Submit Search
Upload
Apend. kernel
•
Download as PPT, PDF
•
0 likes
•
188 views
Acácio Oliveira
Follow
kernel
Read less
Read more
Technology
Slideshow view
Report
Share
Slideshow view
Report
Share
1 of 8
Download now
Recommended
kernel
101 apend. kernel
101 apend. kernel
Acácio Oliveira
boot the system
101 1.2 boot the system
101 1.2 boot the system
Acácio Oliveira
troubleshooting tools
101 apend. troubleshooting tools v2
101 apend. troubleshooting tools v2
Acácio Oliveira
troubleshooting tools
4.9 apend troubleshooting tools v2
4.9 apend troubleshooting tools v2
Acácio Oliveira
control mounting and unmounting of filesystems
101 4.3 control mounting and unmounting of filesystems v2
101 4.3 control mounting and unmounting of filesystems v2
Acácio Oliveira
control mounting and unmounting of filesystems
4.3 control mounting and unmounting of filesystems v2
4.3 control mounting and unmounting of filesystems v2
Acácio Oliveira
Linux System
Linux System
SysPlay eLearning Academy for You
manage disk quotas
101 4.4 manage disk quotas
101 4.4 manage disk quotas
Acácio Oliveira
Recommended
kernel
101 apend. kernel
101 apend. kernel
Acácio Oliveira
boot the system
101 1.2 boot the system
101 1.2 boot the system
Acácio Oliveira
troubleshooting tools
101 apend. troubleshooting tools v2
101 apend. troubleshooting tools v2
Acácio Oliveira
troubleshooting tools
4.9 apend troubleshooting tools v2
4.9 apend troubleshooting tools v2
Acácio Oliveira
control mounting and unmounting of filesystems
101 4.3 control mounting and unmounting of filesystems v2
101 4.3 control mounting and unmounting of filesystems v2
Acácio Oliveira
control mounting and unmounting of filesystems
4.3 control mounting and unmounting of filesystems v2
4.3 control mounting and unmounting of filesystems v2
Acácio Oliveira
Linux System
Linux System
SysPlay eLearning Academy for You
manage disk quotas
101 4.4 manage disk quotas
101 4.4 manage disk quotas
Acácio Oliveira
manage disk quotas
4.4 manage disk quotas
4.4 manage disk quotas
Acácio Oliveira
quickguide-einnovator-10-redis-admin
quickguide-einnovator-10-redis-admin
jorgesimao71
Most used AIX Command
Aix commands
Aix commands
SarowarMortoza
Serial Peripheral Interface Drivers
SPI Drivers
SPI Drivers
SysPlay eLearning Academy for You
12 yum
12 yum
josemanuelacostarendon
Booting Process of BeagleBoard-xM
BeagleBoard-xM Booting Process
BeagleBoard-xM Booting Process
SysPlay eLearning Academy for You
Block Drivers
Block Drivers
Anil Kumar Pugalia
AIX Advanced Administration Training. Troubleshooting, Installing, Managing AIX.
AIX Advanced Administration Knowledge Share
AIX Advanced Administration Knowledge Share
.Gastón. .Bx.
