Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 5 of 5 for Ward (0.2 sec)

  1. docs/bucket/quota/README.md

    Buckets can be configured to have `Hard` quota - it disallows writes to the bucket after configured quota limit is reached.
    
    ## Prerequisites
    
    - Install MinIO - [MinIO Quickstart Guide](https://min.io/docs/minio/linux/index.html#procedure).
    - [Use `mc` with MinIO Server](https://min.io/docs/minio/linux/reference/minio-mc.html#quickstart)
    
    ## Set bucket quota configuration
    
    Plain Text
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Tue Oct 25 00:44:15 GMT 2022
    - 1.1K bytes
    - Viewed (0)
  2. .gitignore

    docs/debugging/hash-set/hash-set
    docs/debugging/healing-bin/healing-bin
    docs/debugging/inspect/inspect
    docs/debugging/pprofgoparser/pprofgoparser
    docs/debugging/reorder-disks/reorder-disks
    docs/debugging/populate-hard-links/populate-hardlinks
    Plain Text
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Fri Dec 29 23:52:41 GMT 2023
    - 707 bytes
    - Viewed (0)
  3. docs/erasure/README.md

    Bit Rot, also known as data rot or silent data corruption is a data loss issue faced by disk drives today. Data on the drive may silently get corrupted without signaling an error has occurred, making bit rot more dangerous than a permanent hard drive failure.
    
    MinIO's erasure coded backend uses high speed [HighwayHash](https://github.com/minio/highwayhash) checksums to protect against Bit Rot.
    
    ## How are drives used for Erasure Code?
    
    Plain Text
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Thu Sep 29 04:28:45 GMT 2022
    - 4.1K bytes
    - Viewed (0)
  4. docs/sts/wso2.md

    ### 2. Configure WSO2
    
    Once WSO2 is up and running, configure WSO2 to generate Self contained id_tokens. In OAuth 2.0 specification there are primarily two ways to provide id_tokens
    
    1. The id_token is an identifier that is hard to guess. For example, a randomly generated string of sufficient length, that the server handling the protected resource can use to lookup the associated authorization information.
    Plain Text
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Thu Sep 29 04:28:45 GMT 2022
    - 8.7K bytes
    - Viewed (0)
  5. docs/kms/IAM.md

       There used to be two different mechanisms - one for regular S3 objects and one for IAM data.
    - Reduced server startup time. For IAM encryption with the root credentials, MinIO had
       to use a memory-hard function (Argon2) that (on purpose) consumes a lot of memory and CPU.
       The new KMS-based approach can use a key derivation function that is orders of magnitudes
       cheaper w.r.t. memory and CPU.
    Plain Text
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Thu Jan 18 07:03:17 GMT 2024
    - 5.3K bytes
    - Viewed (0)
Back to top