积分充值
 首页
前端开发
AngularDartElectronFlutterHTML/CSSJavaScriptReactSvelteTypeScriptVue.js构建工具
后端开发
.NetC#C++C语言DenoffmpegGoIdrisJavaJuliaKotlinLeanMakefilenimNode.jsPascalPHPPythonRISC-VRubyRustSwiftUML其它语言区块链开发测试微服务敏捷开发架构设计汇编语言
数据库
Apache DorisApache HBaseCassandraClickHouseFirebirdGreenplumMongoDBMySQLPieCloudDBPostgreSQLRedisSQLSQLiteTiDBVitess数据库中间件数据库工具数据库设计
系统运维
AndroidDevOpshttpdJenkinsLinuxPrometheusTraefikZabbix存储网络与安全
云计算&大数据
Apache APISIXApache FlinkApache KarafApache KyuubiApache OzonedaprDockerHadoopHarborIstioKubernetesOpenShiftPandasrancherRocketMQServerlessService MeshVirtualBoxVMWare云原生CNCF机器学习边缘计算
综合其他
BlenderGIMPKiCadKritaWeblate产品与服务人工智能亿图数据可视化版本控制笔试面试
文库资料
前端
AngularAnt DesignBabelBootstrapChart.jsCSS3EchartsElectronHighchartsHTML/CSSHTML5JavaScriptJerryScriptJestReactSassTypeScriptVue前端工具小程序
后端
.NETApacheC/C++C#CMakeCrystalDartDenoDjangoDubboErlangFastifyFlaskGinGoGoFrameGuzzleIrisJavaJuliaLispLLVMLuaMatplotlibMicronautnimNode.jsPerlPHPPythonQtRPCRubyRustR语言ScalaShellVlangwasmYewZephirZig算法
移动端
AndroidAPP工具FlutterFramework7HarmonyHippyIoniciOSkotlinNativeObject-CPWAReactSwiftuni-appWeex
数据库
ApacheArangoDBCassandraClickHouseCouchDBCrateDBDB2DocumentDBDorisDragonflyDBEdgeDBetcdFirebirdGaussDBGraphGreenPlumHStreamDBHugeGraphimmudbIndexedDBInfluxDBIoTDBKey-ValueKitDBLevelDBM3DBMatrixOneMilvusMongoDBMySQLNavicatNebulaNewSQLNoSQLOceanBaseOpenTSDBOracleOrientDBPostgreSQLPrestoDBQuestDBRedisRocksDBSequoiaDBServerSkytableSQLSQLiteTiDBTiKVTimescaleDBYugabyteDB关系型数据库数据库数据库ORM数据库中间件数据库工具时序数据库
云计算&大数据
ActiveMQAerakiAgentAlluxioAntreaApacheApache APISIXAPISIXBFEBitBookKeeperChaosChoerodonCiliumCloudStackConsulDaprDataEaseDC/OSDockerDrillDruidElasticJobElasticSearchEnvoyErdaFlinkFluentGrafanaHadoopHarborHelmHudiInLongKafkaKnativeKongKubeCubeKubeEdgeKubeflowKubeOperatorKubernetesKubeSphereKubeVelaKumaKylinLibcloudLinkerdLonghornMeiliSearchMeshNacosNATSOKDOpenOpenEBSOpenKruiseOpenPitrixOpenSearchOpenStackOpenTracingOzonePaddlePaddlePolicyPulsarPyTorchRainbondRancherRediSearchScikit-learnServerlessShardingSphereShenYuSparkStormSupersetXuperChainZadig云原生CNCF人工智能区块链数据挖掘机器学习深度学习算法工程边缘计算
UI&美工&设计
BlenderKritaSketchUI设计
网络&系统&运维
AnsibleApacheAWKCeleryCephCI/CDCurveDevOpsGoCDHAProxyIstioJenkinsJumpServerLinuxMacNginxOpenRestyPrometheusServertraefikTrafficUnixWindowsZabbixZipkin安全防护系统内核网络运维监控
综合其它
文章资讯
 上传文档  发布文章  登录账户
IT文库
  • 综合
  • 文档
  • 文章

