- Sort Score
- Num 10 results
- Language All
Results 1 - 10 of 515 for Spread (0.08 seconds)
The search processing time has exceeded the limit. The displayed results may be partial.
-
docs/distributed/README.md
- **Each object is written to a single EC set, and therefore is spread over no more than 16 drives.** - **All the nodes running distributed MinIO setup are recommended to be homogeneous, i.e. same operating system, same number of drives and same network interconnects.**
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Tue Aug 12 18:20:36 GMT 2025 - 8.9K bytes - Click Count (0) -
cmd/erasure.go
// Otherwise same set of buckets get scanned across erasure sets always. // at any given point in time. This allows different buckets to be scanned // in different order per erasure set, this wider spread is needed when // there are lots of buckets with different order of objects in them. r := rand.New(rand.NewSource(time.Now().UnixNano())) permutes := r.Perm(len(buckets)) // Add new buckets first
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Sun Sep 28 20:59:21 GMT 2025 - 16.1K bytes - Click Count (0) -
src/main/java/jcifs/smb1/util/DES.java
| (inBytes[inOff + i * 4 + 2] & 0xff) << 8 | inBytes[inOff + i * 4 + 3] & 0xff; } } /// Spread ints into bytes. /** * Converts integers to bytes after internal DES processing * @param inInts the input integer array * @param inOff the offset into the input array
Created: Sat Dec 20 13:44:44 GMT 2025 - Last Modified: Sat Aug 30 05:58:03 GMT 2025 - 22.7K bytes - Click Count (0) -
android/guava/src/com/google/common/hash/HashFunction.java
* the expected <i>twofold</i> increase to all collision rates. Informally, the "information" * in the hash code should be as evenly "spread out" through the hash code's bits as possible. * The result is that, for example, when choosing a bucket in a hash table of size 2^8, * <i>any</i> eight bits could be consistently used.
Created: Fri Dec 26 12:43:10 GMT 2025 - Last Modified: Mon Mar 17 20:26:29 GMT 2025 - 10.9K bytes - Click Count (0) -
guava/src/com/google/common/hash/HashFunction.java
* the expected <i>twofold</i> increase to all collision rates. Informally, the "information" * in the hash code should be as evenly "spread out" through the hash code's bits as possible. * The result is that, for example, when choosing a bucket in a hash table of size 2^8, * <i>any</i> eight bits could be consistently used.
Created: Fri Dec 26 12:43:10 GMT 2025 - Last Modified: Mon Mar 17 20:26:29 GMT 2025 - 10.9K bytes - Click Count (0) -
cmd/endpoint-ellipses.go
// Figure out largest value of total_drives_in_erasure_set which results // in least number of total_drives/total_drives_erasure_set ratio. prevD := divisibleSize / setCounts[0] for _, cnt := range setCounts { if divisibleSize%cnt == 0 { d := divisibleSize / cnt if d <= prevD { prevD = d setSize = cnt } } } return setSize } // possibleSetCountsWithSymmetry returns symmetrical setCounts based on the
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Sun Sep 28 20:59:21 GMT 2025 - 14.7K bytes - Click Count (0) -
android/guava/src/com/google/common/collect/MapMakerInternalMap.java
* look at table entries if it is 0. * * - All (synchronized) write operations should write to the "count" field after structurally * changing any bin. The operations must not take any action that could even momentarily * cause a concurrent read operation to see inconsistent data. This is made easier by theCreated: Fri Dec 26 12:43:10 GMT 2025 - Last Modified: Mon Sep 22 18:35:44 GMT 2025 - 89.9K bytes - Click Count (0) -
guava/src/com/google/common/cache/LocalCache.java
* at table entries if it is 0. * * - All (synchronized) write operations should write to the "count" field after structurally * changing any bin. The operations must not take any action that could even momentarily cause a * concurrent read operation to see inconsistent data. This is made easier by the nature of theCreated: Fri Dec 26 12:43:10 GMT 2025 - Last Modified: Thu Sep 11 19:35:11 GMT 2025 - 148.9K bytes - Click Count (0) -
CHANGELOG/CHANGELOG-1.16.md
- Pod spread constraints have been added in alpha. You can use these constraints to control how Pods are spread across the cluster among failure-domains. ([#77327](https://github.com/kubernetes/kubernetes/pull/77327), [#77760](https://github.com/kubernetes/kubernetes/pull/77760), [#77828](https://github.com/...
Created: Fri Dec 26 09:05:12 GMT 2025 - Last Modified: Wed Oct 23 20:13:20 GMT 2024 - 345.2K bytes - Click Count (0) -
CHANGELOG/CHANGELOG-1.25.md
### CVE-2022-3162: Unauthorized read of Custom Resources A security issue was discovered in Kubernetes where users authorized to list or watch one type of namespaced custom resource cluster-wide can read custom resources of a different type in the same API group they are not authorized to read. **Affected Versions**: - kube-apiserver v1.25.0 - v1.25.3
Created: Fri Dec 26 09:05:12 GMT 2025 - Last Modified: Mon May 06 09:23:20 GMT 2024 - 419.1K bytes - Click Count (0)