- Sort Score
- Num 10 results
- Language All
Results 111 - 120 of 1,303 for rare (0.02 seconds)
The search processing time has exceeded the limit. The displayed results may be partial.
-
cmd/leak-detect_test.go
initialStackSnapShot.DetectLeak(t) } } // list of functions to be ignored from the stack trace. // Leak detection is done when tests are run, should ignore the tests related functions, // and other runtime functions while identifying leaks. var ignoredStackFns = []string{ "", // Below are the stacks ignored by the upstream leaktest code. "testing.Main(", "testing.tRunner(", "testing.tRunner(", "runtime.goexit",
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Sun Sep 28 20:59:21 GMT 2025 - 5.2K bytes - Click Count (0) -
guava/src/com/google/common/util/concurrent/Service.java
*/ FAILED, } /** * A listener for the various state changes that a {@link Service} goes through in its lifecycle. * * <p>All methods are no-ops by default, implementors should override the ones they care about. * * @author Luke Sandberg * @since 15.0 (present as an interface in 13.0) */ abstract class Listener { /** Constructor for use by subclasses. */Created: Fri Dec 26 12:43:10 GMT 2025 - Last Modified: Sat Dec 21 03:10:51 GMT 2024 - 12.2K bytes - Click Count (0) -
okhttp/src/jvmTest/kotlin/okhttp3/ConnectionCoalescingTest.kt
* - Both request discover no existing connection. They both make a connection. * - The first request "wins the race". * - The second request discovers it "lost the race" and closes the connection it just opened. * - The second request uses the coalesced connection from request1. * - The coalesced connection is violently closed after servicing the first request.
Created: Fri Dec 26 11:42:13 GMT 2025 - Last Modified: Thu Jun 19 11:44:16 GMT 2025 - 19.1K bytes - Click Count (0) -
android/guava/src/com/google/common/hash/HashFunction.java
* <li><b>cryptographic:</b> certain hash functions such as {@link Hashing#sha512} are designed to * make it as infeasible as possible to reverse-engineer the input that produced a given hash * code, or even to discover <i>any</i> two distinct inputs that yield the same result. These * are called <i>cryptographic hash functions</i>. But, whenever it is learned that either of
Created: Fri Dec 26 12:43:10 GMT 2025 - Last Modified: Mon Mar 17 20:26:29 GMT 2025 - 10.9K bytes - Click Count (0) -
guava/src/com/google/common/hash/HashFunction.java
* <li><b>cryptographic:</b> certain hash functions such as {@link Hashing#sha512} are designed to * make it as infeasible as possible to reverse-engineer the input that produced a given hash * code, or even to discover <i>any</i> two distinct inputs that yield the same result. These * are called <i>cryptographic hash functions</i>. But, whenever it is learned that either of
Created: Fri Dec 26 12:43:10 GMT 2025 - Last Modified: Mon Mar 17 20:26:29 GMT 2025 - 10.9K bytes - Click Count (0) -
guava/src/com/google/common/util/concurrent/Striped.java
* #lazyWeakReadWriteLock(int) weak} {@code Striped<ReadWriteLock>}. <i>Strong</i> means that all * stripes (locks/semaphores) are initialized eagerly, and are not reclaimed unless {@code Striped} * itself is reclaimable. <i>Weak</i> means that locks/semaphores are created lazily, and they are * allowed to be reclaimed if nobody is holding on to them. This is useful, for example, if oneCreated: Fri Dec 26 12:43:10 GMT 2025 - Last Modified: Tue Sep 16 22:01:32 GMT 2025 - 20.6K bytes - Click Count (0) -
docs/en/docs/deployment/concepts.md
# Deployments Concepts { #deployments-concepts } When deploying a **FastAPI** application, or actually, any type of web API, there are several concepts that you probably care about, and using them you can find the **most appropriate** way to **deploy your application**. Some of the important concepts are: * Security - HTTPS * Running on startup * Restarts * Replication (the number of processes running) * Memory * Previous steps before startingCreated: Sun Dec 28 07:19:09 GMT 2025 - Last Modified: Sun Aug 31 09:15:41 GMT 2025 - 18.6K bytes - Click Count (1) -
src/main/java/jcifs/smb/SmbTreeImpl.java
final ServerMessageBlock req = (ServerMessageBlock) request; svc = this.service; if (svc == null) { // there still is some kind of race condition, where? // this used to trigger "invalid operation..." throw new SmbException("Service is null in state " + this.connectionState.get()); }Created: Sat Dec 20 13:44:44 GMT 2025 - Last Modified: Sun Aug 31 08:00:57 GMT 2025 - 30K bytes - Click Count (0) -
docs/en/docs/tutorial/response-model.md
So, **FastAPI** will take care of filtering out all the data that is not declared in the output model (using Pydantic). ### `response_model` or Return Type { #response-model-or-return-type } In this case, because the two models are different, if we annotated the function return type as `UserOut`, the editor and tools would complain that we are returning an invalid type, as those are different classes.
Created: Sun Dec 28 07:19:09 GMT 2025 - Last Modified: Sat Dec 20 15:55:38 GMT 2025 - 15.5K bytes - Click Count (0) -
cmd/bucket-metadata-sys.go
globalBucketMonitor.DeleteBucket(bucket) } } // Set - sets a new metadata in-memory. // Only a shallow copy is saved and fields with references // cannot be modified without causing a race condition, // so they should be replaced atomically and not appended to, etc. // Data is not persisted to disk. func (sys *BucketMetadataSys) Set(bucket string, meta BucketMetadata) { if !isMinioMetaBucketName(bucket) {
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Fri Aug 29 02:39:48 GMT 2025 - 20.4K bytes - Click Count (0)