Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 24 for big (0.01 sec)

  1. src/main/java/jcifs/internal/smb2/persistent/HandleGuid.java

            // The last 8 bytes are read as big-endian (network byte order for the high/low parts)
            ByteBuffer bb2 = ByteBuffer.wrap(bytes, 8, 8).order(java.nio.ByteOrder.BIG_ENDIAN);
            long data4 = bb2.getLong();
    
            // Construct UUID from components - Java UUID expects big-endian representation
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Sat Aug 23 02:21:31 UTC 2025
    - 4.5K bytes
    - Viewed (0)
  2. src/main/java/jcifs/smb1/http/NetworkExplorer.java

            path = dir.getCanonicalPath();
    
            if (path.length() < 7) {
                out.println("<b><big>smb1://</big></b><br>");
                path = ".";
            } else {
                out.println("<b><big>" + path + "</big></b><br>");
                path = "../";
            }
            out.println(dirCount + fileCount + " objects (" + dirCount + " directories, " + fileCount + " files)<br>");
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Sun Aug 31 08:00:57 UTC 2025
    - 22.6K bytes
    - Viewed (0)
  3. docs/en/docs/tutorial/path-operation-configuration.md

    They will be added to the OpenAPI schema and used by the automatic documentation interfaces:
    
    <img src="/img/tutorial/path-operation-configuration/image01.png">
    
    ### Tags with Enums { #tags-with-enums }
    
    If you have a big application, you might end up accumulating **several tags**, and you would want to make sure you always use the **same tag** for related *path operations*.
    
    In these cases, it could make sense to store the tags in an `Enum`.
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 09:15:41 UTC 2025
    - 4.1K bytes
    - Viewed (0)
  4. docs/en/docs/tutorial/security/index.md

    There are many ways to handle security, authentication and authorization.
    
    And it normally is a complex and "difficult" topic.
    
    In many frameworks and systems just handling security and authentication takes a big amount of effort and code (in many cases it can be 50% or more of all the code written).
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 10:49:48 UTC 2025
    - 4.4K bytes
    - Viewed (0)
  5. docs/en/docs/alternatives.md

    Another big feature needed by APIs is data validation, making sure that the data is valid, given certain parameters. For example, that some field is an `int`, and not some random string. This is especially useful for incoming data.
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 09:15:41 UTC 2025
    - 23.6K bytes
    - Viewed (0)
  6. docs/en/docs/deployment/manually.md

    /// tip
    
    By adding the `standard`, Uvicorn will install and use some recommended extra dependencies.
    
    That including `uvloop`, the high-performance drop-in replacement for `asyncio`, that provides the big concurrency performance boost.
    
    When you install FastAPI with something like `pip install "fastapi[standard]"` you already get `uvicorn[standard]` as well.
    
    ///
    
    ## Run the Server Program { #run-the-server-program }
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 09:15:41 UTC 2025
    - 6.9K bytes
    - Viewed (0)
  7. docs/en/docs/tutorial/security/simple-oauth2.md

    {* ../../docs_src/security/tutorial003_an_py310.py hl[4,78] *}
    
    `OAuth2PasswordRequestForm` is a class dependency that declares a form body with:
    
    * The `username`.
    * The `password`.
    * An optional `scope` field as a big string, composed of strings separated by spaces.
    * An optional `grant_type`.
    
    /// tip
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 09:15:41 UTC 2025
    - 9.4K bytes
    - Viewed (0)
  8. android/guava/src/com/google/common/hash/BloomFilter.java

       */
      public void writeTo(OutputStream out) throws IOException {
        // Serial form:
        // 1 signed byte for the strategy
        // 1 unsigned byte for the number of hash functions
        // 1 big endian int, the number of longs in our bitset
        // N big endian longs of our bitset
        DataOutputStream dout = new DataOutputStream(out);
        dout.writeByte(SignedBytes.checkedCast(strategy.ordinal()));
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Sun Aug 31 13:15:26 UTC 2025
    - 26.9K bytes
    - Viewed (0)
  9. cmd/xl-storage-meta-inline.go

    	in := x.afterVersion()
    	sz, buf, _ := msgp.ReadMapHeaderBytes(in)
    	newKeys := make([][]byte, 0, sz)
    	newVals := make([][]byte, 0, sz)
    	var removeKey func(s []byte) bool
    
    	// Copy if big number of compares...
    	if len(keys) > 5 && sz > 5 {
    		mKeys := make(map[string]struct{}, len(keys))
    		for _, key := range keys {
    			mKeys[key] = struct{}{}
    		}
    		removeKey = func(s []byte) bool {
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 9.4K bytes
    - Viewed (0)
  10. src/archive/tar/strconv.go

    func (p *parser) parseNumeric(b []byte) int64 {
    	// Check for base-256 (binary) format first.
    	// If the first bit is set, then all following bits constitute a two's
    	// complement encoded number in big-endian byte order.
    	if len(b) > 0 && b[0]&0x80 != 0 {
    		// Handling negative numbers relies on the following identity:
    		//	-a-1 == ^a
    		//
    		// If the number is negative, we use an inversion mask to invert the
    Registered: Tue Sep 09 11:13:09 UTC 2025
    - Last Modified: Mon Sep 08 17:08:20 UTC 2025
    - 9.1K bytes
    - Viewed (0)
Back to top