Search Options

Results per page
Sort
Preferred Languages
Advance

Results 11 - 20 of 420 for Hatter (0.1 sec)

  1. android/guava/src/com/google/common/hash/HashFunction.java

       * perform better than its longhand equivalent, but should not perform worse.
       *
       * @since 12.0
       */
      HashCode hashInt(int input);
    
      /**
       * Shortcut for {@code newHasher().putLong(input).hash()}; returns the hash code for the given
       * {@code long} value, interpreted in little-endian byte order. The implementation <i>might</i>
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Tue May 25 18:22:59 UTC 2021
    - 10.9K bytes
    - Viewed (0)
  2. guava/src/com/google/common/hash/HashFunction.java

       * perform better than its longhand equivalent, but should not perform worse.
       *
       * @since 12.0
       */
      HashCode hashInt(int input);
    
      /**
       * Shortcut for {@code newHasher().putLong(input).hash()}; returns the hash code for the given
       * {@code long} value, interpreted in little-endian byte order. The implementation <i>might</i>
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Tue May 25 18:22:59 UTC 2021
    - 10.9K bytes
    - Viewed (0)
  3. docs/en/docs/help-fastapi.md

    * Then check if the question (the vast majority are questions) is **clear**.
    
    * In many cases the question asked is about an imaginary solution from the user, but there might be a **better** one. If you can understand the problem and use case better, you might be able to suggest a better **alternative solution**.
    
    * If you can't understand the question, ask for more **details**.
    
    ### Reproduce the problem
    
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Thu Aug 15 23:30:12 UTC 2024
    - 13.7K bytes
    - Viewed (0)
  4. android/guava/src/com/google/common/math/LongMath.java

       * Each bit is set to 1 for all remainders that indicate divisibility by 2, 3, or 5, so
       * 1, 7, 11, 13, 17, 19, 23, 29 are set to 0. 30 and up don't matter because they won't be hit.
       */
      private static final int SIEVE_30 =
          ~((1 << 1) | (1 << 7) | (1 << 11) | (1 << 13) | (1 << 17) | (1 << 19) | (1 << 23)
              | (1 << 29));
    
      /**
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Wed Oct 09 16:39:37 UTC 2024
    - 45.2K bytes
    - Viewed (0)
  5. android/guava/src/com/google/common/cache/Striped64.java

       * under the assumption that for long-running instances, observed
       * contention levels will recur, so the cells will eventually be
       * needed again; and for short-lived ones, it does not matter.
       */
    
      /**
       * Padded variant of AtomicLong supporting only raw accesses plus CAS. The value field is placed
       * between pads, hoping that the JVM doesn't reorder them.
       *
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Fri Jun 14 17:55:55 UTC 2024
    - 11.5K bytes
    - Viewed (0)
  6. docs/en/docs/tutorial/security/first-steps.md

        * A "token" is just a string with some content that we can use later to verify this user.
        * Normally, a token is set to expire after some time.
            * So, the user will have to log in again at some point later.
            * And if the token is stolen, the risk is less. It is not like a permanent key that will work forever (in most of the cases).
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Sun Oct 06 20:36:54 UTC 2024
    - 9.2K bytes
    - Viewed (0)
  7. docs/en/docs/advanced/custom-response.md

    ```
    
    1. This is the generator function. It's a "generator function" because it contains `yield` statements inside.
    2. By using a `with` block, we make sure that the file-like object is closed after the generator function is done. So, after it finishes sending the response.
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Sun Oct 06 20:36:54 UTC 2024
    - 12K bytes
    - Viewed (0)
  8. RELEASE_BRANCHES.md

    # Backporting fixes
    
    * Cherry-picking is discussed in the original PR and subject-matter experts have approved the backport.
        * Behavioral changes should be highly scrutinized, while typo fixes don't require that level of scrutiny.
    * It is preferable that cherry-picks are done by the istio-testing bot.
        * Automated cherry-picks do not need subject-matter experts to approve if discussed in the original PR.
    Registered: Wed Nov 06 22:53:10 UTC 2024
    - Last Modified: Mon Sep 16 21:14:17 UTC 2024
    - 4.2K bytes
    - Viewed (0)
  9. guava/src/com/google/common/hash/LittleEndianByteArray.java

       * very efficient. May be useful for calling code to fall back on an alternative implementation
       * that is slower than Unsafe.get/store but faster than the pure-Java mask-and-shift.
       */
      static boolean usingUnsafe() {
        return (byteArray instanceof UnsafeByteArray);
      }
    
      /**
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Sat Oct 19 00:26:48 UTC 2024
    - 9.8K bytes
    - Viewed (0)
  10. docs/en/docs/deployment/https.md

    Then, using the certificate, the client and the TLS Termination Proxy **decide how to encrypt** the rest of the **TCP communication**. This completes the **TLS Handshake** part.
    
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Tue Aug 06 04:48:30 UTC 2024
    - 12K bytes
    - Viewed (0)
Back to top