Serial Peripheral Interface Drivers
SPI Drivers
SPI Drivers
SysPlay eLearning Academy for You
Board Bringup
Board Bringup
Anil Kumar Pugalia
Embedded Storage Management
Embedded Storage Management
Anil Kumar Pugalia
Introduction to Linux Drivers
Introduction to Linux Drivers
Anil Kumar Pugalia
Processes
Processes
Anil Kumar Pugalia
Introduction to Linux
Introduction to Linux
Anil Kumar Pugalia
DMA Management in Linux
Linux DMA Engine
Linux DMA Engine
SysPlay eLearning Academy for You
Video Drivers
Video Drivers
Anil Kumar Pugalia
Miscellaneous Programming APIs in Linux Kernel
Kernel Programming
Kernel Programming
Anil Kumar Pugalia
BeagleBone Black Bootloaders
BeagleBone Black Bootloaders
BeagleBone Black Bootloaders
SysPlay eLearning Academy for You
BeagleBone Black Bootloaders
BeagleBone Black Bootloaders
BeagleBone Black Bootloaders
SysPlay eLearning Academy for You
File System Modules in Linux
File System Modules
File System Modules
Anil Kumar Pugalia
tuning and performance
101 apend. tuning and performance
101 apend. tuning and performance
Acácio Oliveira
tuning and performance
4.9.a apend tuning and performance
4.9.a apend tuning and performance
Acácio Oliveira
More Related Content
What's hot
manage disk quotas
4.4 manage disk quotas
4.4 manage disk quotas
Acácio Oliveira
quickguide-einnovator-10-redis-admin
quickguide-einnovator-10-redis-admin
jorgesimao71
Most used AIX Command
Aix commands
Aix commands
SarowarMortoza
Serial Peripheral Interface Drivers
SPI Drivers
SPI Drivers
SysPlay eLearning Academy for You
12 yum
12 yum
josemanuelacostarendon
Booting Process of BeagleBoard-xM
BeagleBoard-xM Booting Process
BeagleBoard-xM Booting Process
SysPlay eLearning Academy for You
Block Drivers
Block Drivers
Anil Kumar Pugalia
AIX Advanced Administration Training. Troubleshooting, Installing, Managing AIX.
AIX Advanced Administration Knowledge Share
AIX Advanced Administration Knowledge Share
.Gastón. .Bx.
Serial Peripheral Interface Drivers
SPI Drivers
SPI Drivers
SysPlay eLearning Academy for You
Board Bringup
Board Bringup
Anil Kumar Pugalia
Embedded Storage Management
Embedded Storage Management
Anil Kumar Pugalia
Introduction to Linux Drivers
Introduction to Linux Drivers
Anil Kumar Pugalia
Processes
Processes
Anil Kumar Pugalia
Introduction to Linux
Introduction to Linux
Anil Kumar Pugalia
DMA Management in Linux
Linux DMA Engine
Linux DMA Engine
SysPlay eLearning Academy for You
Video Drivers
Video Drivers
Anil Kumar Pugalia
Miscellaneous Programming APIs in Linux Kernel
Kernel Programming
Kernel Programming
Anil Kumar Pugalia
BeagleBone Black Bootloaders
BeagleBone Black Bootloaders
BeagleBone Black Bootloaders
SysPlay eLearning Academy for You
BeagleBone Black Bootloaders
BeagleBone Black Bootloaders
BeagleBone Black Bootloaders
SysPlay eLearning Academy for You
File System Modules in Linux
File System Modules
File System Modules
Anil Kumar Pugalia
What's hot
(20)
4.4 manage disk quotas
4.4 manage disk quotas
quickguide-einnovator-10-redis-admin
quickguide-einnovator-10-redis-admin
Aix commands
Aix commands
SPI Drivers
SPI Drivers
12 yum
12 yum
BeagleBoard-xM Booting Process
BeagleBoard-xM Booting Process
Block Drivers
Block Drivers
AIX Advanced Administration Knowledge Share
AIX Advanced Administration Knowledge Share
SPI Drivers
SPI Drivers
Board Bringup
Board Bringup
Embedded Storage Management
Embedded Storage Management
Introduction to Linux Drivers
Introduction to Linux Drivers
Processes
Processes
Introduction to Linux
Introduction to Linux
Linux DMA Engine
Linux DMA Engine
Video Drivers
Video Drivers
Kernel Programming
Kernel Programming
BeagleBone Black Bootloaders
BeagleBone Black Bootloaders
BeagleBone Black Bootloaders
