Typically, the board manufacturer develops the Custom Platform that supports a specific OpenCL board. The offline compiler targets the Custom Platform when compiling an OpenCL kernel to generate a hardware programming image.
Installation, Setup and Upgrade Before starting to install and configure your cluster, make yourself familiar with cluster fundamentals and architecture, get an overview of the key features and benefits.
Learn which hardware and software requirements must be met and what preparations to take before executing the next steps. Learn how to upgrade your cluster to the most recent release version or how to update individual packages.
Configuration and Administration Add, configure and manage cluster resources with either the Web interface Hawk2or the command line interface crmsh. To avoid unauthorized access to the cluster configuration, define roles and assign them to certain users for fine-grained control.
Learn how to use load balancing and fencing. If you consider writing your own resource agents or modifying existing ones, get some background information on how to create different types of resource agents.
It lets you mirror the data of a High Availability service from the active node of a cluster to its standby node. Furthermore, a clustered Samba server also provides a High Availability solution for heterogeneous environments.
Appendix Contains an overview of common problems and their solution. Presents the naming conventions used in this documentation with regard to clusters, resources and constraints.
Shows the published documentation updates including a detailed list of the content changes for each update. Contains a glossary with HA-specific terminology.
|W3C XML Schema Definition Language (XSD) Part 2: Datatypes||Associated with each value space are selected operations and relations necessary to permit proper schema processing.|
|Intel FPGA SDK for OpenCL Pro Edition: Programming Guide||Communicating systems[ edit ] The information exchanged between devices through a network or other media is governed by rules and conventions that can be set out in communication protocol specifications.|
|Introduction||If absolute certainty was an "absolute" requirement, few projects would ever get off the ground. Read on to learn more.|
Many chapters in this manual contain links to additional documentation resources. These include additional documentation that is available on the system as well as documentation available on the Internet. For an overview of the documentation available for your product and the latest documentation updates, refer to http: Online Documentation and Latest Updates Documentation for our products is available at http: The latest documentation updates can usually be found in the English language version.
The following documentation is available for this product: For quick and efficient configuration and administration, the High Availability Extension includes both a graphical user interface GUI and a command line interface CLI.
Thus, administrators can choose the appropriate tool that matches their needs. Installation and Setup Quick Start This document guides you through the setup of a very basic two-node cluster, using the bootstrap scripts provided by the ha-cluster-bootstrap package.
This includes the configuration of a virtual IP address as a cluster resource and the use of SBD on shared storage as fencing mechanism. Geo Clustering Quick Start Geo clustering allows you to have multiple, geographically dispersed sites with a local cluster each.
Failover between these clusters is coordinated by a higher level entity: Bugs and Enhancement Requests For services and support options available for your product, refer to http: To report bugs for a product component, go to https: User Comments We want to hear your comments about and suggestions for this manual and the other documentation included with this product.
Use the User Comments feature at the bottom of each page in the online documentation or go to http: Mail For feedback on the documentation of this product, you can also send a mail to doc-team suse.
Make sure to include the document title, the product version and the publication date of the documentation. To report errors or suggest enhancements, provide a concise description of the problem and refer to the respective section number and page or URL. Often you can also prefix these commands with the sudo command to run them.
The arrows mark the beginning and the end of the text block. This is a reference to a chapter in another manual. Notices Warning Vital information you must be aware of before proceeding. Warns you about security issues, potential loss of data, damage to hardware, or physical hazards.
Important Important information you should be aware of before proceeding. Note Additional information, for example about differences in software versions.
Tip Helpful information, like a guideline or a piece of practical advice. The XML source files were validated by jing see https:This version of the Yocto Project Mega-Manual is for the release of the Yocto Project.
To be sure you have the latest version of the manual for this release, go to the Yocto Project documentation page and select the manual from that site.
Manuals from the site are more up-to-date than manuals derived from the Yocto Project released TAR files. As you can see in the RAID Log Template above the summary page gives us a one-page status snapshot, showing both the total number of risks, assumptions, issues, and dependencies, as well as providing a breakdown for each by criticality or priority.
A Spring Cloud application operates by creating a "bootstrap" context, which is a parent context for the main application. Out of the box it is responsible for loading configuration properties from the external sources, and also decrypting properties in the local external configuration files.
If any assumptions have been made regarding staffing, e.g. specific technical or business skill sets and/or individuals necessary to complete the project, list these assumptions here.
Constraints Identify known or suspected constraints to the execution of the project. For those primarily interested in the changes since version , the appendix Changes since version (§I) is the recommended starting point.
An accompanying version of this document displays in color all changes to normative text since version ; another shows changes since the previous Working Draft. CH Purpose. The Defense Acquisition Guidebook (DAG), Chapter 8, provides guidance on the process and procedures for managing risks through planning and executing an effective and affordable test and evaluation (T&E) program that enables the Department of Defense (DoD) to .