- Sort Score
- Result 10 results
- Languages All
Results 1171 - 1180 of 1,387 for Rights (0.17 sec)
-
guava/src/com/google/common/base/Throwables.java
throw death; } catch (Throwable t) { /* * This is not one of AppEngine's allowed classes, so even in Sun JDKs, this can fail with * a NoClassDefFoundError. Other apps might deny access to sun.misc packages. */ return null; } } /** * Returns the Method that can be used to resolve an individual StackTraceElement, or null if that
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Fri Jul 19 16:02:36 UTC 2024 - 20.7K bytes - Viewed (0) -
cmd/generic-handlers.go
} return } h.ServeHTTP(w, r) }) } // setBucketForwardingMiddleware middleware forwards the path style requests // on a bucket to the right bucket location, bucket to IP configuration // is obtained from centralized etcd configuration service. func setBucketForwardingMiddleware(h http.Handler) http.Handler {
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Mon Jul 29 18:10:04 UTC 2024 - 20.5K bytes - Viewed (0) -
src/test/java/jcifs/tests/FileAttributesTest.java
} catch ( SmbException e ) { if ( e.getNtStatus() == NtStatus.NT_STATUS_ACCESS_DENIED || e.getNtStatus() == WinError.ERROR_ACCESS_DENIED ) { // we might not have permissions for that Assume.assumeTrue("No permission for share security accesss", false); } throw e; } } }
Registered: Sun Nov 03 00:10:13 UTC 2024 - Last Modified: Thu Jan 05 13:09:03 UTC 2023 - 12.3K bytes - Viewed (0) -
docs/contribute/concurrency.md
#### Blocking APIs Blocking APIs are convenient because you get top-to-bottom procedural code without indirection. Network calls work like regular method calls: ask for data and it is returned. If the request fails, you get a stacktrace right where the call was made. Blocking APIs may be inefficient because you hold a thread idle while waiting on the network. Threads are expensive because they have both a memory overhead and a context-switching overhead.
Registered: Fri Nov 01 11:42:11 UTC 2024 - Last Modified: Sun Feb 06 16:35:36 UTC 2022 - 7K bytes - Viewed (0) -
gradlew
# set -- "${ARGS[@]}" "$@" # # but POSIX shell has neither arrays nor command substitution, so instead we # post-process each arg (as a line of input to sed) to backslash-escape any # character that might be a shell metacharacter, then use eval to reverse # that process (while maintaining the separation between arguments), and wrap # the whole thing up as a single "set" statement. #
Registered: Fri Nov 01 11:42:11 UTC 2024 - Last Modified: Sun Dec 24 09:00:26 UTC 2023 - 8.5K bytes - Viewed (0) -
android/guava/src/com/google/common/primitives/UnsignedLong.java
return (double) value; } // The top bit is set, which means that the double value is going to come from the top 53 bits. // So we can ignore the bottom 11, except for rounding. We can unsigned-shift right 1, aka // unsigned-divide by 2, and convert that. Then we'll get exactly half of the desired double // value. But in the specific case where the bottom two bits of the original number are 01, we
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Thu Apr 22 13:09:25 UTC 2021 - 8.9K bytes - Viewed (0) -
guava/src/com/google/common/collect/CompactLinkedHashSet.java
return new CompactLinkedHashSet<>(expectedSize); } private static final int ENDPOINT = -2; // TODO(user): predecessors and successors should be collocated (reducing cache misses). // Might also explore collocating all of [hash, next, predecessor, successor] fields of an // entry in a *single* long[], though that reduces the maximum size of the set by a factor of 2 /**
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Tue Jul 09 00:15:47 UTC 2024 - 9.7K bytes - Viewed (0) -
guava/src/com/google/common/primitives/UnsignedLong.java
return (double) value; } // The top bit is set, which means that the double value is going to come from the top 53 bits. // So we can ignore the bottom 11, except for rounding. We can unsigned-shift right 1, aka // unsigned-divide by 2, and convert that. Then we'll get exactly half of the desired double // value. But in the specific case where the bottom two bits of the original number are 01, we
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Thu Apr 22 13:09:25 UTC 2021 - 8.9K bytes - Viewed (0) -
docs/en/docs/tutorial/body.md
As it is discouraged, the interactive docs with Swagger UI won't show the documentation for the body when using `GET`, and proxies in the middle might not support it. /// ## Import Pydantic's `BaseModel` First, you need to import `BaseModel` from `pydantic`: {* ../../docs_src/body/tutorial001_py310.py hl[2] *} ## Create your data model
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Sun Oct 27 16:58:19 UTC 2024 - 6.6K bytes - Viewed (0) -
okhttp-idna-mapping-table/src/main/resources/okhttp3/internal/idna/IdnaMappingTable.txt
2500..2595 ; valid ; ; NV8 # 1.1 BOX DRAWINGS LIGHT HORIZONTAL..RIGHT ONE EIGHTH BLOCK 2596..259F ; valid ; ; NV8 # 3.2 QUADRANT LOWER LEFT..QUADRANT UPPER RIGHT AND LOWER LEFT AND LOWER RIGHT 25A0..25EF ; valid ; ; NV8 # 1.1 BLACK SQUARE..LARGE CIRCLE
Registered: Fri Nov 01 11:42:11 UTC 2024 - Last Modified: Sat Feb 10 11:25:47 UTC 2024 - 854.1K bytes - Viewed (0)