 2021 中国开源年度报告献,但不是 主要的考虑因素,只有在产品性能差别不大时,才会选择对开源社区贡献大的供应商。  When companies buy open source products, the engineering team leader (technical director/architect / TL) selects most of them. In the same type of software courses. We hope the follow-up can be achieved in the learning of computers, compiling principles, software engineering, and other theoretical knowledge at the same time so that students learn to master companies buy open source products (commercial products based on open source projects), most engineering team leaders (technical directors/architects/TLs) will select the product. Half of them will0 码力 | 199 页 | 9.63 MB | 1 年前3 2021 中国开源年度报告献,但不是 主要的考虑因素,只有在产品性能差别不大时,才会选择对开源社区贡献大的供应商。  When companies buy open source products, the engineering team leader (technical director/architect / TL) selects most of them. In the same type of software courses. We hope the follow-up can be achieved in the learning of computers, compiling principles, software engineering, and other theoretical knowledge at the same time so that students learn to master companies buy open source products (commercial products based on open source projects), most engineering team leaders (technical directors/architects/TLs) will select the product. Half of them will0 码力 | 199 页 | 9.63 MB | 1 年前3
 openEuler 21.09 技术白皮书Application Scenarios In the HPC test of Weather Research and Forecasting (WRF) and Microsystems Engineering and Materials Science (NEMO) applications, Kunpeng GCC delivers 10% higher performance than GCC including mailing lists, can be found in the relevant README files. Mailing List You can start a discussion on an open topic by sending an email to the relevant mailing list. Visit https://openeuler.or Subscribe Body: NA Currently, there are two types of mail subjects: announce and discussion. The method of sending a discussion email to a list is the same as that of sending emails to private addresses0 码力 | 36 页 | 3.40 MB | 1 年前3 openEuler 21.09 技术白皮书Application Scenarios In the HPC test of Weather Research and Forecasting (WRF) and Microsystems Engineering and Materials Science (NEMO) applications, Kunpeng GCC delivers 10% higher performance than GCC including mailing lists, can be found in the relevant README files. Mailing List You can start a discussion on an open topic by sending an email to the relevant mailing list. Visit https://openeuler.or Subscribe Body: NA Currently, there are two types of mail subjects: announce and discussion. The method of sending a discussion email to a list is the same as that of sending emails to private addresses0 码力 | 36 页 | 3.40 MB | 1 年前3
 openEuler 21.03 技术白皮书Technical White Paper interaction functions for openEuler 21.03. Feature Description 1. Control panel: Allows developers to perform basic system settings, such as date and time, personalized settings Manager (thunar): Manages Xfce files. • Menu Library (garcon): Provides the menu library. • Panel (xfce4-panel): Launches applications, switches between opened windows, program menu, and switches workspaces including mailing lists, can be found in the relevant README files. Mailing List You can start a discussion on an open topic by sending an email to the relevant mailing list. Visit https://openeuler.or0 码力 | 21 页 | 948.66 KB | 1 年前3 openEuler 21.03 技术白皮书Technical White Paper interaction functions for openEuler 21.03. Feature Description 1. Control panel: Allows developers to perform basic system settings, such as date and time, personalized settings Manager (thunar): Manages Xfce files. • Menu Library (garcon): Provides the menu library. • Panel (xfce4-panel): Launches applications, switches between opened windows, program menu, and switches workspaces including mailing lists, can be found in the relevant README files. Mailing List You can start a discussion on an open topic by sending an email to the relevant mailing list. Visit https://openeuler.or0 码力 | 21 页 | 948.66 KB | 1 年前3
