Ubuntu Desktop GuideUbuntu Desktop Guide Welcome to Ubuntu Use the Launcher to start applications Find apps, files, music, and more with the Dash Manage apps & settings with the menu bar Log out, power off, switch users messaging… Sound, video & pictures Digital cameras, iPods, playing videos… Files, folders & search Searching, delete files, backups, removable drives, documents… Add & remove software Install, remove of the desktop, the Dash. The Dash is designed to make it easier to find, open, and use apps, files, music, and more. For example, if you type the word "document" into the Search Bar, the Dash will0 码力 | 1709 页 | 5.81 MB | 1 年前3
openEuler OS Technical Whitepaper
Innovation Projects
(June, 2023)access of remote common files and FIFO files, and supports read and write blocking operations. • Process collaboration uses the rexec tool to remotely start executable files. The rexec tool takes over NAs 16K 5% Live network EDA: Metadata + Massive small files Service data Massive and deep directories Random concurrency Small files (KB-level) Metadata Deep directories Multiple operation can also record software package versions and compilation options to ensure that identical binary files are generated on different platforms with the same chip architecture, ensuring the test-retest reliability0 码力 | 116 页 | 3.16 MB | 1 年前3
Debian GNU/Linux 安裝手冊 January 8, 2024. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 4.2.1 Where to Find Installation Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 4.3 準備從 USB 隨身碟開機的檔案 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24 4.7 Verifying the integrity of installation files . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24 5 啟動安裝系統 25 5.1 在 64-bit PC 上啟動安裝程式 . . . . . . . . . . . . . . . . . . . 75 B.2.6 Using a DHCP server to specify preconfiguration files . . . . . . . . . . . . . . . . . 76 B.3 Creating a preconfiguration file . . . . . . . . . . .0 码力 | 120 页 | 643.51 KB | 1 年前3
Ubuntu Desktop Training 2009........... 199 6.2. 3D Effects ........................................ 202 6.3. Working with Files Using Nautilus ..... 203 6.3.1. Features of Nautilus ................ 203 6.3.2. Nautilus ...... .............. 255 8.1. Legal Restrictions ............................. 256 8.2. Playing Music Files ........................... 257 8.2.1. Playing Music using Rhythm- box .......................... ................ 293 8.7. Creating and Editing Audio Files ........ 298 8.7.1. Creating Audio Files ............... 298 8.7.2. Editing Audio Files ................. 301 8.8. Playing DVDs ............0 码力 | 428 页 | 57.45 MB | 1 年前3
Cilium v1.5 Documentationaddress iden�fica�on in tradi�onal systems) and can filter on applica�on-layer (e.g. HTTP). As a result, Cilium not only makes it simple to apply security policies in a highly dynamic environment by decoupling is mapped to an HTTP POST call to a URL of the form /cloudcity.DoorManager/. As a result, the following CiliumNetworkPolicy rule limits access of pods with label app=public-terminal to This will extract the keys that Cilium is using to connect to the etcd in the local cluster. The key files are wri�en to config/ .*.{key|crt|-ca.crt} Repeat this step for all clusters you want 0 码力 | 740 页 | 12.52 MB | 1 年前3
Cilium v1.6 Documentationaddress identification in traditional systems) and can filter on application-layer (e.g. HTTP). As a result, Cilium not only makes it simple to apply security policies in a highly dynamic environment by decoupling prepare generating the deployment artifacts based on the Helm templates. Generate the required YAML files and deploy them: helm template cilium \ --namespace cilium \ --set global.nodeinit.enabled=true cluster with the exception of specifying the Network Policy option. Doing so will still work but will result in unwanted iptables rules being installed on all of your nodes. If you want to us the CLI to create0 码力 | 734 页 | 11.45 MB | 1 年前3
Cilium v1.7 Documentationaddress identification in traditional systems) and can filter on application-layer (e.g. HTTP). As a result, Cilium not only makes it simple to apply security policies in a highly dynamic environment by decoupling transparent manner. Visit Hubble Github page [https://github.com/cilium/hubble]. Generate the deployment files using Helm and deploy it: git clone https://github.com/cilium/hubble.git --branch v0.5 cd hubble/install/kubernetes transparent manner. Visit Hubble Github page [https://github.com/cilium/hubble]. Generate the deployment files using Helm and deploy it: git clone https://github.com/cilium/hubble.git --branch v0.5 cd hubble/install/kubernetes0 码力 | 885 页 | 12.41 MB | 1 年前3
The Linux Commands Handbook
different options and parameters you can use on a command. 11 ls Inside a folder you can list all the files that the folder contains using the ls command: ls If you add a folder name or path, it will of data is generated by the l option. The a option instead also shows the hidden files. Hidden files are files that start with a dot ( . ). 13 cd Once you have a folder, you can move into it using The folder you delete must be empty. To delete folders with files in them, we'll use the more generic rm command which deletes files and folders, using the -rf options: rm -rf fruits cars Be0 码力 | 135 页 | 14.14 MB | 1 年前3
The Linux Commands Handbook
different options and parameters you can use on a command. 3. ls Inside a folder you can list all the files that the folder contains using the ls command: ls If you add a folder name or path, it will of data is generated by the l option. The a option instead also shows the hidden files. Hidden files are files that start with a dot ( . ). 4. cd Once you have a folder, you can move into it using The folder you delete must be empty. To delete folders with files in them, we'll use the more generic rm command which deletes files and folders, using the -rf options: rm -rf fruits cars Be0 码力 | 112 页 | 13.74 MB | 1 年前3
Cilium v1.10 Documentationaddress identification in traditional systems) and can filter on application-layer (e.g. HTTP). As a result, Cilium not only makes it simple to apply security policies in a highly dynamic environment by decoupling sets used in a cluster must belong to the same resource group. Adding new nodes to node pools might result in application pods being scheduled on the new nodes before Cilium is ready to properly manage them how to use ClusterConfig [https://eksctl.io/usage/creating- and-managing-clusters/#using-config-files] file to create the cluster: apiVersion: eksctl.io/v1alpha5 kind: ClusterConfig ... managedNodeGroups:0 码力 | 1307 页 | 19.26 MB | 1 年前3
共 80 条
- 1
- 2
- 3
- 4
- 5
- 6
- 8