BeagleBone Black Bootloaders
File System Modules
File System Modules
Similar to Apend. kernel
tuning and performance
101 apend. tuning and performance
101 apend. tuning and performance
Acácio Oliveira
tuning and performance
4.9.a apend tuning and performance
4.9.a apend tuning and performance
Acácio Oliveira
maintain the integrity of filesystems
4.2 maintain the integrity of filesystems
4.2 maintain the integrity of filesystems
Acácio Oliveira
maintain the integrity of filesystems
101 4.2 maintain the integrity of filesystems
101 4.2 maintain the integrity of filesystems
Acácio Oliveira
maintain the integrity of filesystems
101 4.2 maintain the integrity of filesystems
101 4.2 maintain the integrity of filesystems
Acácio Oliveira
manage disk quotas
101 4.4 manage disk quotas
101 4.4 manage disk quotas
Acácio Oliveira
software installation
2.4.0 software installation v2
2.4.0 software installation v2
Acácio Oliveira
software installation
101 2.4a apend software installation v2
101 2.4a apend software installation v2
Acácio Oliveira
networking linux
Apend. networking linux
Apend. networking linux
Acácio Oliveira
runlevels, shutdown, and reboot
1.3 runlevels, shutdown, and reboot v3
1.3 runlevels, shutdown, and reboot v3
Acácio Oliveira
networking linux
101 apend. networking linux
101 apend. networking linux
Acácio Oliveira
create, monitor and kill processes
101 3.5 create, monitor and kill processes v2
101 3.5 create, monitor and kill processes v2
Acácio Oliveira
runlevels , shutdown, and reboot
101 1.3 runlevels , shutdown, and reboot
101 1.3 runlevels , shutdown, and reboot
Acácio Oliveira
runlevels, shutdown, and reboot
101 1.3 runlevels, shutdown, and reboot v2
101 1.3 runlevels, shutdown, and reboot v2
Acácio Oliveira
boot the system
1.2 boot the system v2
1.2 boot the system v2
Acácio Oliveira
manage file permissions and ownership
101 4.5 manage file permissions and ownership
101 4.5 manage file permissions and ownership
Acácio Oliveira
create partitions and filesystems
101 4.1 create partitions and filesystems
101 4.1 create partitions and filesystems
Acácio Oliveira
use rpm and yum package management
2.5 use rpm and yum package management
2.5 use rpm and yum package management
Acácio Oliveira
perform basic file editing operations using vi
3.8 perform basic file editing operations using vi
3.8 perform basic file editing operations using vi
Acácio Oliveira
Mobile Hacking using Linux Drivers
Mobile Hacking using Linux Drivers
Anil Kumar Pugalia
Similar to Apend. kernel
(20)
101 apend. tuning and performance
101 apend. tuning and performance
4.9.a apend tuning and performance
4.9.a apend tuning and performance
4.2 maintain the integrity of filesystems
4.2 maintain the integrity of filesystems
101 4.2 maintain the integrity of filesystems
101 4.2 maintain the integrity of filesystems
101 4.2 maintain the integrity of filesystems
101 4.2 maintain the integrity of filesystems
101 4.4 manage disk quotas
101 4.4 manage disk quotas
2.4.0 software installation v2
2.4.0 software installation v2
101 2.4a apend software installation v2
101 2.4a apend software installation v2
Apend. networking linux
Apend. networking linux
1.3 runlevels, shutdown, and reboot v3
1.3 runlevels, shutdown, and reboot v3
101 apend. networking linux
101 apend. networking linux
101 3.5 create, monitor and kill processes v2
101 3.5 create, monitor and kill processes v2
101 1.3 runlevels , shutdown, and reboot
101 1.3 runlevels , shutdown, and reboot
101 1.3 runlevels, shutdown, and reboot v2
101 1.3 runlevels, shutdown, and reboot v2
1.2 boot the system v2
1.2 boot the system v2
101 4.5 manage file permissions and ownership
101 4.5 manage file permissions and ownership
101 4.1 create partitions and filesystems