 Blender v4.1 Manualbut by learning and practicing subjects such as human anatomy, composition, lighting, animation principles, etc. 3D creation software such as Blender have an added technical complexity and jargon associated interested in helping develop Blender, see the Get Involved page. Blender Chat For real-time discussion, we have blender.chat which uses Blender ID for authentication. You can join these channels: discuss Blender development. #python For support for developers using the Python API. #docs For discussion related to Blender’s documentation. Other Useful Links Blender FAQ (Can I use Blender commercially0 码力 | 6263 页 | 303.71 MB | 1 年前3 Blender v4.1 Manualbut by learning and practicing subjects such as human anatomy, composition, lighting, animation principles, etc. 3D creation software such as Blender have an added technical complexity and jargon associated interested in helping develop Blender, see the Get Involved page. Blender Chat For real-time discussion, we have blender.chat which uses Blender ID for authentication. You can join these channels: discuss Blender development. #python For support for developers using the Python API. #docs For discussion related to Blender’s documentation. Other Useful Links Blender FAQ (Can I use Blender commercially0 码力 | 6263 页 | 303.71 MB | 1 年前3
 使用Chaos Mesh来保障云原生系统的健壮性-周强 Incident happens on MySQL Github Incident happends on Github Chaos Engineering Chaos Engineering is the discipline of experimenting on a system in order to build confidence in the Netflix / AWS / Tencent / Netease in practice of Chaos Engineering 2010 2019 2015 Principles of Chaos Engineering Chaos Engineering In TiDB TiD B TiD B TiD B Application via MySQL found !!! chaos-mesh.org Example Chaos Mesh Chaos In ChaosMesh Comparison of Chaos Engineering Platforms Apply using kubectl apiVersion: chaos-mesh.org/v1alpha1 kind: NetworkChaos metadata:0 码力 | 28 页 | 986.42 KB | 6 月前3 使用Chaos Mesh来保障云原生系统的健壮性-周强 Incident happens on MySQL Github Incident happends on Github Chaos Engineering Chaos Engineering is the discipline of experimenting on a system in order to build confidence in the Netflix / AWS / Tencent / Netease in practice of Chaos Engineering 2010 2019 2015 Principles of Chaos Engineering Chaos Engineering In TiDB TiD B TiD B TiD B Application via MySQL found !!! chaos-mesh.org Example Chaos Mesh Chaos In ChaosMesh Comparison of Chaos Engineering Platforms Apply using kubectl apiVersion: chaos-mesh.org/v1alpha1 kind: NetworkChaos metadata:0 码力 | 28 页 | 986.42 KB | 6 月前3
 超大规模高可用性云端系统构建之禅-蔡超down” Client: “Get back to me, after one minute.” Chaos Engineering “If something hurts, do it more often!” Chaos under control Chaos Engineering • You learn how to fix the things that often break Inject latency Inject failure Chaos Engineering Set expected SLA Inject Failures Measure services meet SLA? E S Improve system Chaos Engineering Principles • Build a Hypothesis around Steady State Instance mic ros erv ic e s t at eles s q u i c k r e s t a r t fault tolerance c haos engineering Reserved Instance Spot Fleet Auto Scaling Fault and Recovery Oriented Architecture Spot Instance0 码力 | 40 页 | 6.52 MB | 1 年前3 超大规模高可用性云端系统构建之禅-蔡超down” Client: “Get back to me, after one minute.” Chaos Engineering “If something hurts, do it more often!” Chaos under control Chaos Engineering • You learn how to fix the things that often break Inject latency Inject failure Chaos Engineering Set expected SLA Inject Failures Measure services meet SLA? E S Improve system Chaos Engineering Principles • Build a Hypothesis around Steady State Instance mic ros erv ic e s t at eles s q u i c k r e s t a r t fault tolerance c haos engineering Reserved Instance Spot Fleet Auto Scaling Fault and Recovery Oriented Architecture Spot Instance0 码力 | 40 页 | 6.52 MB | 1 年前3
 httpd 2.2.29 中文文档so-called HTTP request-smuggling attacks. This document is not the correct place for an in-depth discussion of HTTP request smuggling (instead, try your favourite search engine) however it is important to MultiViews directive to accomplish the negotiation. See the Content Negotiation documentation for a full discussion of the methods of negotiation, and instructions for creating type-map files. Memory-mapping In when and how to use name-based virtual hosts. See also IP-based Virtual Host Support An In-Depth Discussion of Virtual Host Matching Dynamically configured mass virtual hosting Virtual Host examples for0 码力 | 1854 页 | 1.48 MB | 1 年前3 httpd 2.2.29 中文文档so-called HTTP request-smuggling attacks. This document is not the correct place for an in-depth discussion of HTTP request smuggling (instead, try your favourite search engine) however it is important to MultiViews directive to accomplish the negotiation. See the Content Negotiation documentation for a full discussion of the methods of negotiation, and instructions for creating type-map files. Memory-mapping In when and how to use name-based virtual hosts. See also IP-based Virtual Host Support An In-Depth Discussion of Virtual Host Matching Dynamically configured mass virtual hosting Virtual Host examples for0 码力 | 1854 页 | 1.48 MB | 1 年前3
