Referência Debian I

Total Page:16

File Type:pdf, Size:1020Kb

Referência Debian I Referência Debian i Referência Debian Osamu Aoki Referência Debian ii Copyright © 2013-2021 Osamu Aoki Esta Referência Debian (versão 2.85) (2021-09-17 09:11:56 UTC) pretende fornecer uma visão geral do sistema Debian como um guia do utilizador pós-instalação. Cobre muitos aspetos da administração do sistema através de exemplos shell-command para não programadores. Referência Debian iii COLLABORATORS TITLE : Referência Debian ACTION NAME DATE SIGNATURE WRITTEN BY Osamu Aoki 17 de setembro de 2021 REVISION HISTORY NUMBER DATE DESCRIPTION NAME Referência Debian iv Conteúdo 1 Manuais de GNU/Linux 1 1.1 Básico da consola ................................................... 1 1.1.1 A linha de comandos da shell ........................................ 1 1.1.2 The shell prompt under GUI ......................................... 2 1.1.3 A conta root .................................................. 2 1.1.4 A linha de comandos shell do root ...................................... 3 1.1.5 GUI de ferramentas de administração do sistema .............................. 3 1.1.6 Consolas virtuais ............................................... 3 1.1.7 Como abandonar a linha de comandos .................................... 3 1.1.8 Como desligar o sistema ........................................... 4 1.1.9 Recuperar uma consola sã .......................................... 4 1.1.10 Sugestões de pacotes adicionais para o novato ................................ 4 1.1.11 Uma conta de utilizador extra ........................................ 5 1.1.12 Configuração do sudo ............................................ 5 1.1.13 Hora de brincar ................................................ 6 1.2 Sistema de ficheiros tipo Unix ............................................ 6 1.2.1 Noções básicas de ficheiros Unix ...................................... 6 1.2.2 Internos do sistema de ficheiros ....................................... 7 1.2.3 Permissões do sistema de ficheiros ...................................... 8 1.2.4 Controlo de permissões para ficheiros acabados de criar: umask ...................... 10 1.2.5 Permissões para grupos de utilizadores (group) ............................... 11 1.2.6 Marcas temporais (Timestamps) ....................................... 12 1.2.7 Links (ligações) ................................................ 13 1.2.8 Pipes com nome (FIFOs) ........................................... 14 1.2.9 Sockets .................................................... 14 1.2.10 Ficheiros de aparelho ............................................. 15 1.2.11 Ficheiros de aparelhos especiais ....................................... 15 1.2.12 procfs e sysfs ................................................. 16 1.2.13 tmpfs ..................................................... 16 1.3 Midnight Commander (MC) ............................................. 17 Referência Debian v 1.3.1 Personalização do MC ............................................ 17 1.3.2 Iniciar o MC ................................................. 17 1.3.3 Gestor de ficheiros no MC .......................................... 17 1.3.4 Truques de linha de comandos no MC .................................... 18 1.3.5 O editor interno em MC ........................................... 18 1.3.6 O visualizador interno no MC ........................................ 19 1.3.7 Funcionalidades de auto-arranque do MC .................................. 19 1.3.8 Sistema de ficheiros virtual FTP no MC ................................... 19 1.4 O ambiente de trabalho estilo Unix básico ...................................... 19 1.4.1 A shell de login ................................................ 19 1.4.2 Personalizar bash ............................................... 20 1.4.3 Teclas especiais ................................................ 21 1.4.4 Mouse operations ............................................... 21 1.4.5 O pager .................................................... 22 1.4.6 O editor de texto ............................................... 22 1.4.7 Definir um editor de texto predefinido .................................... 22 1.4.8 Using vim ................................................... 23 1.4.9 Gravar as atividades da shell ......................................... 23 1.4.10 Comandos básicos de Unix .......................................... 24 1.5 O comando simples da shell ............................................. 26 1.5.1 Execução do comando e variável de ambiente ................................ 