101 4.1 create partitions and filesystems
2.5 use rpm and yum package management
2.5 use rpm and yum package management
3.8 perform basic file editing operations using vi
3.8 perform basic file editing operations using vi
Mobile Hacking using Linux Drivers
Mobile Hacking using Linux Drivers
More from Acácio Oliveira
Security+ Lesson 01 Topic 24 - Vulnerability Scanning vs Pen Testing.pptx
Security+ Lesson 01 Topic 24 - Vulnerability Scanning vs Pen Testing.pptx
Security+ Lesson 01 Topic 24 - Vulnerability Scanning vs Pen Testing.pptx
Acácio Oliveira
Security+ Lesson 01 Topic 25 - Application Security Controls and Techniques.pptx
Security+ Lesson 01 Topic 25 - Application Security Controls and Techniques.pptx
Security+ Lesson 01 Topic 25 - Application Security Controls and Techniques.pptx
Acácio Oliveira
Security+ Lesson 01 Topic 21 - Types of Application Attacks.pptx
Security+ Lesson 01 Topic 21 - Types of Application Attacks.pptx
Security+ Lesson 01 Topic 21 - Types of Application Attacks.pptx
Acácio Oliveira
Security+ Lesson 01 Topic 19 - Summary of Social Engineering Attacks.pptx
Security+ Lesson 01 Topic 19 - Summary of Social Engineering Attacks.pptx
Security+ Lesson 01 Topic 19 - Summary of Social Engineering Attacks.pptx
Acácio Oliveira
Security+ Lesson 01 Topic 23 - Overview of Security Assessment Tools.pptx
Security+ Lesson 01 Topic 23 - Overview of Security Assessment Tools.pptx
Security+ Lesson 01 Topic 23 - Overview of Security Assessment Tools.pptx
Acácio Oliveira
Security+ Lesson 01 Topic 20 - Summary of Wireless Attacks.pptx
Security+ Lesson 01 Topic 20 - Summary of Wireless Attacks.pptx
Security+ Lesson 01 Topic 20 - Summary of Wireless Attacks.pptx
Acácio Oliveira
Security+ Lesson 01 Topic 22 - Security Enhancement Techniques.pptx
Security+ Lesson 01 Topic 22 - Security Enhancement Techniques.pptx
Security+ Lesson 01 Topic 22 - Security Enhancement Techniques.pptx
Acácio Oliveira
Security+ Lesson 01 Topic 15 - Risk Management Best Practices.pptx
Security+ Lesson 01 Topic 15 - Risk Management Best Practices.pptx
Security+ Lesson 01 Topic 15 - Risk Management Best Practices.pptx
Acácio Oliveira
Security+ Lesson 01 Topic 13 - Physical Security and Environmental Controls.pptx
Security+ Lesson 01 Topic 13 - Physical Security and Environmental Controls.pptx
Security+ Lesson 01 Topic 13 - Physical Security and Environmental Controls.pptx
Acácio Oliveira
Security+ Lesson 01 Topic 14 - Disaster Recovery Concepts.pptx
Security+ Lesson 01 Topic 14 - Disaster Recovery Concepts.pptx
Security+ Lesson 01 Topic 14 - Disaster Recovery Concepts.pptx
Acácio Oliveira
Security+ Lesson 01 Topic 06 - Wireless Security Considerations.pptx
Security+ Lesson 01 Topic 06 - Wireless Security Considerations.pptx
Security+ Lesson 01 Topic 06 - Wireless Security Considerations.pptx
Acácio Oliveira
Security+ Lesson 01 Topic 04 - Secure Network Design Elements and Components.pptx
Security+ Lesson 01 Topic 04 - Secure Network Design Elements and Components....
Security+ Lesson 01 Topic 04 - Secure Network Design Elements and Components....
Acácio Oliveira
Security+ Lesson 01 Topic 02 - Secure Network Administration Concepts.pptx
Security+ Lesson 01 Topic 02 - Secure Network Administration Concepts.pptx
Security+ Lesson 01 Topic 02 - Secure Network Administration Concepts.pptx
Acácio Oliveira
Security+ Lesson 01 Topic 01 - Intro to Network Devices.pptx
Security+ Lesson 01 Topic 01 - Intro to Network Devices.pptx
Security+ Lesson 01 Topic 01 - Intro to Network Devices.pptx
Acácio Oliveira
Security+ Lesson 01 Topic 08 - Integrating Data and Systems with Third Parties.pptx
Security+ Lesson 01 Topic 08 - Integrating Data and Systems with Third Partie...
