Search Options

Results per page
Sort
Preferred Languages
Advance

Results 151 - 160 of 463 for Real (0.04 sec)

  1. android/guava/src/com/google/common/primitives/Doubles.java

       */
      @InlineMe(replacement = "Double.compare(a, b)")
      public static int compare(double a, double b) {
        return Double.compare(a, b);
      }
    
      /**
       * Returns {@code true} if {@code value} represents a real number. This is equivalent to, but not
       * necessarily implemented as, {@code !(Double.isInfinite(value) || Double.isNaN(value))}.
       *
       * <p><b>Java 8+ users:</b> use {@link Double#isFinite(double)} instead.
       *
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Fri Oct 25 18:05:56 UTC 2024
    - 28.1K bytes
    - Viewed (0)
  2. common-protos/k8s.io/apimachinery/pkg/apis/meta/v1/generated.proto

      // For example: the master will return an internal IP CIDR only, if the client reaches the server using an internal IP.
      // Server looks at X-Forwarded-For header or X-Real-Ip header or request.RemoteAddr (in that order) to get the client IP.
      // +optional
      repeated ServerAddressByClientCIDR serverAddressByClientCIDRs = 4;
    }
    
    Registered: Wed Nov 06 22:53:10 UTC 2024
    - Last Modified: Mon Mar 11 18:43:24 UTC 2024
    - 53.3K bytes
    - Viewed (0)
  3. cmd/iam.go

    //
    // - RoleARN - if a role-arn is specified in the request, the STS credential's
    // policy is the role's policy.
    //
    // - inherited from parent - this is the case for AssumeRole API, where the
    // parent user is an actual real user with their own (permanent) credentials and
    // policy association.
    //
    // - inherited from "virtual" parent - this is the case for AssumeRoleWithLDAP
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Tue Oct 29 16:01:48 UTC 2024
    - 74.6K bytes
    - Viewed (0)
  4. docs/en/docs/async.md

    But still, the final experience is not the best. 😞
    
    ---
    
    This would be the parallel equivalent story for burgers. πŸ”
    
    For a more "real life" example of this, imagine a bank.
    
    Up to recently, most of the banks had multiple cashiers πŸ‘¨β€πŸ’ΌπŸ‘¨β€πŸ’ΌπŸ‘¨β€πŸ’ΌπŸ‘¨β€πŸ’Ό and a big line πŸ•™πŸ•™πŸ•™πŸ•™πŸ•™πŸ•™πŸ•™πŸ•™.
    
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Wed Aug 28 23:33:37 UTC 2024
    - 23.5K bytes
    - Viewed (0)
  5. src/archive/tar/reader.go

    		// no action. Thus, we try an innocent seek to the current position
    		// to see if Seek is really supported.
    		pos1, err := sr.Seek(0, io.SeekCurrent)
    		if pos1 >= 0 && err == nil {
    			// Seek seems supported, so perform the real Seek.
    			pos2, err := sr.Seek(n-1, io.SeekCurrent)
    			if pos2 < 0 || err != nil {
    				return err
    			}
    			seekSkipped = pos2 - pos1
    		}
    	}
    
    	copySkipped, err := io.CopyN(io.Discard, r, n-seekSkipped)
    Registered: Tue Nov 05 11:13:11 UTC 2024
    - Last Modified: Fri Mar 08 01:59:14 UTC 2024
    - 26.8K bytes
    - Viewed (0)
  6. android/guava/src/com/google/common/cache/CacheBuilder.java

     *             return createExpensiveGraph(key);
     *           }
     *         });
     * }</pre>
     *
     * <p>Or equivalently,
     *
     * <pre>{@code
     * // In real life this would come from a command-line flag or config file
     * String spec = "maximumSize=10000,expireAfterWrite=10m";
     *
     * LoadingCache<Key, Graph> graphs = CacheBuilder.from(spec)
     *     .removalListener(MY_LISTENER)
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Fri Oct 18 19:07:49 UTC 2024
    - 52K bytes
    - Viewed (0)
  7. doc/go_mem.html

    do exactly this.
    </p>
    
    <p>
    A read of an array, struct, or complex number
    may by implemented as a read of each individual sub-value
    (array element, struct field, or real/imaginary component),
    in any order.
    Similarly, a write of an array, struct, or complex number
    may be implemented as a write of each individual sub-value,
    in any order.
    </p>
    
    <p>
    Registered: Tue Nov 05 11:13:11 UTC 2024
    - Last Modified: Mon Mar 04 15:54:42 UTC 2024
    - 26.6K bytes
    - Viewed (0)
  8. configure.py

        suppress_default_error: (Bool) Suppress the above error message in favor of
          one from the check_success function.
        resolve_symlinks: (Bool) Translate symbolic links into the real filepath.
        n_ask_attempts: (Integer) Number of times to query for valid input before
          raising an error and quitting.
    
      Returns:
        [String] The value of var_name after querying for input.
    
      Raises:
    Registered: Tue Nov 05 12:39:12 UTC 2024
    - Last Modified: Wed Oct 02 22:16:02 UTC 2024
    - 48.2K bytes
    - Viewed (0)
  9. src/cmd/cgo/gcc.go

    	//
    	// When the function argument is a conversion to unsafe.Pointer,
    	// we unwrap the conversion before checking the pointer,
    	// and then wrap again when calling C.f. This lets us check
    	// the real type of the pointer in some cases. See issue #25941.
    	//
    	// When the call to C.f is deferred, we use an additional function
    	// literal to evaluate the arguments at the right time.
    	//    defer func() func() {
    Registered: Tue Nov 05 11:13:11 UTC 2024
    - Last Modified: Wed Sep 18 15:07:34 UTC 2024
    - 97.1K bytes
    - Viewed (0)
  10. common-protos/k8s.io/api/core/v1/generated.proto

      // kubelet.  If the kubelet is configured to verify the apiserver's TLS credentials, it does not mean the
      // connection to the real kubelet is vulnerable to a man in the middle attack (e.g. an attacker could not intercept
      // the actual log data coming from the real kubelet).
      // +optional
      optional bool insecureSkipTLSVerifyBackend = 9;
    }
    
    Registered: Wed Nov 06 22:53:10 UTC 2024
    - Last Modified: Mon Mar 11 18:43:24 UTC 2024
    - 255.8K bytes
    - Viewed (0)
Back to top