26 1.5.2 A variável ”$LANG” ............................................. 26 1.5.3 A variável ”$PATH” ............................................. 27 1.5.4 A variável ”$HOME” ............................................. 28 1.5.5 Opções da linha de comandos ........................................ 28 1.5.6 Glob da shell ................................................. 28 1.5.7 Valor de retorno do comando ......................................... 29 1.5.8 Sequências de comandos típicas e redireccionamento da shell ....................... 29 1.5.9 Comando alias ................................................ 31 1.6 Processamento de texto estilo Unix .......................................... 32 1.6.1 Ferramentas de texto de Unix ........................................ 32 1.6.2 Expressões regulares ............................................. 33 1.6.3 Expressões de substituição .......................................... 33 1.6.4 Substituição global com expressões regulares ................................ 35 1.6.5 Extrair dados de tabela de ficheiro de texto ................................. 36 1.6.6 Trechos de script para canalizar comandos em pipe ............................. 37 Referência Debian vi 2 Gestão de pacotes Debian 38 2.1 Pré-requisitos da gestão de pacotes Debian ...................................... 38 2.1.1 Configuração de pacotes ........................................... 38 2.1.2 Precauções básicas .............................................. 39 2.1.3 A vida com atualizações eternas ....................................... 40 2.1.4 Básico do arquivos Debian .......................................... 41 2.1.5 Debian é 100% software livre ........................................ 44 2.1.6 Dependências de pacote ........................................... 45 2.1.7 O fluxo de eventos da gestão de pacotes ................................... 46 2.1.8 Primeira resposta a problemas com a gestão de pacotes ........................... 47 2.2 Operações básicas de gestão de pacotes ....................................... 47 2.2.1 apt vs. apt-get / apt-cache contra o aptitude .......................... 47 2.2.2 Operações básicas de gestão de pacotes com a linha de comandos ..................... 50 2.2.3 Uso interativo do aptitude .......................................... 50 2.2.4 Teclas de atalho do aptitude ......................................... 51 2.2.5 Vistas de pacote no aptitude ......................................... 51 2.2.6 Opções do método de pesquisa com o aptitude ............................... 52 2.2.7 A fórmula regex do aptitude ......................................... 53 2.2.8 Resolução de dependências do aptitude ................................... 53 2.2.9 Relatórios (logs) de atividade de pacotes ................................... 55 2.3 Exemplos de operações do aptitude .......................................... 55 2.3.1 Listagem de pacotes com correspondência por expressão regular nos nomes de pacotes .......... 55 2.3.2 Explorar com a correspondência de expressão regular ............................ 55 2.3.3 Purgar pacotes removidos definitivamente .................................. 55 2.3.4 Acertar o estado auto/manual de instalação ................................. 56 2.3.5 atualização total ao sistema .......................................... 56 2.4 Operações de gestão avançada de pacotes ...................................... 57 2.4.1 Operações de gestão avançada de pacotes com linha de comandos ..................... 57 2.4.2 Verificação dos ficheiros pacotes instalados ................................. 59 2.4.3 Salvaguardar para problemas de pacotes ................................... 59 2.4.4 Procurar nos meta-dados do pacote ..................................... 60 2.5 Os interiores da gestão de pacotes Debian ...................................... 60 2.5.1 Meta dados do arquivo ............................................ 60 2.5.2 Ficheiro ”Release” de nível de topo e autenticidade: ............................ 60 2.5.3 Ficheiros ”Release” do nível de arquivo ................................... 61 2.5.4 Obter os meta dados do pacote ........................................ 62 2.5.5 O estado dos pacote para o APT ....................................... 63 2.5.6 O estado de pacotes para o aptitude ..................................... 63 2.5.7 Copias locais dos pacotes obtidos ...................................... 63 Referência Debian vii 2.5.8 Nomes de ficheiros de pacotes Debian .................................... 63 2.5.9 O comando dpkg ............................................... 64 2.5.10 O comando update-alternatives ........................................ 65 2.5.11 O comando dpkg-statoverride ........................................ 65 2.5.12 O comando dpkg-divert ........................................... 65 2.6 Recuperação de um sistema danificado ........................................ 65 2.6.1 Incompatibilidade com configurações antigas de utilizador ......................... 66 2.6.2 Pacotes diferentes
