- Sort Score
- Result 10 results
- Languages All
Results 301 - 310 of 595 for sekund (0.03 sec)
-
okhttp-idna-mapping-table/src/main/kotlin/okhttp3/internal/idn/SimpleIdnaMappingTable.kt
* * Regular lines contain fields separated by semicolons. * * The first element on each line is a single hex code point (like 0041) or a hex code point range * (like 0030..0039). * * The second element on each line is a mapping type, like `valid` or `mapped`. * * For lines that contain a mapping target, the next thing is a sequence of hex code points (like * 0031 2044 0034). * * All other data is ignored.
Registered: Fri Sep 05 11:42:10 UTC 2025 - Last Modified: Mon Jan 08 01:13:22 UTC 2024 - 6.8K bytes - Viewed (0) -
android/guava/src/com/google/common/eventbus/Dispatcher.java
// were added to the queue. It's easily possible for one thread to take the head of the // queue, immediately followed by another thread taking the next element in the queue. That // second thread can then dispatch to the subscriber it took before the first thread does. // // All this makes me really wonder if there's any value in queueing here at all. A dispatcher
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Tue May 13 17:27:14 UTC 2025 - 7.4K bytes - Viewed (0) -
src/main/java/org/codelibs/fess/job/PythonJob.java
if (exitValue != 0) { final StringBuilder out = new StringBuilder(); if (processTimeout) { out.append("Process is terminated due to ").append(timeout).append(" second exceeded.\n"); } out.append("Exit Code: ").append(exitValue).append("\nOutput:\n").append(it.getOutput()); throw new JobProcessingException(out.toString()); }
Registered: Thu Sep 04 12:52:25 UTC 2025 - Last Modified: Thu Jul 17 08:28:31 UTC 2025 - 8.2K bytes - Viewed (0) -
cmd/peer-rest-server.go
return } durationStr := r.Form.Get(peerRESTDuration) duration, err := time.ParseDuration(durationStr) if err != nil || duration.Seconds() == 0 { duration = time.Second * 10 } result := netperf(r.Context(), duration.Round(time.Second)) peersLogIf(r.Context(), gob.NewEncoder(w).Encode(result)) }
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Sun Mar 30 00:56:02 UTC 2025 - 53.4K bytes - Viewed (0) -
cmd/metrics-v3-cache.go
m.percUtil = float64(ioStats.TotalTicks) * 100 / (durationSecs * 1000) return } func newDriveMetricsCache() *cachevalue.Cache[storageMetrics] { var ( // prevDriveIOStats is used to calculate "per second" // values for IOStat related disk metrics e.g. reads/sec. prevDriveIOStats map[string]madmin.DiskIOStats prevDriveIOStatsMu sync.RWMutex prevDriveIOStatsRefreshedAt time.Time )
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Sun Mar 30 00:56:02 UTC 2025 - 8K bytes - Viewed (0) -
src/main/java/org/codelibs/core/lang/StringUtil.java
Registered: Fri Sep 05 20:58:11 UTC 2025 - Last Modified: Thu Jul 31 08:16:49 UTC 2025 - 21.9K bytes - Viewed (0) -
compat/maven-compat/src/main/java/org/apache/maven/repository/legacy/DefaultWagonManager.java
// this will run at most twice. The first time, the firstRun flag is turned off, and if the retry flag // is set on the first run, it will be turned off and not re-set on the second try. This is because the // only way the retry flag can be set is if ( firstRun == true ). while (firstRun || retry) { ChecksumObserver md5ChecksumObserver = null;Registered: Sun Sep 07 03:35:12 UTC 2025 - Last Modified: Sat Apr 05 11:52:05 UTC 2025 - 29.9K bytes - Viewed (0) -
src/test/java/jcifs/dcerpc/msrpc/MsrpcShareEnumTest.java
Field remarkField = SmbShareInfo.class.getDeclaredField("remark"); remarkField.setAccessible(true); assertEquals("Remark for Share1", remarkField.get(shareInfo)); // Verify the second entry FileEntry entry2 = entries[1]; assertNotNull(entry2); assertEquals("Share2", entry2.getName()); assertEquals(32, entry2.getType()); // TYPE_PRINTER constant (0x20) }
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Thu Aug 14 05:31:44 UTC 2025 - 8.1K bytes - Viewed (0) -
docs/pt/docs/advanced/security/http-basic-auth.md
#### Um ataque "profissional" Claro, os invasores não tentariam tudo isso de forma manual, eles escreveriam um programa para fazer isso, possivelmente com milhares ou milhões de testes por segundo. E obteriam apenas uma letra a mais por vez. Mas fazendo isso, em alguns minutos ou horas os invasores teriam adivinhado o usuário e senha corretos, com a "ajuda" da nossa aplicação, apenas usando o tempo levado para responder.
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Mon Nov 18 02:25:44 UTC 2024 - 5.1K bytes - Viewed (0) -
src/test/java/jcifs/smb1/smb1/ServerMessageBlockTest.java
long time = System.currentTimeMillis(); ServerMessageBlock.writeTime(time, buffer, 0); long readTime = ServerMessageBlock.readTime(buffer, 0); // Precision may be lost, so check within a second assertTrue(Math.abs(time - readTime) < 1000); } @Test void testTimeReadWriteZero() { byte[] buffer = new byte[8]; ServerMessageBlock.writeTime(0, buffer, 0);
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Thu Aug 14 05:31:44 UTC 2025 - 9.9K bytes - Viewed (0)