Search Options

Results per page
Sort
Preferred Languages
Advance

Results 51 - 60 of 172 for siden (0.02 sec)

  1. SECURITY.md

    ### Hardware attacks
    
    Physical GPUs or TPUs can also be the target of attacks. [Published
    research](https://scholar.google.com/scholar?q=gpu+side+channel) shows that it
    might be possible to use side channel attacks on the GPU to leak data from other
    running models or processes in the same system. GPUs can also have
    implementation bugs that might allow attackers to leave malicious code running
    Registered: Tue Sep 09 12:39:10 UTC 2025
    - Last Modified: Wed Oct 16 16:10:43 UTC 2024
    - 9.6K bytes
    - Viewed (0)
  2. cmd/testdata/xl-meta-merge.zip

    ¦EcDist” ¨CSumAlgo ¨PartNums‘ ©PartETagsÀ©PartSizes‘Ñ äªPartASizes‘Ñ ä¤SizeÑ ä¥MTimeÓ ¹ôc â N§MetaSys ¼x-minio-internal-inline-dataÄ true§MetaUsr‚¬content-type¸application/octet-stream¤etagÙ 9fe7a344ef4227d3e537¡vÎeçnÐÄ$•Ä sÉöQð#Ef° ÌS Û|âÓ ¹ôb Îf­Ä ñ.È´ Å Mƒ¤Type ¥V2ObjÞ ¢IDÄ sÉöQð#Ef° ÌS Û|â¤DDirÄ #" ‘³sF"¥ URÄ,C ¦EcAlgo £EcM £EcN §EcBSizeÒ §EcIndex ¦EcDist” ¨CSumAlgo ¨PartNums‘ ©PartETagsÀ©PartSizes‘Ñ äªPartASizes‘Ñ ä¤SizeÑ ä¥MTimeÓ ¹ôb Îf­§MetaSys ¼x-minio-internal-inline-dataÄ true§MetaUsr‚¬...
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Mar 08 17:50:48 UTC 2024
    - 30.2K bytes
    - Viewed (0)
  3. guava/src/com/google/common/base/Predicate.java

       * class documentation above). This method is <i>generally expected</i>, but not absolutely
       * required, to have the following properties:
       *
       * <ul>
       *   <li>Its execution does not cause any observable side effects.
       *   <li>The computation is <i>consistent with equals</i>; that is, {@link Objects#equal
       *       Objects.equal}{@code (a, b)} implies that {@code predicate.apply(a) ==
       *       predicate.apply(b))}.
       * </ul>
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Wed Jun 18 15:22:00 UTC 2025
    - 3.3K bytes
    - Viewed (0)
  4. docs/site-replication/README.md

    - All sites must be using the **same** external IDP(s) if any.
    - For [SSE-S3 or SSE-KMS encryption via KMS](https://docs.min.io/community/minio-object-store/operations/server-side-encryption.html "MinIO KMS Guide"), all sites **must**  have access to a central KMS deployment. This can be achieved via a central KES server or multiple KES servers (say one per site) connected via a central KMS (Vault) server.
    
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Tue Aug 12 18:20:36 UTC 2025
    - 3.4K bytes
    - Viewed (0)
  5. cmd/object-multipart-handlers.go

    			return
    		}
    
    		_, sourceReplReq := r.Header[xhttp.MinIOSourceReplicationRequest]
    		ssecRepHeaders := []string{
    			"X-Minio-Replication-Server-Side-Encryption-Seal-Algorithm",
    			"X-Minio-Replication-Server-Side-Encryption-Sealed-Key",
    			"X-Minio-Replication-Server-Side-Encryption-Iv",
    		}
    		ssecRep := false
    		for _, header := range ssecRepHeaders {
    			if val := r.Header.Get(header); val != "" {
    				ssecRep = true
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Sun Sep 07 16:13:09 UTC 2025
    - 39.5K bytes
    - Viewed (0)
  6. fess-crawler/src/test/resources/extractor/eml/sample4.eml

    versetzt und in Formen gegossen. Ein kleiner Exkurs in die Chemie und Geschichte gesiedeter Seifen rundet das Programm
    ab.
    Das Museumsdorf Baruther Glashütte ist ein Technisches Denkmal im Süden des Landkreises Teltow-Fläming in
    Brandenburg. Das Museum setzt sich mit der Sozial- und Technikgeschichte des alten Glasmacher-Ortes auseinander.
    Registered: Sun Sep 21 03:50:09 UTC 2025
    - Last Modified: Sun Jan 07 09:15:11 UTC 2018
    - 681K bytes
    - Viewed (0)
  7. cmd/object-api-options.go

    func copyDstOpts(ctx context.Context, r *http.Request, bucket, object string, metadata map[string]string) (opts ObjectOptions, err error) {
    	return putOptsFromReq(ctx, r, bucket, object, metadata)
    }
    
    // get ObjectOptions for Copy calls with encryption headers provided on the source side
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Sat Sep 06 17:34:38 UTC 2025
    - 14.2K bytes
    - Viewed (0)
  8. guava-tests/benchmark/com/google/common/math/BigIntegerMathBenchmark.java

          long result = 1;
          for (int i = n1 + 1; i <= n2; i++) {
            result *= i;
          }
          return BigInteger.valueOf(result);
        }
    
        /*
         * We want each multiplication to have both sides with approximately the same number of digits.
         * Currently, we just divide the range in half.
         */
        int mid = (n1 + n2) >>> 1;
        return oldSlowFactorial(n1, mid).multiply(oldSlowFactorial(mid, n2));
      }
    
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Thu Dec 19 18:03:30 UTC 2024
    - 3.5K bytes
    - Viewed (0)
  9. docs/bucket/versioning/README.md

    > NOTE: Server side replication is supported for idempotent versions on directory objects.
    
    ### Idempotent versions on delete markers
    
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Tue Aug 12 18:20:36 UTC 2025
    - 12K bytes
    - Viewed (0)
  10. android/guava/src/com/google/common/collect/Platform.java

      }
    
      /**
       * Configures the given map maker to use weak keys, if possible; does nothing otherwise (i.e., in
       * GWT). This is sometimes acceptable, when only server-side code could generate enough volume
       * that reclamation becomes important.
       */
      @J2ktIncompatible
      static MapMaker tryWeakKeys(MapMaker mapMaker) {
        return mapMaker.weakKeys();
      }
    
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Thu Aug 07 16:05:33 UTC 2025
    - 5.3K bytes
    - Viewed (0)
Back to top