Recommended publications
  • A Method to Accommodate Backward Compatibility on the Learning Application-Based Transliteration to the Balinese Script
    (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 12, No. 6, 2021 A Method to Accommodate Backward Compatibility on the Learning Application-based Transliteration to the Balinese Script 1 3 4 Gede Indrawan , I Gede Nurhayata , Sariyasa I Ketut Paramarta2 Department of Computer Science Department of Balinese Language Education Universitas Pendidikan Ganesha (Undiksha) Universitas Pendidikan Ganesha (Undiksha) Singaraja, Indonesia Singaraja, Indonesia Abstract—This research proposed a method to accommodate transliteration rules (for short, the older rules) from The backward compatibility on the learning application-based Balinese Alphabet document 1 . It exposes the backward transliteration to the Balinese Script. The objective is to compatibility method to accommodate the standard accommodate the standard transliteration rules from the transliteration rules (for short, the standard rules) from the Balinese Language, Script, and Literature Advisory Agency. It is Balinese Language, Script, and Literature Advisory Agency considered as the main contribution since there has not been a [7]. This Bali Province government agency [4] carries out workaround in this research area. This multi-discipline guidance and formulates programs for the maintenance, study, collaboration work is one of the efforts to preserve digitally the development, and preservation of the Balinese Language, endangered Balinese local language knowledge in Indonesia. The Script, and Literature. proposed method covered two aspects, i.e. (1) Its backward compatibility allows for interoperability at a certain level with This study was conducted on the developed web-based the older transliteration rules; and (2) Breaking backward transliteration learning application, BaliScript, for further compatibility at a certain level is unavoidable since, for the same ubiquitous Balinese Language learning since the proposed aspect, there is a contradictory treatment between the standard method reusable for the mobile application [8], [9].
    [Show full text]
  • MLNX OFED Documentation Rev 5.0-2.1.8.0
    MLNX_OFED Documentation Rev 5.0-2.1.8.0 Exported on May/21/2020 06:13 AM https://docs.mellanox.com/x/JLV-AQ Notice This document is provided for information purposes only and shall not be regarded as a warranty of a certain functionality, condition, or quality of a product. NVIDIA Corporation (“NVIDIA”) makes no representations or warranties, expressed or implied, as to the accuracy or completeness of the information contained in this document and assumes no responsibility for any errors contained herein. NVIDIA shall have no liability for the consequences or use of such information or for any infringement of patents or other rights of third parties that may result from its use. This document is not a commitment to develop, release, or deliver any Material (defined below), code, or functionality. NVIDIA reserves the right to make corrections, modifications, enhancements, improvements, and any other changes to this document, at any time without notice. Customer should obtain the latest relevant information before placing orders and should verify that such information is current and complete. NVIDIA products are sold subject to the NVIDIA standard terms and conditions of sale supplied at the time of order acknowledgement, unless otherwise agreed in an individual sales agreement signed by authorized representatives of NVIDIA and customer (“Terms of Sale”). NVIDIA hereby expressly objects to applying any customer general terms and conditions with regards to the purchase of the NVIDIA product referenced in this document. No contractual obligations are formed either directly or indirectly by this document. NVIDIA products are not designed, authorized, or warranted to be suitable for use in medical, military, aircraft, space, or life support equipment, nor in applications where failure or malfunction of the NVIDIA product can reasonably be expected to result in personal injury, death, or property or environmental damage.
