v1.3 Manualto automate debug testing: 1 $ make test-debug linux find out the code line of a kernel panic address: 1 $ make kernel-calltrace func+offset/length if the debug port has been used, please try to find -fomit-frame-pointer -fno-asynchronous -unwind-tables -fno-pie - no-pie -m32 -Wall -Werror -g -o hello hello.c 4 Hello, World! 4.10.2 Cross build and Run Use X32 (Code for x86-64, int/long/pointer to 32bits) patchset to board specific bsp submodule repos- itory. Firstly, get the remote bsp repository address as following: 51 欢迎加入 Linux Lab 用户组,联系微信:tinylab,公众号:泰晓科技 1 $ git remote show origin 2 * remote0 码力 | 66 页 | 1.12 MB | 1 年前3
Linux Lab v1.2 Manualto automate debug testing: 1 $ make test-debug linux find out the code line of a kernel panic address: 1 $ make kernel-calltrace func+offset/length if the debug port has been used, please try to find -fomit-frame-pointer -fno-asynchronous -unwind-tables -fno-pie - no-pie -m32 -Wall -Werror -g -o hello hello.c 4 Hello, World! 4.10.2 Cross build and Run Use X32 (Code for x86-64, int/long/pointer to 32bits) patchset to board specific bsp submodule repos- itory. Firstly, get the remote bsp repository address as following: 51 欢迎加入 Linux Lab 用户组,联系微信:tinylab,公众号:泰晓科技 1 $ git remote show origin 2 * remote0 码力 | 67 页 | 1.13 MB | 1 年前3
Linux Lab v1.1 Manualto automate debug testing: 1 $ make test-debug linux find out the code line of a kernel panic address: 1 $ make kernel-calltrace func+offset/length if the debug port has been used, please try to find -fomit-frame-pointer -fno-asynchronous -unwind-tables -fno-pie - no-pie -m32 -Wall -Werror -g -o hello hello.c 4 Hello, World! 4.10.2 Cross build and Run Use X32 (Code for x86-64, int/long/pointer to 32bits) patchset to board specific bsp submodule repos- itory. Firstly, get the remote bsp repository address as following: 1 $ git remote show origin 2 * remote origin 3 Fetch URL: https://gitee.com/tin0 码力 | 65 页 | 1.12 MB | 1 年前3
Cilium v1.8 Documentationbetween microservices. Traditional Linux network security approaches (e.g., iptables) filter on IP address and TCP/UDP ports, but IP addresses frequently churn in dynamic microservices environments. The highly enforcement, but does so in a way that is based on service / pod / container identity (in contrast to IP address identification in traditional systems) and can filter on application-layer (e.g. HTTP). As a result Networking.ServiceSubnet = "10.96.0.0/12" If any of these subnets conflicts with your local network address range, update the networking section of the kind configuration file to specify different subnets0 码力 | 1124 页 | 21.33 MB | 1 年前3
共 64 条
- 1
- 2
- 3
- 4
- 5
- 6
- 7













