Files
RWTH-Notizen/ObsidianNotes/.obsidian/workspace.json
2026-02-19 19:47:59 +01:00

194 lines
5.1 KiB
JSON

{
"main": {
"id": "c3a4d69512e9fc7d",
"type": "split",
"children": [
{
"id": "f7e064c4f2a5d36d",
"type": "tabs",
"children": [
{
"id": "e46cc7fa9866d84d",
"type": "leaf",
"state": {
"type": "markdown",
"state": {
"file": "IT-Security.md",
"mode": "source",
"source": false
},
"icon": "lucide-file",
"title": "IT-Security"
}
}
]
}
],
"direction": "vertical"
},
"left": {
"id": "5d10435d79168cd3",
"type": "split",
"children": [
{
"id": "9dd8de210b3a219a",
"type": "tabs",
"children": [
{
"id": "73df1fa10360176b",
"type": "leaf",
"state": {
"type": "file-explorer",
"state": {
"sortOrder": "alphabetical",
"autoReveal": false
},
"icon": "lucide-folder-closed",
"title": "Files"
}
},
{
"id": "77451c9a0f0d90b8",
"type": "leaf",
"state": {
"type": "search",
"state": {
"query": "",
"matchingCase": false,
"explainSearch": false,
"collapseAll": false,
"extraContext": false,
"sortOrder": "alphabetical"
},
"icon": "lucide-search",
"title": "Search"
}
},
{
"id": "59e85a91706a7229",
"type": "leaf",
"state": {
"type": "bookmarks",
"state": {},
"icon": "lucide-bookmark",
"title": "Bookmarks"
}
}
]
}
],
"direction": "horizontal",
"width": 300
},
"right": {
"id": "7e5fb0cf1f329d1d",
"type": "split",
"children": [
{
"id": "bb7207b9cf3e7ca8",
"type": "tabs",
"children": [
{
"id": "9bc8d6bb05d6407c",
"type": "leaf",
"state": {
"type": "backlink",
"state": {
"file": "elemlds lecture 9.md",
"collapseAll": false,
"extraContext": false,
"sortOrder": "alphabetical",
"showSearch": false,
"searchQuery": "",
"backlinkCollapsed": false,
"unlinkedCollapsed": true
},
"icon": "links-coming-in",
"title": "Backlinks for elemlds lecture 9"
}
},
{
"id": "2035bfda7a40d552",
"type": "leaf",
"state": {
"type": "outgoing-link",
"state": {
"file": "elemlds lecture 9.md",
"linksCollapsed": false,
"unlinkedCollapsed": true
},
"icon": "links-going-out",
"title": "Outgoing links from elemlds lecture 9"
}
},
{
"id": "b59c87a10b89601c",
"type": "leaf",
"state": {
"type": "tag",
"state": {
"sortOrder": "frequency",
"useHierarchy": true,
"showSearch": false,
"searchQuery": ""
},
"icon": "lucide-tags",
"title": "Tags"
}
},
{
"id": "6eb1031e9bd41e20",
"type": "leaf",
"state": {
"type": "all-properties",
"state": {
"sortOrder": "frequency",
"showSearch": false,
"searchQuery": ""
},
"icon": "lucide-archive",
"title": "All properties"
}
},
{
"id": "30fccf5d4853eead",
"type": "leaf",
"state": {
"type": "outline",
"state": {
"file": "elemlds lecture 9.md",
"followCursor": false,
"showSearch": false,
"searchQuery": ""
},
"icon": "lucide-list",
"title": "Outline of elemlds lecture 9"
}
}
]
}
],
"direction": "horizontal",
"width": 300,
"collapsed": true
},
"left-ribbon": {
"hiddenItems": {
"switcher:Open quick switcher": false,
"graph:Open graph view": false,
"canvas:Create new canvas": false,
"daily-notes:Open today's daily note": false,
"templates:Insert template": false,
"command-palette:Open command palette": false,
"bases:Create new base": false
}
},
"active": "e46cc7fa9866d84d",
"lastOpenFiles": [
"elemlds lecture 8.md",
"elemlds lecture 9.md",
"IT-Security.md",
"Elements of Machine Learning and Data Science.md",
"Welcome.md"
]
}