    [Show full text]
  • Administració De Sistemes GNU Linux Mòdul4 Administració
    Administració local Josep Jorba Esteve PID_00238577 GNUFDL • PID_00238577 Administració local Es garanteix el permís per a copiar, distribuir i modificar aquest document segons els termes de la GNU Free Documentation License, Version 1.3 o qualsevol altra de posterior publicada per la Free Software Foundation, sense seccions invariants ni textos de la oberta anterior o posterior. Podeu consultar els termes de la llicència a http://www.gnu.org/licenses/fdl-1.3.html. GNUFDL • PID_00238577 Administració local Índex Introducció.................................................................................................. 5 1. Eines bàsiques per a l'administrador........................................... 7 1.1. Eines gràfiques i línies de comandes .......................................... 8 1.2. Documents d'estàndards ............................................................. 10 1.3. Documentació del sistema en línia ............................................ 13 1.4. Eines de gestió de paquets .......................................................... 15 1.4.1. Paquets TGZ ................................................................... 16 1.4.2. Fedora/Red Hat: paquets RPM ....................................... 19 1.4.3. Debian: paquets DEB ..................................................... 24 1.4.4. Nous formats d'empaquetat: Snap i Flatpak .................. 28 1.5. Eines genèriques d'administració ................................................ 36 1.6. Altres eines .................................................................................
    [Show full text]
  • Arxiv:Cs/0107036V2 [Cs.SC] 31 Jul 2001
    TEXmacs interfaces to Maxima, MuPAD and REDUCE A. G. Grozin Budker Institute of Nuclear Physics, Novosibirsk 630090, Russia [email protected] Abstract GNU TEXmacs is a free wysiwyg word processor providing an excellent typesetting quality of texts and formulae. It can also be used as an interface to Computer Algebra Systems (CASs). In the present work, interfaces to three general-purpose CASs have been implemented. 1 TEXmacs GNU TEXmacs [1] is a free (GPL) word processor which typesets texts and mathematical formulae with very high quality (like LAT X), • E emphasizes the logical structure of a document rather than its appearance (like • LATEX), is easy to use and intuitive (like typical wysiwyg word processors), • arXiv:cs/0107036v2 [cs.SC] 31 Jul 2001 can be extended by a powerful programming language (like Emacs), • can include PostScript figures (as well as other figures which can be converted • to PostScript), can export LAT X, and import LAT X and html, • E E supports a number of languages based on Latin and Cyrillic alphabets. • It uses TEX fonts both on screen and when printing documents. Therefore, it is truly wysiwyg, with equally good quality of on-screen and printed documents (in contrast to LyX which uses X fonts on screen and calls LATEX for printing). There is a similar commercial program called Scientific Workplace (for Windows). TEXmacs can also be used as an interface to any CAS which can generate LATEX output. It renders LATEX formulae on the fly, producing CAS output with highest 1 typesetting quality (better than, e.g., Mathematica, which uses fixed-width fonts for formula output).
    [Show full text]
  • Resurrect Your Old PC
    Resurrect your old PCs Resurrect your old PC Nostalgic for your old beige boxes? Don’t let them gather dust! Proprietary OSes force users to upgrade hardware much sooner than necessary: Neil Bothwick highlights some great ways to make your pensioned-off PCs earn their keep. ardware performance is constantly improving, and it is only natural to want the best, so we upgrade our H system from time to time and leave the old ones behind, considering them obsolete. But you don’t usually need the latest and greatest, it was only a few years ago that people were running perfectly usable systems on 500MHz CPUs and drooling over the prospect that a 1GHz CPU might actually be available quite soon. I can imagine someone writing a similar article, ten years from now, about what to do with that slow, old 4GHz eight-core system that is now gathering dust. That’s what we aim to do here, show you how you can put that old hardware to good use instead of consigning it to the scrapheap. So what are we talking about when we say older computers? The sort of spec that was popular around the turn of the century. OK, while that may be true, it does make it seem like we are talking about really old hardware. A typical entry-level machine from six or seven years ago would have had something like an 800MHz processor, Pentium 3 or similar, 128MB of RAM and a 20- 30GB hard disk. The test rig used for testing most of the software we will discuss is actually slightly lower spec, it has a 700MHz Celeron processor, because that’s what I found in the pile of computer gear I never throw away in my loft, right next to my faithful old – but non-functioning – Amiga 4000.
