- Sort Score
- Result 10 results
- Languages All
Results 871 - 880 of 1,168 for much (0.02 sec)
-
cmd/notification.go
// FIXME: network calls made in this manner such as one goroutine per node, // can easily eat into the internode bandwidth. This function would be mostly // TX saturating, however there are situations where a RX might also saturate. // To avoid these problems we must split the work at scale. With 1000 node // setup becoming a reality we must try to shard the work properly such as
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Mon Sep 09 16:58:30 UTC 2024 - 46.2K bytes - Viewed (0) -
common-protos/k8s.io/api/storage/v1/generated.proto
// // The following three cases all imply that no capacity is available for // a certain combination: // - no object exists with suitable topology and storage class name // - such an object exists, but the capacity is unset // - such an object exists, but the capacity is zero // // The producer of these objects can decide which approach is more suitable. // // They are consumed by the kube-scheduler when a CSI driver opts into
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Mon Mar 11 18:43:24 UTC 2024 - 24.7K bytes - Viewed (0) -
android/guava/src/com/google/common/collect/ForwardingSortedMultiset.java
return delegate().descendingMultiset(); } /** * A skeleton implementation of a descending multiset view. Normally, {@link * #descendingMultiset()} will not reflect any changes you make to the behavior of methods such as * {@link #add(Object)} or {@link #pollFirstEntry}. This skeleton implementation correctly * delegates each of its operations to the appropriate methods of this {@code * ForwardingSortedMultiset}. *
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Fri May 12 15:26:39 UTC 2023 - 8.7K bytes - Viewed (0) -
android/guava-tests/test/com/google/common/hash/AbstractStreamingHasherTest.java
assertEquals(expectedBytes / chunkSize, processCalled); assertEquals(expectedBytes % chunkSize != 0, remainingCalled); } // returns the minimum x such as x >= a && (x % b) == 0 private static int ceilToMultiple(int a, int b) { int remainder = a % b; return remainder == 0 ? a : a + b - remainder; } void assertBytes(byte[] expected) {
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Tue Jul 23 14:22:54 UTC 2024 - 8.5K bytes - Viewed (0) -
ci/devinfra/docker/windows/Dockerfile
# due to 40 bytes being reserved for GCP's internal usage. # Note, an invalid sub-interface name will lead to an obscure error, e.g.: # "The filename, directory name, or volume label syntax is incorrect." # In such cases, check that the name of the sub-interface is valid: # `netsh interface show interface` RUN netsh interface ipv4 set subinterface \"vEthernet (Ethernet)\" mtu=1460 store=persistent RUN md C:\TEMP RUN md C:\TMP
Registered: Tue Nov 05 12:39:12 UTC 2024 - Last Modified: Tue Aug 20 13:57:04 UTC 2024 - 7.3K bytes - Viewed (0) -
android/guava/src/com/google/common/collect/Collections2.java
* IllegalArgumentException}. When methods such as {@code removeAll()} and {@code clear()} are * called on the filtered collection, only elements that satisfy the filter will be removed from * the underlying collection. * * <p>The returned collection isn't threadsafe or serializable, even if {@code unfiltered} is. * * <p>Many of the filtered collection's methods, such as {@code size()}, iterate across every
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Fri Oct 18 20:24:49 UTC 2024 - 22.8K bytes - Viewed (0) -
docs/bucket/lifecycle/DESIGN.md
### Expiry or removal events
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Thu Sep 29 04:28:45 UTC 2022 - 4.3K bytes - Viewed (0) -
okhttp/src/main/kotlin/okhttp3/internal/connection/FastFallbackExchangeFinder.kt
} } } finally { cancelInFlightConnects() } throw firstException!! } /** * Returns non-null if we don't need to wait for the launched result. In such cases, this result * must be processed before whatever is waiting in the queue because we may have already acquired * its connection. */ private fun launchTcpConnect(): ConnectResult? { val plan =
Registered: Fri Nov 01 11:42:11 UTC 2024 - Last Modified: Mon Jan 08 01:13:22 UTC 2024 - 5.8K bytes - Viewed (0) -
android/guava/src/com/google/common/math/DoubleUtils.java
return getExponent(d) <= MAX_EXPONENT; } static boolean isNormal(double d) { return getExponent(d) >= MIN_EXPONENT; } /* * Returns x scaled by a power of 2 such that it is in the range [1, 2). Assumes x is positive, * normal, and finite. */ static double scaleNormalize(double x) { long significand = doubleToRawLongBits(x) & SIGNIFICAND_MASK;
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Sat Oct 19 00:26:48 UTC 2024 - 5.1K bytes - Viewed (0) -
android/guava/src/com/google/common/hash/HashFunction.java
* The result is that, for example, when choosing a bucket in a hash table of size 2^8, * <i>any</i> eight bits could be consistently used. * <li><b>cryptographic:</b> certain hash functions such as {@link Hashing#sha512} are designed to * make it as infeasible as possible to reverse-engineer the input that produced a given hash
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Tue May 25 18:22:59 UTC 2021 - 10.9K bytes - Viewed (0)