- Sort Score
- Result 10 results
- Languages All
Results 141 - 150 of 365 for slide (0.02 sec)
-
src/main/java/org/codelibs/core/lang/StringUtil.java
} /** * Removes whitespace from the left side of the string. * * @param text * The text to trim * @return The resulting string */ public static final String ltrim(final String text) { return ltrim(text, null); } /** * Removes the specified characters from the left side of the string. * * @param textRegistered: Sat Dec 20 08:55:33 UTC 2025 - Last Modified: Sat Nov 22 11:21:59 UTC 2025 - 21.5K bytes - Viewed (0) -
src/bufio/scan.go
// scanning lines, a [SplitFunc] can return (0, nil, nil) to signal the // [Scanner] to read more data into the slice and try again with a // longer slice starting at the same point in the input. // // The function is never called with an empty data slice unless atEOF // is true. If atEOF is true, however, data may be non-empty and, // as always, holds unprocessed text.
Registered: Tue Dec 30 11:13:12 UTC 2025 - Last Modified: Wed May 21 18:05:26 UTC 2025 - 14.2K bytes - Viewed (0) -
src/main/java/jcifs/internal/smb2/ioctl/SrvCopychunk.java
*/ package jcifs.internal.smb2.ioctl; import jcifs.Encodable; import jcifs.internal.util.SMBUtil; /** * SMB2 SRV_COPYCHUNK data structure. This structure represents a single chunk specification * for server-side copy operations. * * @author mbechler * */ public class SrvCopychunk implements Encodable { private final long sourceOffset; private final long targetOffset; private final int length;Registered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Sat Aug 16 01:32:48 UTC 2025 - 2.2K bytes - Viewed (0) -
src/main/java/jcifs/internal/smb2/ioctl/SrvCopychunkCopy.java
*/ package jcifs.internal.smb2.ioctl; import jcifs.Encodable; import jcifs.internal.util.SMBUtil; /** * SMB2 SRV_COPYCHUNK_COPY data structure. This structure is used to perform server-side * copy operations with multiple chunk specifications. * * @author mbechler * */ public class SrvCopychunkCopy implements Encodable { private final byte[] sourceKey;Registered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Sat Aug 16 01:32:48 UTC 2025 - 2.2K bytes - Viewed (0) -
cmd/admin-handlers_test.go
// } // } check := func(exp, got madmin.LockEntries) (int, bool) { if len(exp) != len(got) { return 0, false } sort.Slice(exp, byResourceUID{exp}.Less) sort.Slice(got, byResourceUID{got}.Less) // printEntries(exp) // printEntries(got) for i, e := range exp { if !e.Timestamp.Equal(got[i].Timestamp) { return i, false }
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 13.9K bytes - Viewed (1) -
internal/hash/reader.go
// Client-provided content checksum contentHash Checksum contentHasher hash.Hash disableMD5 bool // Server side computed checksum. In some cases, like CopyObject, a new checksum // needs to be computed and saved on the destination object, but the client // does not provide it. Not calculated if client-side contentHash is set. ServerSideChecksumType ChecksumType ServerSideHasher hash.Hash ServerSideChecksumResult *Checksum
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Wed Jun 25 15:08:54 UTC 2025 - 11.8K bytes - Viewed (0) -
guava/src/com/google/common/collect/Cut.java
* instance. */ super(""); } @Override Comparable<?> endpoint() { throw new IllegalStateException("range unbounded on this side"); } @Override boolean isLessThan(Comparable<?> value) { return true; } @Override BoundType typeAsLowerBound() { throw new IllegalStateException(); }Registered: Fri Dec 26 12:43:10 UTC 2025 - Last Modified: Mon Sep 22 18:35:44 UTC 2025 - 12.4K bytes - Viewed (0) -
finisher_api.go
func (db *DB) CreateInBatches(value interface{}, batchSize int) (tx *DB) { reflectValue := reflect.Indirect(reflect.ValueOf(value)) switch reflectValue.Kind() { case reflect.Slice, reflect.Array: var rowsAffected int64 tx = db.getInstance() // the reflection length judgment of the optimized value reflectLen := reflectValue.Len() callFc := func(tx *DB) error {
Registered: Sun Dec 28 09:35:17 UTC 2025 - Last Modified: Fri Sep 19 01:49:06 UTC 2025 - 22.9K bytes - Viewed (0) -
SECURITY.md
### Hardware attacks Physical GPUs or TPUs can also be the target of attacks. [Published research](https://scholar.google.com/scholar?q=gpu+side+channel) shows that it might be possible to use side channel attacks on the GPU to leak data from other running models or processes in the same system. GPUs can also have implementation bugs that might allow attackers to leave malicious code running
Registered: Tue Dec 30 12:39:10 UTC 2025 - Last Modified: Wed Oct 16 16:10:43 UTC 2024 - 9.6K bytes - Viewed (0) -
internal/s3select/csv/testdata/testdata.zip
East Harlem South 3804 1098 150.02 1 Manhattan 015002 1015002 I MN40 Upper East Side-Carnegie Hill 3805 3389254 2 2014-03-26 19:13:50 2014-03-26 19:19:57 N 1 -73.951805114746094 40.793228149414063 -73.967231750488281 40.793693542480469 1 1.06 6.5 1 0.5 1 0 9 1 1 75 151 green 0.00 0.0 0.0 36 24 11.86 1267 168 1 Manhattan 016800 1016800 E MN33 East Harlem South 3804 1305 185 1 Manhattan 018500 1018500 I MN12 Upper West Side 3806 3389255 1 2014-03-10 17:49:29 2014-03-10 17:53:43 N 1 -73.952110290527344...
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Tue Jun 01 21:59:40 UTC 2021 - 111.6K bytes - Viewed (0)