    [Show full text]
  • The Debian GNU/Linux
    The Debian GNU/Linux FAQ translator: etony C.F.AN <[email protected]> Debian FAQ Authors version 5.0.1, 17 March 2012 XXX要要要 ,文cãT一些s于 Debian GNU/Linux 的8Á问题. HHHCCC声声声明明明 Copyright © 1996-2003 by Software in the Public Interest (u守v包+,文cHC声明的MÐ下, A¸6\和发布,文c的完t拷贝. (u守上述完t拷贝H,有sHC声明的MÐ下, A¸拷贝和发布ú于,文c完t拷贝的修9H,, v且, 发布@有通Ç修9 ,文c而得0的工\成果, {使(与,文c的¸可声明一致的¸可声明. (u守上述修9H,HC声明的MÐ下, A¸拷贝和发布,文cv它语言的û译H,, 如果,¸可声明有Ïê1o件ú金 会(Free Software Foundation)8Æ的S0化译,, 则uªS0化译,. i Contents 1 定定定II义与与与概概概述述述 1 1.1 什么/ Debian GNU/Linux?...............................................1 1.2 OK, 现(我知SDebian /. Linux/什么?!.......................................1 1.3 什么/ “Hurd”?.......................................................2 1.4 Debian GNU/Linux 与v他 Linux 发LH有什么不同? 为什么要选éDebian GNU/Linux?............2 1.5 Debian ¡划与ê1o件ú金会的GNU¡划 .......................................2 1.6 Debian 的发音Ê+I?...................................................2 2 Debian GNU/Linux 的的的···取取取与与与安安安ÅÅÅ 3 2.1 Debian 的最新H,/?...................................................3 2.2 如U得0 Debian 的安Å盘?................................................3 2.3 如UÎIq安Å Debian?..................................................3 2.4 我有;U:, 可以·取 Debian qÏ吗?..........................................3 2.5 可以o盘安Å吗?.......................................................3 2.6 可以Q络安Å吗?.......................................................4 3 |||¹¹¹'''问问问题题题 5 3.1 可以(什么7的l件û统上ÐL?.............................................5 3.2 与v他的linux发LH|¹L如U?.............................................5 3.3 Debian 源码与v他
    [Show full text]
  • ECE 598 – Advanced Operating Systems Lecture 19
    ECE 598 { Advanced Operating Systems Lecture 19 Vince Weaver http://web.eece.maine.edu/~vweaver [email protected] 7 April 2016 Announcements • Homework #7 was due • Homework #8 will be posted 1 Why use FAT over ext2? • FAT simpler, easy to code • FAT supported on all major OSes • ext2 faster, more robust filename and permissions 2 btrfs • B-tree fs (similar to a binary tree, but with pages full of leaves) • overwrite filesystem (overwite on modify) vs CoW • Copy on write. When write to a file, old data not overwritten. Since old data not over-written, crash recovery better Eventually old data garbage collected • Data in extents 3 • Copy-on-write • Forest of trees: { sub-volumes { extent-allocation { checksum tree { chunk device { reloc • On-line defragmentation • On-line volume growth 4 • Built-in RAID • Transparent compression • Snapshots • Checksums on data and meta-data • De-duplication • Cloning { can make an exact snapshot of file, copy-on- write different than link, different inodles but same blocks 5 Embedded • Designed to be small, simple, read-only? • romfs { 32 byte header (magic, size, checksum,name) { Repeating files (pointer to next [0 if none]), info, size, checksum, file name, file data • cramfs 6 ZFS Advanced OS from Sun/Oracle. Similar in idea to btrfs indirect still, not extent based? 7 ReFS Resilient FS, Microsoft's answer to brtfs and zfs 8 Networked File Systems • Allow a centralized file server to export a filesystem to multiple clients. • Provide file level access, not just raw blocks (NBD) • Clustered filesystems also exist, where multiple servers work in conjunction.