Security+ Lesson 01 Topic 08 - Integrating Data and Systems with Third Partie...
Acácio Oliveira
Security+ Lesson 01 Topic 07 - Risk Related Concepts.pptx
Security+ Lesson 01 Topic 07 - Risk Related Concepts.pptx
Security+ Lesson 01 Topic 07 - Risk Related Concepts.pptx
Acácio Oliveira
Security+ Lesson 01 Topic 05 - Common Network Protocols.pptx
Security+ Lesson 01 Topic 05 - Common Network Protocols.pptx
Security+ Lesson 01 Topic 05 - Common Network Protocols.pptx
Acácio Oliveira
Security+ Lesson 01 Topic 11 - Incident Response Concepts.pptx
Security+ Lesson 01 Topic 11 - Incident Response Concepts.pptx
Security+ Lesson 01 Topic 11 - Incident Response Concepts.pptx
Acácio Oliveira
Security+ Lesson 01 Topic 12 - Security Related Awareness and Training.pptx
Security+ Lesson 01 Topic 12 - Security Related Awareness and Training.pptx
Security+ Lesson 01 Topic 12 - Security Related Awareness and Training.pptx
Acácio Oliveira
Security+ Lesson 01 Topic 17 - Types of Malware.pptx
Security+ Lesson 01 Topic 17 - Types of Malware.pptx
Security+ Lesson 01 Topic 17 - Types of Malware.pptx
Acácio Oliveira
More from Acácio Oliveira
(20)
Security+ Lesson 01 Topic 24 - Vulnerability Scanning vs Pen Testing.pptx
Security+ Lesson 01 Topic 24 - Vulnerability Scanning vs Pen Testing.pptx
Security+ Lesson 01 Topic 25 - Application Security Controls and Techniques.pptx
Security+ Lesson 01 Topic 25 - Application Security Controls and Techniques.pptx
Security+ Lesson 01 Topic 21 - Types of Application Attacks.pptx
Security+ Lesson 01 Topic 21 - Types of Application Attacks.pptx
Security+ Lesson 01 Topic 19 - Summary of Social Engineering Attacks.pptx
Security+ Lesson 01 Topic 19 - Summary of Social Engineering Attacks.pptx
Security+ Lesson 01 Topic 23 - Overview of Security Assessment Tools.pptx
Security+ Lesson 01 Topic 23 - Overview of Security Assessment Tools.pptx
Security+ Lesson 01 Topic 20 - Summary of Wireless Attacks.pptx
Security+ Lesson 01 Topic 20 - Summary of Wireless Attacks.pptx
Security+ Lesson 01 Topic 22 - Security Enhancement Techniques.pptx
Security+ Lesson 01 Topic 22 - Security Enhancement Techniques.pptx
Security+ Lesson 01 Topic 15 - Risk Management Best Practices.pptx
Security+ Lesson 01 Topic 15 - Risk Management Best Practices.pptx
Security+ Lesson 01 Topic 13 - Physical Security and Environmental Controls.pptx
Security+ Lesson 01 Topic 13 - Physical Security and Environmental Controls.pptx
Security+ Lesson 01 Topic 14 - Disaster Recovery Concepts.pptx
Security+ Lesson 01 Topic 14 - Disaster Recovery Concepts.pptx
Security+ Lesson 01 Topic 06 - Wireless Security Considerations.pptx
Security+ Lesson 01 Topic 06 - Wireless Security Considerations.pptx
Security+ Lesson 01 Topic 04 - Secure Network Design Elements and Components....
Security+ Lesson 01 Topic 04 - Secure Network Design Elements and Components....
Security+ Lesson 01 Topic 02 - Secure Network Administration Concepts.pptx
Security+ Lesson 01 Topic 02 - Secure Network Administration Concepts.pptx
Security+ Lesson 01 Topic 01 - Intro to Network Devices.pptx
Security+ Lesson 01 Topic 01 - Intro to Network Devices.pptx
Security+ Lesson 01 Topic 08 - Integrating Data and Systems with Third Partie...