无数据

分类

全部系统运维(44)Linux(44)eBPF(11)Cilium(7)

语言

全部英语(18)中文(简体)(18)德语(1)西班牙语(1)法语(1)意大利语(1)日语(1)葡萄牙语(1)中文(简体)(1)英语(1)

格式

全部PDF文档 PDF(37)其他文档 其他(7)
 
本次搜索耗时 0.105 秒,为您找到相关结果约 44 个.
  • 全部
  • 系统运维
  • Linux
  • eBPF
  • Cilium
  • 全部
  • 英语
  • 中文(简体)
  • 德语
  • 西班牙语
  • 法语
  • 意大利语
  • 日语
  • 葡萄牙语
  • 中文(简体)
  • 英语
  • 全部
  • PDF文档 PDF
  • 其他文档 其他
  • 默认排序
  • 最新排序
  • 页数排序
  • 大小排序
  • 全部时间
  • 最近一天
  • 最近一周
  • 最近一个月
  • 最近三个月
  • 最近半年
  • 最近一年
  • pdf文档 openEuler 21.09 技术白皮书

    ecosystem helps slash CPU core costs, new technologies like VMs, big data, artificial intelligence (AI), and deep learning require higher computing power and memory capacities. A system that offers limited latency-sensitive interactive services (MySQL, Redis, and Nginx) and latency-insensitive services (offline AI training). Examples include hybrid deployments of containers and containers, containers and processes Likewise, Google launches the GVisor security sandbox for process-level virtualization, isolating risks from container applications. By contrast, openEuler combines the virtualization platform StratoVirt
    0 码力 | 36 页 | 3.40 MB | 1 年前
    3
  • pdf文档 openEuler OS Technical Whitepaper Innovation Projects (June, 2023)

    CDR Carrier Healthcare Receipt images Unstructured data production service Semiconductor EDA AI quality inspection R&D PDM Reservoir simulation and analysis NAs 16K 5% Live network EDA: Metadata of cloud service containers, covering hybrid deployment of web services, databases, big data, and AI. It helps customers in industries such as Internet and communications achieve a data center resource application ecosystem. Consider the example of smart manufacturing. Such integration of big data, AI, robotic control, and device-cloud collaboration systems can deliver automated production, network-based
    0 码力 | 116 页 | 3.16 MB | 1 年前
    3
  • pdf文档 Referência Debian v2.124

    unstable suite is good for debugging packages as a developer but tends to expose you to unnecessary risks for the normal Desktop usage. Even though the unstable suite of the Debian system looks very stable consistent without changing the real content of the Social Contract. Users should be aware of the risks of using packages in the non-free, non-free-firmware and contrib areas: • falta de liberdade para can be unset by prefixing ”no” set ignorecase ” :h ’ic set smartcase ” :h ’scs set autoindent ” :h ’ai set smartindent ” :h ’si set nowrap ” :h ’wrap ”set list ” :h ’list (default nolist) set noerrorbells
    0 码力 | 281 页 | 1.39 MB | 1 年前
    3
  • pdf文档 This Debian Reference (version 2.109)

    have such privileges. 1.1.13 Play time Now you are ready to play with the Debian system without risks as long as you use the non-privileged user account. This is because the Debian system is, even after file with the group ID of the file (for example root). Because these settings can cause security risks, enabling them requires extra caution. Setting set group ID on a directory enables the BSD-like file system administrator. But ones with security risks are disabled in the default installation. • If you manually activate a service with some security risks, you are responsible for the risk containment
    0 码力 | 266 页 | 1.25 MB | 1 年前
    3
  • pdf文档 ubuntu server guide