    [Show full text]
  • Chapter 19 RECOVERING DIGITAL EVIDENCE from LINUX SYSTEMS
    Chapter 19 RECOVERING DIGITAL EVIDENCE FROM LINUX SYSTEMS Philip Craiger Abstract As Linux-kernel-based operating systems proliferate there will be an in­ evitable increase in Linux systems that law enforcement agents must process in criminal investigations. The skills and expertise required to recover evidence from Microsoft-Windows-based systems do not neces­ sarily translate to Linux systems. This paper discusses digital forensic procedures for recovering evidence from Linux systems. In particular, it presents methods for identifying and recovering deleted files from disk and volatile memory, identifying notable and Trojan files, finding hidden files, and finding files with renamed extensions. All the procedures are accomplished using Linux command line utilities and require no special or commercial tools. Keywords: Digital evidence, Linux system forensics !• Introduction Linux systems will be increasingly encountered at crime scenes as Linux increases in popularity, particularly as the OS of choice for servers. The skills and expertise required to recover evidence from a Microsoft- Windows-based system, however, do not necessarily translate to the same tasks on a Linux system. For instance, the Microsoft NTFS, FAT, and Linux EXT2/3 file systems work differently enough that under­ standing one tells httle about how the other functions. In this paper we demonstrate digital forensics procedures for Linux systems using Linux command line utilities. The ability to gather evidence from a running system is particularly important as evidence in RAM may be lost if a forensics first responder does not prioritize the collection of live evidence. The forensic procedures discussed include methods for identifying and recovering deleted files from RAM and magnetic media, identifying no- 234 ADVANCES IN DIGITAL FORENSICS tables files and Trojans, and finding hidden files and renamed files (files with renamed extensions.
    [Show full text]
  • Vnote Documentation Release 1.11.1
    VNote Documentation Release 1.11.1 Le Tan Feb 13, 2019 User Documentation 1 Why VNote 3 1.1 What is VNote..............................................3 1.2 Why Another Markdown Wheel.....................................3 2 Getting Started 5 2.1 Main Interface..............................................5 2.2 Ready To Go...............................................7 3 Build VNote 9 3.1 Get the Source Code of VNote......................................9 3.2 Get Qt 5.9................................................9 3.3 Windows.................................................9 3.4 Linux...................................................9 3.5 MacOS.................................................. 10 4 Notes Management 13 4.1 Notebook................................................. 13 4.2 Folders.................................................. 14 4.3 Notes................................................... 14 5 Snippet 15 5.1 Snippet Management........................................... 15 5.2 Define A Snippet............................................. 16 5.3 Apply A Snippet............................................. 16 5.4 Examples................................................. 16 6 Magic Word 19 6.1 Built-In Magic Words.......................................... 19 6.2 Custom Magic Words.......................................... 20 6.3 Magic Word In Snippet.......................................... 21 7 Template 23 8 Themes and Styles 25 8.1 Themes.................................................. 25 8.2 Editor Styles..............................................
    [Show full text]
  • IJCNLP 2011 Proceedings of the Workshop on Advances in Text Input Methods (WTIM 2011)
    IJCNLP 2011 Proceedings of the Workshop on Advances in Text Input Methods (WTIM 2011) November 13, 2011 Shangri-La Hotel Chiang Mai, Thailand IJCNLP 2011 Proceedings of the Workshop on Advances in Text Input Methods (WTIM 2011) November 13, 2011 Chiang Mai, Thailand We wish to thank our sponsors Gold Sponsors www.google.com www.baidu.com The Office of Naval Research (ONR) Department of Systems Engineering and The Asian Office of Aerospace Research and Devel- Engineering Managment, The Chinese Uni- opment (AOARD) versity of Hong Kong Silver Sponsors Microsoft Corporation Bronze Sponsors Chinese and Oriental Languages Information Processing Society (COLIPS) Supporter Thailand Convention and Exhibition Bureau (TCEB) We wish to thank our sponsors Organizers Asian Federation of Natural Language National Electronics and Computer Technolo- Processing (AFNLP) gy Center (NECTEC), Thailand Sirindhorn International Institute of Technology Rajamangala University of Technology Lanna (SIIT), Thailand (RMUTL), Thailand Chiang Mai University (CMU), Thailand Maejo University, Thailand c 2011 Asian Federation of Natural Language Proceesing vii Preface Welcome to the IJCNLP Workshop on Advances in Text Input Methods (WTIM 2011)! Methods of text input have entered a new era. The number of people who have access to computers and mobile devices is skyrocketing in regions where people do not have a convenient method of inputting their native language. It has also become commonplace to input text not through a keyboard but through different modes such as voice and handwriting recognition. Even when people input text using a keyboard, it is done differently from only a few years ago – adaptive software keyboards, word auto- completion and prediction, and spell correction are just a few examples of such recent changes in text input experience.