 httpd 2.2.27 中文文档so-called HTTP request-smuggling attacks. This document is not the correct place for an in-depth discussion of HTTP request smuggling (instead, try your favourite search engine) however it is important to MultiViews directive to accomplish the negotiation. See the Content Negotiation documentation for a full discussion of the methods of negotiation, and instructions for creating type-map files. Memory-mapping In when and how to use name-based virtual hosts. See also IP-based Virtual Host Support An In-Depth Discussion of Virtual Host Matching Dynamically configured mass virtual hosting Virtual Host examples for0 码力 | 1849 页 | 1.47 MB | 1 年前3 httpd 2.2.27 中文文档so-called HTTP request-smuggling attacks. This document is not the correct place for an in-depth discussion of HTTP request smuggling (instead, try your favourite search engine) however it is important to MultiViews directive to accomplish the negotiation. See the Content Negotiation documentation for a full discussion of the methods of negotiation, and instructions for creating type-map files. Memory-mapping In when and how to use name-based virtual hosts. See also IP-based Virtual Host Support An In-Depth Discussion of Virtual Host Matching Dynamically configured mass virtual hosting Virtual Host examples for0 码力 | 1849 页 | 1.47 MB | 1 年前3
 httpd 2.2.31 中文文档so-called HTTP request-smuggling attacks. This document is not the correct place for an in-depth discussion of HTTP request smuggling (instead, try your favourite search engine) however it is important to MultiViews directive to accomplish the negotiation. See the Content Negotiation documentation for a full discussion of the methods of negotiation, and instructions for creating type-map files. Memory-mapping In when and how to use name-based virtual hosts. See also IP-based Virtual Host Support An In-Depth Discussion of Virtual Host Matching Dynamically configured mass virtual hosting Virtual Host examples for0 码力 | 1860 页 | 1.48 MB | 1 年前3 httpd 2.2.31 中文文档so-called HTTP request-smuggling attacks. This document is not the correct place for an in-depth discussion of HTTP request smuggling (instead, try your favourite search engine) however it is important to MultiViews directive to accomplish the negotiation. See the Content Negotiation documentation for a full discussion of the methods of negotiation, and instructions for creating type-map files. Memory-mapping In when and how to use name-based virtual hosts. See also IP-based Virtual Host Support An In-Depth Discussion of Virtual Host Matching Dynamically configured mass virtual hosting Virtual Host examples for0 码力 | 1860 页 | 1.48 MB | 1 年前3
 httpd 2.2.27.dev 中文文档so-called HTTP request-smuggling attacks. This document is not the correct place for an in-depth discussion of HTTP request smuggling (instead, try your favourite search engine) however it is important to MultiViews directive to accomplish the negotiation. See the Content Negotiation documentation for a full discussion of the methods of negotiation, and instructions for creating type-map files. Memory-mapping In when and how to use name-based virtual hosts. See also IP-based Virtual Host Support An In-Depth Discussion of Virtual Host Matching Dynamically configured mass virtual hosting Virtual Host examples for0 码力 | 1849 页 | 1.47 MB | 1 年前3 httpd 2.2.27.dev 中文文档so-called HTTP request-smuggling attacks. This document is not the correct place for an in-depth discussion of HTTP request smuggling (instead, try your favourite search engine) however it is important to MultiViews directive to accomplish the negotiation. See the Content Negotiation documentation for a full discussion of the methods of negotiation, and instructions for creating type-map files. Memory-mapping In when and how to use name-based virtual hosts. See also IP-based Virtual Host Support An In-Depth Discussion of Virtual Host Matching Dynamically configured mass virtual hosting Virtual Host examples for0 码力 | 1849 页 | 1.47 MB | 1 年前3
共 300 条
- 1
- 2
- 3
- 4
- 5
- 6
- 30














 
 