Search Options

Display Count
Sort
Preferred Language
Advanced Search

Results 1 - 10 of 871 for deemed (0.08 seconds)

  1. CODE_OF_CONDUCT.md

    ## Enforcement Guidelines
    
    Community leaders will follow these Community Impact Guidelines in determining
    the consequences for any action they deem in violation of this Code of Conduct:
    
    ### 1. Correction
    
    **Community Impact**: Use of inappropriate language or other behavior deemed
    unprofessional or unwelcome in the community.
    
    **Consequence**: A private, written warning from community leaders, providing
    Created: Sun Dec 28 09:35:17 GMT 2025
    - Last Modified: Thu Oct 17 06:18:13 GMT 2024
    - 5K bytes
    - Click Count (0)
  2. cmd/globals.go

    	globalMaxSkewTime = 15 * time.Minute // 15 minutes skew allowed.
    
    	// GlobalStaleUploadsExpiry - Expiry duration after which the uploads in multipart,
    	// tmp directory are deemed stale.
    	GlobalStaleUploadsExpiry = time.Hour * 24 // 24 hrs.
    
    	// GlobalStaleUploadsCleanupInterval - Cleanup interval when the stale uploads cleanup is initiated.
    	GlobalStaleUploadsCleanupInterval = time.Hour * 6 // 6 hrs.
    Created: Sun Dec 28 19:28:13 GMT 2025
    - Last Modified: Tue Sep 03 18:23:41 GMT 2024
    - 16.2K bytes
    - Click Count (1)
  3. android/guava/src/com/google/common/hash/HashFunction.java

     *       are called <i>cryptographic hash functions</i>. But, whenever it is learned that either of
     *       these feats has become computationally feasible, the function is deemed "broken" and should
     *       no longer be used for secure purposes. (This is the likely eventual fate of <i>all</i>
     *       cryptographic hashes.)
    Created: Fri Dec 26 12:43:10 GMT 2025
    - Last Modified: Mon Mar 17 20:26:29 GMT 2025
    - 10.9K bytes
    - Click Count (0)
  4. guava/src/com/google/common/hash/HashFunction.java

     *       are called <i>cryptographic hash functions</i>. But, whenever it is learned that either of
     *       these feats has become computationally feasible, the function is deemed "broken" and should
     *       no longer be used for secure purposes. (This is the likely eventual fate of <i>all</i>
     *       cryptographic hashes.)
    Created: Fri Dec 26 12:43:10 GMT 2025
    - Last Modified: Mon Mar 17 20:26:29 GMT 2025
    - 10.9K bytes
    - Click Count (0)
  5. cmd/xl-storage-disk-id-check.go

    				}
    			}
    			si(sz, errp)
    		})
    	}, nil
    }
    
    var toWrite = []byte{2048: 42}
    
    // monitorDiskStatus should be called once when a drive has been marked offline.
    // Once the disk has been deemed ok, it will return to online status.
    func (p *xlStorageDiskIDCheck) monitorDiskStatus(spent time.Duration, fn string) {
    	t := time.NewTicker(5 * time.Second)
    	defer t.Stop()
    
    	for range t.C {
    Created: Sun Dec 28 19:28:13 GMT 2025
    - Last Modified: Fri Apr 25 05:41:04 GMT 2025
    - 34.5K bytes
    - Click Count (0)
  6. docs/LICENSE

         conditions on any use of the Licensed Material that could lawfully
         be made without permission under this Public License.
    
      b. To the extent possible, if any provision of this Public License is
         deemed unenforceable, it shall be automatically reformed to the
         minimum extent necessary to make it enforceable. If the provision
         cannot be reformed, it shall be severed from this Public License
    Created: Sun Dec 28 19:28:13 GMT 2025
    - Last Modified: Mon May 10 16:50:06 GMT 2021
    - 18.2K bytes
    - Click Count (0)
  7. LICENSE

    the conditions stated below.  Sublicensing is not allowed; section 10
    makes it unnecessary.
    
      3. Protecting Users' Legal Rights From Anti-Circumvention Law.
    
      No covered work shall be deemed part of an effective technological
    measure under any applicable law fulfilling obligations under article
    11 of the WIPO copyright treaty adopted on 20 December 1996, or
    similar laws prohibiting or restricting circumvention of such
    Created: Sun Dec 28 19:28:13 GMT 2025
    - Last Modified: Fri Apr 23 18:58:53 GMT 2021
    - 33.7K bytes
    - Click Count (0)
  8. src/main/java/jcifs/smb/NtStatus.java

        /** End of file reached */
        int NT_STATUS_END_OF_FILE = 0xC0000011;
        /** More processing is required to complete this request */
        int NT_STATUS_MORE_PROCESSING_REQUIRED = 0xC0000016;
        /** Access is denied */
        int NT_STATUS_ACCESS_DENIED = 0xC0000022;
        /** The data area passed to a system call is too small */
        int NT_STATUS_BUFFER_TOO_SMALL = 0xC0000023;
        /** The object name is invalid */
    Created: Sat Dec 20 13:44:44 GMT 2025
    - Last Modified: Sun Aug 31 08:00:57 GMT 2025
    - 14.9K bytes
    - Click Count (0)
  9. CREDITS

    ================================================================
    
    github.com/decred/dcrd/dcrec/secp256k1/v4
    https://github.com/decred/dcrd/dcrec/secp256k1/v4
    ----------------------------------------------------------------
    ISC License
    
    Copyright (c) 2013-2017 The btcsuite developers
    Copyright (c) 2015-2024 The Decred developers
    Copyright (c) 2017 The Lightning Network Developers
    
    Created: Sun Dec 28 19:28:13 GMT 2025
    - Last Modified: Thu Mar 13 05:29:51 GMT 2025
    - 1.8M bytes
    - Click Count (0)
  10. cmd/xl-storage-format-utils.go

    		}
    		versions, err = xlMeta.ListVersions(volume, path, allParts)
    	}
    	if err == nil && len(versions) == 0 {
    		// This special case is needed to handle len(xlMeta.versions) == 0
    		versions = []FileInfo{
    			{
    				Volume:   volume,
    				Name:     path,
    				Deleted:  true,
    				IsLatest: true,
    				ModTime:  timeSentinel1970,
    			},
    		}
    	}
    	if err != nil {
    		return FileInfoVersions{}, err
    	}
    
    Created: Sun Dec 28 19:28:13 GMT 2025
    - Last Modified: Thu Aug 08 15:29:58 GMT 2024
    - 5.5K bytes
    - Click Count (0)
Back to Top