Security+ Lesson 01 Topic 08 - Integrating Data and Systems with Third Partie...
Security+ Lesson 01 Topic 07 - Risk Related Concepts.pptx
Security+ Lesson 01 Topic 07 - Risk Related Concepts.pptx
Security+ Lesson 01 Topic 05 - Common Network Protocols.pptx
Security+ Lesson 01 Topic 05 - Common Network Protocols.pptx
Security+ Lesson 01 Topic 11 - Incident Response Concepts.pptx
Security+ Lesson 01 Topic 11 - Incident Response Concepts.pptx
Security+ Lesson 01 Topic 12 - Security Related Awareness and Training.pptx
Security+ Lesson 01 Topic 12 - Security Related Awareness and Training.pptx
Security+ Lesson 01 Topic 17 - Types of Malware.pptx
Security+ Lesson 01 Topic 17 - Types of Malware.pptx
Recently uploaded
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows. We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases. This video focuses on the deployment of external web forms using Jotform for Bonterra Impact Management. This solution can be customized to your organization’s needs and deployed to support the common use cases below: - Intake and consent - Assessments - Surveys - Applications - Program registration Interested in deploying web form automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Jeffrey Haguewood
RailsConf 2024 - Insights Gained From Developing A Hybrid Application Using Turbo-Native and Strada.
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard37
Workshop Build With AI - Google Developers Group Rio Verde
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
Sandro Moreira
Dubai, known for its towering skyscrapers, luxurious lifestyle, and relentless pursuit of innovation, often finds itself in the global spotlight. However, amidst the glitz and glamour, the emirate faces its own set of challenges, including the occasional threat of flooding. In recent years, Dubai has experienced sporadic but significant floods, disrupting normalcy and posing unique challenges to its infrastructure. Among the critical nodes in this bustling metropolis is the Dubai International Airport, a vital hub connecting the world. This article delves into the intersection of Dubai flood events and the resilience demonstrated by the Dubai International Airport in the face of such challenges.
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Orbitshub
Three things you will take away from the session: • How to run an effective tenant-to-tenant migration • Best practices for before, during, and after migration • Tips for using migration as a springboard to prepare for Copilot in Microsoft 365 Main ideas: Migration Overview: The presentation covers the current reality of cross-tenant migrations, the triggers, phases, best practices, and benefits of a successful tenant migration Considerations: When considering a migration, it is important to consider the migration scope, performance, customization, flexibility, user-friendly interface, automation, monitoring, support, training, scalability, data integrity, data security, cost, and licensing structure Next Wave: The next wave of change includes the launch of Copilot, which requires businesses to be prepared for upcoming changes related to Copilot and the cloud, and to consolidate data and tighten governance ShareGate: ShareGate can help with pre-migration analysis, configurable migration tool, and automated, end-user driven collaborative governance
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
sammart93
Join our latest Connector Corner webinar to discover how UiPath Integration Service revolutionizes API-centric automation in a 'Quote to Cash' process—and how that automation empowers businesses to accelerate revenue generation. A comprehensive demo will explore connecting systems, GenAI, and people, through powerful pre-built connectors designed to speed process cycle times. Speakers: James Dickson, Senior Software Engineer Charlie Greenberg, Host, Product Marketing Manager
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
DianaGray10
Uncertainty, Acting under uncertainty, Basic probability notation, Bayes’ Rule,
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
Khushali Kathiriya
💥 You’re lucky! We’ve found two different (lead) developers that are willing to share their valuable lessons learned about using UiPath Document Understanding! Based on recent implementations in appealing use cases at Partou and SPIE. Don’t expect fancy videos or slide decks, but real and practical experiences that will help you with your own implementations. 📕 Topics that will be addressed: • Training the ML-model by humans: do or don't? • Rule-based versus AI extractors • Tips for finding use cases • How to start 👨🏫👨💻 Speakers: o Dion Morskieft, RPA Product Owner @Partou o Jack Klein-Schiphorst, Automation Developer @Tacstone Technology
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
UiPathCommunity
The value of a flexible API Management solution for Open Banking Steve Melan, Manager for IT Innovation and Architecture - State's and Saving's Bank of Luxembourg Apidays New York 2024: The API Economy in the AI Era (April 30 & May 1, 2024) ------ Check out our conferences at https://www.apidays.global/ Do you want to sponsor or talk at one of our conferences? https://apidays.typeform.com/to/ILJeAaV8 Learn more on APIscene, the global media made by the community for the community: https://www.apiscene.io Explore the API ecosystem with the API Landscape: https://apilandscape.apiscene.io/
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
apidays
This reviewer is for the second quarter of Empowerment Technology / ICT in Grade 11
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
MadyBayot
In this keynote, Asanka Abeysinghe, CTO,WSO2 will explore the shift towards platformless technology ecosystems and their importance in driving digital adaptability and innovation. We will discuss strategies for leveraging decentralized architectures and integrating diverse technologies, with a focus on building resilient, flexible, and future-ready IT infrastructures. We will also highlight WSO2's roadmap, emphasizing our commitment to supporting this transformative journey with our evolving product suite.
