Search Options

Results per page
Sort
Preferred Languages
Advance

Results 761 - 770 of 1,060 for Mach (0.03 sec)

  1. src/main/java/jcifs/smb1/netbios/NameServiceClient.java

                     * lookup for FOO using BCAST should not fail because of that
                     * name cached from WINS.
                     *
                     * So, here we apply the source addresses hashCode to each name to
                     * make them specific to who resolved the name.
                     */
    
                    srcHashCode = request.addr.hashCode();
                    for (int i = 0; i < response.addressArray.length; i++) {
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Thu Aug 14 07:14:38 UTC 2025
    - 17.6K bytes
    - Viewed (0)
  2. CHANGELOG/CHANGELOG-1.2.md

            * FSGroup - a special supplemental group
            * SELinux options
         * If a pod defines an FSGroup, that Pod’s system (emptyDir, secret, configMap,
    etc) volumes and block-device volumes will be owned by the FSGroup, and each
    container in the pod will run with the FSGroup as a supplemental group
      * Volumes that support SELinux labelling are now automatically relabeled with the
    Pod’s SELinux context, if specified
    Registered: Fri Sep 05 09:05:11 UTC 2025
    - Last Modified: Fri Dec 04 06:36:19 UTC 2020
    - 41.4K bytes
    - Viewed (0)
  3. android/guava-tests/test/com/google/common/cache/PopulatedCachesTest.java

                return builder.recordStats().build(identityLoader());
              }
            });
      }
    
      private CacheBuilderFactory cacheFactory() {
        // This is trickier than expected. We plan to put 15 values in each of these (WARMUP_MIN to
        // WARMUP_MAX), but the tests assume no values get evicted. Even with a maximumSize of 100, one
        // of the values gets evicted. With weak keys, we use identity equality, which means using
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Tue May 13 17:27:14 UTC 2025
    - 15.1K bytes
    - Viewed (0)
  4. src/main/java/jcifs/internal/witness/WitnessClient.java

                        WitnessAsyncNotifyMessage.WitnessNotificationResponse response = rpcClient.getAsyncNotifications(contextHandle);
    
                        if (response != null) {
                            // Process each notification message
                            for (WitnessAsyncNotifyMessage.WitnessNotificationMessage message : response.getMessages()) {
                                processAsyncNotificationMessage(registration, message);
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Sat Aug 30 05:58:03 UTC 2025
    - 20.8K bytes
    - Viewed (0)
  5. src/test/java/jcifs/internal/smb2/tree/Smb2TreeConnectResponseTest.java

        }
    
        @Test
        @DisplayName("Should handle all capability flags")
        void testAllCapabilityFlags() throws SMBProtocolDecodingException {
            // Test each capability flag individually
            int[] capabilityFlags = { Smb2TreeConnectResponse.SMB2_SHARE_CAP_DFS,
                    Smb2TreeConnectResponse.SMB2_SHARE_CAP_CONTINUOUS_AVAILABILITY, Smb2TreeConnectResponse.SMB2_SHARE_CAP_SCALEOUT,
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Thu Aug 14 07:14:38 UTC 2025
    - 19.3K bytes
    - Viewed (0)
  6. docs/de/docs/tutorial/security/oauth2-jwt.md

    diese Weise können Sie einen Token mit einer Gültigkeitsdauer von beispielsweise einer Woche erstellen. Und wenn der Benutzer am nächsten Tag mit dem Token zurückkommt, wissen Sie, dass der Benutzer immer noch bei Ihrem System angemeldet ist.
    
    Nach einer Woche läuft der Token ab und der Benutzer wird nicht autorisiert und muss sich erneut anmelden, um einen neuen Token zu erhalten. Und wenn der Benutzer (oder ein Dritter) versuchen würde, den Token zu ändern, um das Ablaufdatum zu ändern, würden...
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 10:49:48 UTC 2025
    - 12.1K bytes
    - Viewed (0)
  7. cmd/bucket-stats.go

    func (rl ReplicationLatency) merge(other ReplicationLatency) (newReplLatency ReplicationLatency) {
    	newReplLatency.UploadHistogram = rl.UploadHistogram.Merge(other.UploadHistogram)
    	return
    }
    
    // Get upload latency of each object size range
    func (rl ReplicationLatency) getUploadLatency() (ret map[string]uint64) {
    	ret = make(map[string]uint64)
    	avg := rl.UploadHistogram.GetAvgData()
    	for k, v := range avg {
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 13.5K bytes
    - Viewed (0)
  8. android/guava-testlib/src/com/google/common/collect/testing/google/SortedMultisetTestSuiteBuilder.java

            .createTestSuite();
      }
    
      /**
       * Returns an array of four bogus elements that will always be too high or too low for the
       * display. This includes two values for each extreme.
       *
       * <p>This method (dangerously) assume that the strings {@code "!! a"} and {@code "~~ z"} will
       * work for this purpose, which may cause problems for navigable maps with non-string or unicode
       * generators.
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Mon Aug 11 19:31:30 UTC 2025
    - 11.9K bytes
    - Viewed (0)
  9. android/guava/src/com/google/common/collect/ForwardingNavigableSet.java

     * default} methods. Instead, it inherits their default implementations. When those implementations
     * invoke methods, they invoke methods on the {@code ForwardingNavigableSet}.
     *
     * <p>Each of the {@code standard} methods uses the set's comparator (or the natural ordering of the
     * elements, if there is no comparator) to test element equality. As a result, if the comparator is
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Sun Dec 22 03:38:46 UTC 2024
    - 8.8K bytes
    - Viewed (0)
  10. src/main/java/jcifs/smb1/smb1/ACE.java

     * available online).
     * <p>
     * Direct ACEs are evaluated first in order. The SID of the user performing
     * the operation and the desired access bits are compared to the SID
     * and access mask of each ACE. If the SID matches, the allow/deny flags
     * and access mask are considered. If the ACE is a "deny"
     * ACE and <i>any</i> of the desired access bits match bits in the access
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Sat Aug 16 01:32:48 UTC 2025
    - 8.8K bytes
    - Viewed (0)
Back to top