    repositories? While having access to the software you want to use is great, it is crucial to understand the risks involved in using third party APT repositories. Security risk When using any software that you have to the keyring. Everything will work “out of the box” when you run snap install. Mitigating the risks If the software you want is not available as a snap, you may still need to use a third party APT by mistake. Dealing with third party APT repositories in Ubuntu Now that we have discussed the risks and mitigations of using third party APT repositories, let’s take a look at how we can work with them
    0 码力 | 486 页 | 3.33 MB | 1 年前
    3
  • pdf文档 openEuler 21.03 技术白皮书

    proper workload and enables the system to apply an efficient resource scheduling policy. The benefits include maximized system resource utilization and improved user experience. 8. Early Departure The mature ARM ecosystem is making the cost per CPU core lower and lower. Databases, VMs, big data, AI, and deep learning call for increasingly higher computing power and memory capacities. Limited memory we avoid data leakage if the data of the three companies needs to be merged and computed through AI training? In such a case, the three companies must use a confidential computing technology to transmit
    0 码力 | 21 页 | 948.66 KB | 1 年前
    3
  • pdf文档 Buzzing Across Space

    extend the kernel’s functionalities by writing and loading kernel modules, but it comes with its own risks that they might crash or otherwise harm the kernel. If modules are not contributed upstream, they
    0 码力 | 32 页 | 32.98 MB | 1 年前
    3
  • epub文档 Cilium v1.5 Documentation

    1/1 Running 0 2d po/spaceship 1/1 Running 0 2d Security Risks for Elasticsearch Access For Elas�csearch clusters the least privilege security challenge is to give to store or retrieve data. Mul�ple clients can benefit from this distributed cache’s performance benefits. There are two kinds of data sent in the memcache protocol: text lines and unstructured (binary) ipvlan master where virtual ipvlan devices in slave mode are set up inside the container. One of the benefits of ipvlan over a veth pair is that the stack requires less resources to push the packet into the
    0 码力 | 740 页 | 12.52 MB | 1 年前
    3
  • epub文档 Cilium v1.6 Documentation

    1/1 Running 0 2d po/spaceship 1/1 Running 0 2d Security Risks for Elasticsearch Access For Elasticsearch clusters the least privilege security challenge is to to store or retrieve data. Multiple clients can benefit from this distributed cache’s performance benefits. There are two kinds of data sent in the memcache protocol: text lines and unstructured (binary) ipvlan master where virtual ipvlan devices in slave mode are set up inside the container. One of the benefits of ipvlan over a veth pair is that the stack requires less resources to push the packet into the
    0 码力 | 734 页 | 11.45 MB | 1 年前
    3
  • epub文档 Cilium v1.7 Documentation

    1/1 Running 0 2d po/spaceship 1/1 Running 0 2d Security Risks for Elasticsearch Access For Elasticsearch clusters the least privilege security challenge is to to store or retrieve data. Multiple clients can benefit from this distributed cache’s performance benefits. There are two kinds of data sent in the memcache protocol: text lines and unstructured (binary) node they were sent out of are not encrypted. This is a intended behavior as it doesn’t provide any benefits because the raw traffic on the node can be seen. Generate & import the PSK First, create a Kubernetes
    0 码力 | 885 页 | 12.41 MB | 1 年前
    3
共 44 条
  • 1
  • 2
  • 3
  • 4
  • 5
前往
页
相关搜索词
openEuler21.09技术白皮皮书白皮书OSTechnicalWhitepaperInnovationProjectsJune2023RefernciaDebianv2124ThisReferenceversion2.109ubuntuserverguide21.03BuzzingAcrossSpaceCiliumv1Documentation
IT文库
关于我们 文库协议 联系我们 意见反馈 免责声明
本站文档数据由用户上传或本站整理自互联网,不以营利为目的,供所有人免费下载和学习使用。如侵犯您的权益,请联系我们进行删除。
IT文库 ©1024 - 2025 | 站点地图
Powered By MOREDOC AI v3.3.0-beta.70
  • 关注我们的公众号【刻舟求荐】,给您不一样的精彩
    关注我们的公众号【刻舟求荐】,给您不一样的精彩