Files
obsidian/SS24/TdS/Canvas.canvas

17 lines
1.9 KiB
Plaintext

{
"nodes":[
{"id":"019a35b3bd2c7f1f","type":"text","text":"Gute/Benutzte Quelle","x":-780,"y":-400,"width":250,"height":60},
{"id":"387cfc31df6c4458","type":"text","text":"Verworfene Quelle","x":320,"y":-400,"width":250,"height":60},
{"id":"ed063f0893b24501","type":"text","text":"Mögliche Quelle","x":-220,"y":-400,"width":250,"height":60},
{"id":"ce36483564c2eb7c","type":"text","text":"Quellen","x":-220,"y":-580,"width":250,"height":60},
{"id":"229cc629dd65faff","type":"text","text":"https://www.xenonstack.com/insights/virtualization-in-devops/\ngefunden mit SearNGX","x":-220,"y":-270,"width":250,"height":110},
{"id":"9cc67a42e4105b5d","type":"text","text":"https://www.ibm.com/topics/virtualization\nIBM: vertrauenswürdig","x":-220,"y":-100,"width":250,"height":100},
{"id":"6ef6e9a2d035610d","type":"file","file":"SS24/TdS/Quellen/VirtualizationSurveyTR179.pdf","x":-295,"y":90,"width":400,"height":400},
{"id":"92992735a934dbe7","type":"text","text":"https://www.splunk.com/en_us/blog/learn/virtualization.html\nStephen Watts:\n-degree in Philosophy\n-contributes to a variety of publications including CIO.com, [Search Engine Journal](https://www.searchenginejournal.com/author/stephen-watts/), ITSM.Tools, [IT Chronicles](https://itchronicles.com/author/stephenwatts/), [DZone](https://dzone.com/users/3139494/wattssw.html), and [CompTIA](https://www.comptia.org/blog/listing/author/stephen%20watts).\n","x":-780,"y":-270,"width":250,"height":110},
{"id":"76526aea4f72089e","x":1342,"y":-399,"width":400,"height":400,"type":"file","file":"SS24/TdS/Hilfe/Beispielarbeit1.pdf"},
{"id":"b49abf2438df3de3","x":1780,"y":-399,"width":400,"height":400,"type":"file","file":"SS24/TdS/Hilfe/Beispielarbeit2.pdf"},
{"id":"7c84bd1478532b5b","x":2220,"y":-399,"width":400,"height":400,"type":"file","file":"SS24/TdS/Hilfe/Beispielarbeit3.pdf"},
{"id":"b0e0992e88e0469c","type":"text","text":"Hilfe","x":1855,"y":-560,"width":250,"height":60}
],
"edges":[]
}