- Sort Score
- Result 10 results
- Languages All
Results 41 - 50 of 64 for ask (0.01 sec)
-
android/guava-tests/test/com/google/common/collect/QueuesTest.java
for (boolean interruptibly : new boolean[] {true, false}) { assertEquals(0, Queues.drain(q, ImmutableList.of(), 1, 10, MILLISECONDS)); Producer producer = new Producer(q, 1); // producing one, will ask for two Future<?> producerThread = threadPool.submit(producer); producer.beganProducing.await(); // make sure we time out Stopwatch timer = Stopwatch.createStarted();
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Tue May 13 18:46:00 UTC 2025 - 12.2K bytes - Viewed (0) -
LICENSE
it in new free programs; and that you are informed that you can do these things. To protect your rights, we need to make restrictions that forbid distributors to deny you these rights or to ask you to surrender these rights. These restrictions translate to certain responsibilities for you if you distribute copies of the library or if you modify it. For example, if you distribute copies of the library, whether gratis
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Mon Jan 18 20:25:38 UTC 2016 - 25.8K bytes - Viewed (0) -
okhttp/src/jvmTest/kotlin/okhttp3/internal/tls/CertificatePinnerChainValidationTest.kt
* -> realVictim * ``` * * The attacker compromises a CA. They take the public key from an intermediate certificate * signed by the compromised CA's certificate and uses it in a non-CA certificate. They ask the * pinned CA above to sign it for non-certificate-authority uses: * * ``` * pinnedRoot (trusted by CertificatePinner) * -> pinnedIntermediate (trusted by CertificatePinner)
Registered: Fri Sep 05 11:42:10 UTC 2025 - Last Modified: Fri Jun 20 11:46:46 UTC 2025 - 24.3K bytes - Viewed (1) -
apache-maven/src/main/appended-resources/licenses/CDDL+GPLv2-with-classpath-exception.txt
want it, that you can change the software or use pieces of it in new free programs; and that you know you can do these things. To protect your rights, we need to make restrictions that forbid anyone to deny you these rights or to ask you to surrender the rights. These restrictions translate to certain responsibilities for you if you distribute copies of the software, or if you modify it.
Registered: Sun Sep 07 03:35:12 UTC 2025 - Last Modified: Fri May 17 19:14:22 UTC 2024 - 38.5K bytes - Viewed (0) -
cmd/erasure-server-pool-rebalance.go
disks, _ := set.getOnlineDisksWithHealing(false) if len(disks) == 0 { return fmt.Errorf("no online drives found for set with endpoints %s", set.getEndpoints()) } // However many we ask, versions must exist on ~50% listingQuorum := (set.setDriveCount + 1) / 2 // How to resolve partial results. resolver := metadataResolutionParams{ dirQuorum: listingQuorum, // make sure to capture all quorum ratios
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Thu Sep 04 20:47:24 UTC 2025 - 28.9K bytes - Viewed (0) -
cmd/erasure-metadata.go
fmt.Fprint(h, meta.TransitionStatus) fmt.Fprint(h, meta.TransitionTier) fmt.Fprint(h, meta.TransitionedObjName) fmt.Fprint(h, meta.TransitionVersionID) } // If metadata says encrypted, ask for it in quorum. if etyp, ok := crypto.IsEncrypted(meta.Metadata); ok { fmt.Fprint(h, etyp) } // If compressed, look for compressed FileInfo only if meta.IsCompressed() {
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 21.3K bytes - Viewed (0) -
src/main/java/jcifs/smb1/smb1/SmbTransport.java
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Sat Aug 16 01:32:48 UTC 2025 - 31.8K bytes - Viewed (0) -
docs/en/docs/deployment/concepts.md
On the other hand, if you have 2 servers and you are using **100% of their CPU and RAM**, at some point one process will ask for more memory, and the server will have to use the disk as "memory" (which can be thousands of times slower), or even **crash**. Or one process might need to do some computation and would have to wait until the CPU is free again.
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 09:15:41 UTC 2025 - 18.6K bytes - Viewed (0) -
cmd/erasure-server-pool.go
return pinfo, z.poolsWithObject(poolObjInfos, opts), nil } if isErrReadQuorum(pinfo.Err) && !opts.MetadataChg { // read quorum is returned when the object is visibly // present but its unreadable, we simply ask the writes to // schedule to this pool instead. If there is no quorum // it will fail anyways, however if there is quorum available // with enough disks online but sufficiently inconsistent to
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 89.1K bytes - Viewed (0) -
src/bytes/buffer_test.go
for i := 0; i <= 5; i++ { for j := i; j <= 5; j++ { for k := 0; k <= 6; k++ { // 0 <= i <= j <= 5; 0 <= k <= 6 // Check that if we start with a buffer // of length j at offset i and ask for // Next(k), we get the right bytes. buf := NewBuffer(b[0:j]) n, _ := buf.Read(tmp[0:i]) if n != i { t.Fatalf("Read %d returned %d", i, n) } bb := buf.Next(k) want := k
Registered: Tue Sep 09 11:13:09 UTC 2025 - Last Modified: Mon May 19 16:13:04 UTC 2025 - 18.6K bytes - Viewed (0)