- Sort Score
- Result 10 results
- Languages All
Results 351 - 360 of 511 for replica (0.19 sec)
-
guava/src/com/google/common/primitives/UnsignedLong.java
// unsigned-divide by 2, and convert that. Then we'll get exactly half of the desired double // value. But in the specific case where the bottom two bits of the original number are 01, we // want to replace that with 1 in the shifted value for correct rounding. return (double) ((value >>> 1) | (value & 1)) * 2.0; } /** Returns the value of this {@code UnsignedLong} as a {@link BigInteger}. */
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Wed Jun 04 13:03:16 UTC 2025 - 8.8K bytes - Viewed (0) -
docs/lambda/README.md
# Get the original S3 object using the presigned URL r = requests.get(s3_url) original_object = r.content.decode('utf-8') # Transform all text in the original object to uppercase # You can replace it with your custom code based on your use case transformed_object = original_object.upper() # Write object back to S3 Object Lambda # response sends the transformed data # back to MinIO and then to the user
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Tue Aug 12 18:20:36 UTC 2025 - 7.7K bytes - Viewed (0) -
src/main/java/org/codelibs/fess/helper/RelatedContentHelper.java
Registered: Thu Sep 04 12:52:25 UTC 2025 - Last Modified: Thu Jul 17 08:28:31 UTC 2025 - 8.2K bytes - Viewed (0) -
guava/src/com/google/common/util/concurrent/SimpleTimeLimiter.java
return callWithTimeout( callable, timeoutDuration, timeoutUnit, interruptibleMethods.contains(method)); }; return newProxy(interfaceType, handler); } // TODO: replace with version in common.reflect if and when it's open-sourced private static <T> T newProxy(Class<T> interfaceType, InvocationHandler handler) { Object object = Proxy.newProxyInstance(
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Tue May 13 17:27:14 UTC 2025 - 9.5K bytes - Viewed (0) -
docs/distributed/README.md
- The IP addresses and drive paths below are for demonstration purposes only, you need to replace these with the actual IP addresses and drive paths/folders.
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Tue Aug 12 18:20:36 UTC 2025 - 8.9K bytes - Viewed (0) -
src/main/resources/fess_label.properties
labels.searchlog_requestedtime=Time labels.searchlog_accesstype=Access Type labels.maintenance_title_configuration=Maintenance labels.number_of_shards_for_doc=Number of Shards labels.auto_expand_replicas_for_doc=Auto-expand Replicas labels.clear_crawler_index=Crawler Index labels.clear_crawler_index_button=Delete Crawler Index labels.diagnostic_logs=Diagnostics labels.download_diagnostic_logs_button=Download Logs
Registered: Thu Sep 04 12:52:25 UTC 2025 - Last Modified: Sat Jun 28 08:40:50 UTC 2025 - 40.7K bytes - Viewed (0) -
docs/features/interceptors.md
* Observe the data just as it will be transmitted over the network. * Access to the `Connection` that carries the request. ### Rewriting Requests Interceptors can add, remove, or replace request headers. They can also transform the body of those requests that have one. For example, you can use an application interceptor to add request body compression if you're connecting to a webserver known to support it. ```java
Registered: Fri Sep 05 11:42:10 UTC 2025 - Last Modified: Sun Feb 06 02:19:09 UTC 2022 - 8.1K bytes - Viewed (0) -
docs/pt/docs/async.md
* **Deep Learning**: Esse é um subcampo do Machine Learning, então, o mesmo se aplica. A diferença é que não há apenas uma grande planilha com números para multiplicar, mas um grande conjunto delas, e em muitos casos, você utiliza um processador especial para construir e/ou usar esses modelos.
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 09:56:21 UTC 2025 - 23.6K bytes - Viewed (0) -
src/archive/tar/strconv.go
// recorded elsewhere (e.g., via PAX record) contains no trailing slash. if len(s) > len(b) && b[len(b)-1] == '/' { n := len(strings.TrimRight(s[:len(b)-1], "/")) b[n] = 0 // Replace trailing slash with NUL terminator } } // fitsInBase256 reports whether x can be encoded into n bytes using base-256 // encoding. Unlike octal encoding, base-256 encoding does not require that the
Registered: Tue Sep 09 11:13:09 UTC 2025 - Last Modified: Mon Sep 08 17:08:20 UTC 2025 - 9.1K bytes - Viewed (0) -
guava/src/com/google/common/collect/RegularImmutableMap.java
return fromEntryArray(entries.length, entries, /* throwIfDuplicateKeys= */ true); } /** * Creates an ImmutableMap from the first n entries in entryArray. This implementation may replace * the entries in entryArray with its own entry objects (though they will have the same key/value * contents), and may take ownership of entryArray. */ static <K, V> ImmutableMap<K, V> fromEntryArray(
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Sat Aug 09 01:14:59 UTC 2025 - 15.8K bytes - Viewed (0)