    [Show full text]
  • El Manual De GNU TEXMACS
    El manual de GNU TEXMACS Índice 1. Iniciar . 9 1.1. Convenciones para este manual . 9 1.2. Congurar TEXMACS . 9 1.3. Crear, guardar y cargar documentos . 10 1.4. Imprimir documentos . 10 2. Escribir documentos sencillos . 11 2.1. Generalidades para teclear de texto . 11 2.2. Tecleando texto estructurado . 11 2.3. Etiquetas basadas en contenido . 12 2.4. Listas . 12 2.5. Entornos . 13 2.6. Aspectos de presentación . 14 2.7. El sistema de selección de fuentes . 14 2.8. Dominando el teclado . 15 2.8.1. Reglas generales de prejos . 15 2.8.2. Algunos atajos de teclado fundamentales . 15 2.8.3. Atajos de teclado para el modo texto . 16 2.8.4. Comandos híbridos y simulación LATEX . 16 2.8.5. Objetos dinámicos . 16 2.8.6. Personalización del teclado . 17 3. Fórmulas matemáticas . 19 3.1. Principales constructos matemáticos . 19 3.2. Tecleando símbolos matemáticos . 20 3.3. Tecleando operadores grandes . 20 3.4. Teclear delimitadores grandes . 21 3.5. Acentos matemáticos anchos . 22 4. Material tabular . 23 4.1. Creando tablas . 23 4.2. El modo para dar formato . 23 4.3. Especicando el alineamiento de la celda y la tabla . 24 4.4. Especicando el tamaño de la celda y la tabla . 24 4.5. Bordes, acolchado y color de fondo . 25 4.6. Características avanzadas de la tabla . 25 5. Links and automatically generated content . 27 5.1. Creating labels, links and references . 27 5.2. Inserting images . 27 5.3. Generating a table of contents . 28 5.4.
    [Show full text]
  • ZFS 2018 and Onward
    SEE TEXT ONLY 2018 and Onward BY ALLAN JUDE 2018 is going to be a big year for ZFS RAID-Z Expansion not only FreeBSD, but for OpenZFS • 2018Q4 as well. OpenZFS is the collaboration of developers from IllumOS, FreeBSD, The ability to add an additional disk to an existing RAID-Z VDEV to grow its size with- Linux, Mac OS X, many industry ven- out changing its redundancy level. For dors, and a number of other projects example, a RAID-Z2 consisting of 6 disks to maintain and advance the open- could be expanded to contain 7 disks, source version of Sun’s ZFS filesystem. increasing the available space. This is accomplished by reflowing the data across Improved Pool Import the disks, so as to not change an individual • 2018Q1 block’s offset from the start of the VDEV. The new disk will appear as a new column on the A new patch set changes the way pools are right, and the data will be relocated to main- imported, such that they depend less on con- tain the offset within the VDEV. Similar to figuration data from the system. Instead, the reflowing a paragraph by making it wider, possibly outdated configuration from the sys- without changing the order of the words. In tem is used to find the pool, and partially open the end this means all of the new space shows it read-only. Then the correct on-disk configura- up at the end of the disk, without any frag- tion is loaded. This reduces the number of mentation.
    [Show full text]