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
WSO2
Six common myths about ontology engineering, knowledge graphs, and knowledge representation.
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
johnbeverley2021
Architecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
The Good, the Bad and the Governed - Why is governance a dirty word? David O'Neill, Chief Operating Officer - APIContext Apidays New York 2024: The API Economy in the AI Era (April 30 & May 1, 2024) ------ Check out our conferences at https://www.apidays.global/ Do you want to sponsor or talk at one of our conferences? https://apidays.typeform.com/to/ILJeAaV8 Learn more on APIscene, the global media made by the community for the community: https://www.apiscene.io Explore the API ecosystem with the API Landscape: https://apilandscape.apiscene.io/
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
apidays
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
Christopher Logan Kennedy
Scaling API-first – The story of a global engineering organization Ian Reasor, Senior Computer Scientist - Adobe Radu Cotescu, Senior Computer Scientist - Adobe Apidays New York 2024: The API Economy in the AI Era (April 30 & May 1, 2024) ------ Check out our conferences at https://www.apidays.global/ Do you want to sponsor or talk at one of our conferences? https://apidays.typeform.com/to/ILJeAaV8 Learn more on APIscene, the global media made by the community for the community: https://www.apiscene.io Explore the API ecosystem with the API Landscape: https://apilandscape.apiscene.io/
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
apidays
ICT role in education and it's challenges. In which we learn about ICT, it's impact, benefits and challenges.
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
rafiqahmad00786416
Retrieval augmented generation (RAG) is the most popular style of large language model application to emerge from 2023. The most basic style of RAG works by vectorizing your data and injecting it into a vector database like Milvus for retrieval to augment the text output generated by an LLM. This is just the beginning. One of the ways that we can extend RAG, and extend AI, is through multilingual use cases. Typical RAG is done in English using embedding models that are trained in English. In this talk, we’ll explore how RAG could work in languages other than English. We’ll explore French, Chinese, and Polish.
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Zilliz
Explore how multimodal embeddings work with Milvus. We will see how you can explore a popular multimodal model - CLIP - on a popular dataset - CIFAR 10. You use CLIP to create the embeddings of the input data, Milvus to store the embeddings of the multimodal data (sometimes termed “multimodal embeddings”), and we will then explore the embeddings.
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
Zilliz
MINDCTI Revenue Release Quarter 1 2024
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
MIND CTI
Recently uploaded
(20)
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
Architecting Cloud Native Applications
Architecting Cloud Native Applications
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
Apend. kernel
1.
CoreLinuxforRedHatandFedoralearningunderGNUFreeDocumentationLicense-Copyleft(c)AcácioOliveira2012 Everyoneispermittedtocopyanddistributeverbatimcopiesofthislicensedocument,changingisallowed System Administration
2.
