Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 17 for thousand (0.2 sec)

  1. okhttp-idna-mapping-table/src/main/resources/okhttp3/internal/idna/IdnaMappingTable.txt

    217F          ; mapped                 ; 006D          # 1.1  SMALL ROMAN NUMERAL ONE THOUSAND
    2180..2182    ; valid                  ;      ; NV8    # 1.1  ROMAN NUMERAL ONE THOUSAND C D..ROMAN NUMERAL TEN THOUSAND
    2183          ; disallowed                             # 3.0  ROMAN NUMERAL REVERSED ONE HUNDRED
    Plain Text
    - Registered: Fri Apr 19 11:42:09 GMT 2024
    - Last Modified: Sat Feb 10 11:25:47 GMT 2024
    - 854.1K bytes
    - Viewed (2)
  2. guava-tests/test/com/google/common/io/testdata/alice_in_wonderland.txt

    true.)
    
      Down, down, down.  Would the fall NEVER come to an end!  `I
    wonder how many miles I've fallen by this time?' she said aloud.
    `I must be getting somewhere near the centre of the earth.  Let
    me see:  that would be four thousand miles down, I think--' (for,
    you see, Alice had learnt several things of this sort in her
    lessons in the schoolroom, and though this was not a VERY good
    opportunity for showing off her knowledge, as there was no one to
    Plain Text
    - Registered: Fri Apr 12 12:43:09 GMT 2024
    - Last Modified: Mon Oct 29 21:35:03 GMT 2012
    - 145.2K bytes
    - Viewed (0)
  3. android/guava-tests/test/com/google/common/io/testdata/alice_in_wonderland.txt

    true.)
    
      Down, down, down.  Would the fall NEVER come to an end!  `I
    wonder how many miles I've fallen by this time?' she said aloud.
    `I must be getting somewhere near the centre of the earth.  Let
    me see:  that would be four thousand miles down, I think--' (for,
    you see, Alice had learnt several things of this sort in her
    lessons in the schoolroom, and though this was not a VERY good
    opportunity for showing off her knowledge, as there was no one to
    Plain Text
    - Registered: Fri Apr 19 12:43:09 GMT 2024
    - Last Modified: Fri Apr 21 02:27:51 GMT 2017
    - 145.2K bytes
    - Viewed (0)
  4. README.md

    If a binary distribution is not available for your combination of
    operating system and architecture, visit
    https://go.dev/doc/install/source
    for source installation instructions.
    
    ### Contributing
    
    Go is the work of thousands of contributors. We appreciate your help!
    
    To contribute, please read the contribution guidelines at https://go.dev/doc/contribute.
    
    Note that the Go project uses the issue tracker for bug reports and
    Plain Text
    - Registered: Tue Apr 16 11:13:10 GMT 2024
    - Last Modified: Wed Nov 02 20:14:56 GMT 2022
    - 1.4K bytes
    - Viewed (0)
  5. docs/contribute/code_of_conduct.md

    ===========================
    
    At Square, we are committed to contributing to the open source community and simplifying the process
    of releasing and managing open source software. We’ve seen incredible support and enthusiasm from
    thousands of people who have already contributed to our projects — and we want to ensure our community
    continues to be truly open for everyone.
    
    This code of conduct outlines our expectations for participants, as well as steps to reporting
    Plain Text
    - Registered: Fri Apr 19 11:42:09 GMT 2024
    - Last Modified: Sun Feb 06 02:19:09 GMT 2022
    - 5.1K bytes
    - Viewed (0)
  6. docs/en/docs/tutorial/security/get-current-user.md

    But you can have thousands of endpoints (*path operations*) using the same security system.
    
    And all of them (or any portion of them that you want) can take the advantage of re-using these dependencies or any other dependencies you create.
    
    And all these thousands of *path operations* can be as small as 3 lines:
    
    === "Python 3.10+"
    
    Plain Text
    - Registered: Sun Apr 14 07:19:09 GMT 2024
    - Last Modified: Thu Jan 11 16:31:18 GMT 2024
    - 7.6K bytes
    - Viewed (0)
  7. docs/en/docs/advanced/security/http-basic-auth.md

    #### A "professional" attack
    
    Of course, the attackers would not try all this by hand, they would write a program to do it, possibly with thousands or millions of tests per second. And would get just one extra correct letter at a time.
    
    Plain Text
    - Registered: Sun Apr 14 07:19:09 GMT 2024
    - Last Modified: Thu Jan 11 14:33:05 GMT 2024
    - 5.9K bytes
    - Viewed (0)
  8. docs/en/docs/help-fastapi.md

    On the other side, there are thousands of users in the chat systems, so there's a high chance you'll find someone to talk to there, almost all the time. 😄
    
    ## Sponsor the author
    
    Plain Text
    - Registered: Sun Apr 14 07:19:09 GMT 2024
    - Last Modified: Sun Mar 31 23:52:53 GMT 2024
    - 13.7K bytes
    - Viewed (0)
  9. guava-tests/test/com/google/common/io/MoreFilesTest.java

      /**
       * This test attempts to create a situation in which one thread is constantly changing a file from
       * being a real directory to being a symlink to another directory. It then calls
       * deleteDirectoryContents thousands of times on a directory whose subtree contains the file
       * that's switching between directory and symlink to try to ensure that under no circumstance does
    Java
    - Registered: Fri Apr 19 12:43:09 GMT 2024
    - Last Modified: Mon Jan 29 22:57:05 GMT 2024
    - 27.2K bytes
    - Viewed (0)
  10. docs/en/docs/deployment/concepts.md

    On the other hand, if you have 2 servers and you are using **100% of their CPU and RAM**, at some point one process will ask for more memory, and the server will have to use the disk as "memory" (which can be thousands of times slower), or even **crash**. Or one process might need to do some computation and would have to wait until the CPU is free again.
    
    Plain Text
    - Registered: Sun Apr 14 07:19:09 GMT 2024
    - Last Modified: Thu Jan 11 16:31:18 GMT 2024
    - 18K bytes
    - Viewed (0)
Back to top