CoreLinuxforRedHatandFedoralearningunderGNUFreeDocumentationLicense-Copyleft(c)AcácioOliveira2012 Everyoneispermittedtocopyanddistributeverbatimcopiesofthislicensedocument,changingisallowed Key Knowledge Areas Process
of kernel of the operating system kernel kernel Terms and Utilities kernel lsmod rmmod insmod modprobe depmod sysctl 2
3.
CoreLinuxforRedHatandFedoralearningunderGNUFreeDocumentationLicense-Copyleft(c)AcácioOliveira2012 Everyoneispermittedtocopyanddistributeverbatimcopiesofthislicensedocument,changingisallowed Overview 3 The kernel represents
the core of the operating system. Major components: •Scheduler •Memory manager •Device drivers •Filesystems •Networking Kernel Linux kernel is modular allowing functional blocks of software to be added or removed on fly via modules mechanism. Modules encompass functions such as: Device drivers Kernel features - firewalls, RAID, LVM Filesystems
4.
CoreLinuxforRedHatandFedoralearningunderGNUFreeDocumentationLicense-Copyleft(c)AcácioOliveira2012 Everyoneispermittedtocopyanddistributeverbatimcopiesofthislicensedocument,changingisallowed LSMOD 4 Kernel lsmod Prints all
of the currently loaded modules [root@dev1 ~]# lsmod Module Size Used by ipv6 264608 20 binfmt_misc 14096 1 dm_multipath 21136 0 parport_pc 31724 0 lp 16576 0 parport 42252 2 parport_pc,lp usbcore 129724 1 ext3 125968 1 jbd 61928 1 ext3 raid10 23808 0 raid456 119840 0 xor 10512 1 raid456 raid1 24064 0 raid0 10752 0 multipath 11776 0 linear 9088 0 dm_mirror 23016 0 dm_snapshot 18872 0 dm_mod 55752 3 dm_multipath,dm_mirror,dm_snapshot processor 26412 0 fuse 42160 1 Ex:
5.
CoreLinuxforRedHatandFedoralearningunderGNUFreeDocumentationLicense-Copyleft(c)AcácioOliveira2012 Everyoneispermittedtocopyanddistributeverbatimcopiesofthislicensedocument,changingisallowed rmmod – insmod
– modprobe - depmod 5 Kernel rmmod Removes (unloads) a loaded modules •Can not unload a module that is a dependency of another module. •Can not unload in-use modules. insmod Loads a module into the kernel. •Full pathname required. •Does not handle dependencies automatically. modprobe Intelligent module handler •Can load/unload modules. •Automatically handles dependencies. •Only need to specify name of module, not full path, when loading. depmod: Rebuilds module dependency lists
6.
CoreLinuxforRedHatandFedoralearningunderGNUFreeDocumentationLicense-Copyleft(c)AcácioOliveira2012 Everyoneispermittedtocopyanddistributeverbatimcopiesofthislicensedocument,changingisallowed Kernel boot parameters 6 Kernel Hundreds
of parameters can be passed to the kernel at boot time. Most common include: •root=/dev/sda3 Set the root device •quiet Reduce informational messages at startup •rhgb Red Hat Graphical Boot •console=ttyS0 Specify console device http://www.kernel.org/doc/Documentation/kernel-parameters.txt
7.
CoreLinuxforRedHatandFedoralearningunderGNUFreeDocumentationLicense-Copyleft(c)AcácioOliveira2012 Everyoneispermittedtocopyanddistributeverbatimcopiesofthislicensedocument,changingisallowed Kernel runtime parameters 7 Kernel Numerous
kernel parameters which can be adjusted at runtime, including: •net.ipv4.* •vm.* •kernel.* •fs.* SYSCTL sysctl Get/set kernel parameters sysctl –a produces a complete list of all tunable kernel parameters like networking, kernel, filesystem. •sysctl -w kernel.pid_max=65535 •sysctl -a •sysctl -w vm.swappiness=100
8.
CoreLinuxforRedHatandFedoralearningunderGNUFreeDocumentationLicense-Copyleft(c)AcácioOliveira2012 Everyoneispermittedtocopyanddistributeverbatimcopiesofthislicensedocument,changingisallowed Fim de sessão 8
Download now