Search Options

Results per page
Sort
Preferred Languages
Advance

Results 11 - 20 of 290 for reachable (0.05 sec)

  1. okhttp/src/commonJvmAndroid/kotlin/okhttp3/Address.kt

      protocols: List<Protocol>,
      connectionSpecs: List<ConnectionSpec>,
      /**
       * Returns this address's proxy selector. Only used if the proxy is null. If none of this
       * selector's proxies are reachable, a direct connection will be attempted.
       */
      @get:JvmName("proxySelector") val proxySelector: ProxySelector,
    ) {
      /**
       * Returns a URL with the hostname and port of the origin server. The path, query, and fragment of
    Registered: Fri Sep 05 11:42:10 UTC 2025
    - Last Modified: Wed Mar 19 19:25:20 UTC 2025
    - 7.3K bytes
    - Viewed (0)
  2. cmd/bootstrap-peer-server.go

    			retries++
    			// after 20 retries start logging that servers are not reachable yet
    			if retries >= 20 {
    				logger.Info(fmt.Sprintf("Waiting for at least %d remote servers with valid configuration to be online", len(clnts)/2))
    				if len(offlineEndpoints) > 0 {
    					logger.Info(fmt.Sprintf("Following servers are currently offline or unreachable %s", offlineEndpoints))
    				}
    				if len(incorrectConfigs) > 0 {
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Tue Oct 01 22:13:18 UTC 2024
    - 8.4K bytes
    - Viewed (0)
  3. src/main/java/jcifs/smb/NtStatus.java

                "The referenced account is currently locked out and may not be logged on to.", "Connection refused",
                "The remote system is not reachable by the transport.",
                "The layered file system driver for this I/O tag did not handle it when needed.",
                "No more files were found that match the file specification.", };
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Sun Aug 31 08:00:57 UTC 2025
    - 14.9K bytes
    - Viewed (0)
  4. SECURITY.md

    If you need to run untrusted models, execute them inside a
    [**sandbox**](https://developers.google.com/code-sandboxing). Memory corruptions
    in TensorFlow ops can be recognized as security issues only if they are
    reachable and exploitable through production-grade, benign models.
    
    ### Compilation
    
    Compiling models via the recommended entry points described in
    [XLA](https://www.tensorflow.org/xla) and
    Registered: Tue Sep 09 12:39:10 UTC 2025
    - Last Modified: Wed Oct 16 16:10:43 UTC 2024
    - 9.6K bytes
    - Viewed (0)
  5. cmd/erasure.go

    				return
    			}
    
    			di, err := disk.DiskInfo(context.Background(), DiskInfoOptions{})
    			infos[i] = di
    			if err != nil {
    				// - Do not consume disks which are not reachable
    				//   unformatted or simply not accessible for some reason.
    				infos[i].Error = err.Error()
    			}
    		}()
    	}
    	wg.Wait()
    
    	var scanningDisks, healingDisks []StorageAPI
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 16.1K bytes
    - Viewed (0)
  6. android/guava/src/com/google/common/collect/MapMaker.java

       * Specifies that each value (not key) stored in the map should be wrapped in a {@link
       * WeakReference} (by default, strong references are used).
       *
       * <p>Weak values will be garbage collected once they are weakly reachable. This makes them a poor
       * candidate for caching.
       *
       * <p><b>Warning:</b> when this method is used, the resulting map will use identity ({@code ==})
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Thu Aug 07 16:05:33 UTC 2025
    - 12.8K bytes
    - Viewed (0)
  7. guava/src/com/google/common/graph/Network.java

       *
       * <p>In an undirected network, this is equivalent to {@link #adjacentNodes(Object)}.
       *
       * <p>This is <i>not</i> the same as "all nodes reachable from {@code node} by following outgoing
       * edges". For that functionality, see {@link Graphs#reachableNodes(Graph, Object)}.
       *
       * <p>If {@code node} is removed from the network after this method is called, the {@code Set}
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Mon Aug 11 22:03:02 UTC 2025
    - 22.5K bytes
    - Viewed (0)
  8. android/guava/src/com/google/common/collect/ImmutableCollection.java

     *       ImmutableList#subList} may retain a reference to the entire data set, preventing it from
     *       being garbage collected. If some of the data is no longer reachable through other means,
     *       this constitutes a memory leak. Pass the view collection to the appropriate {@code copyOf}
     *       method to obtain a correctly-sized copy.
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Thu Aug 07 16:05:33 UTC 2025
    - 21.4K bytes
    - Viewed (0)
  9. guava/src/com/google/common/collect/ImmutableCollection.java

     *       ImmutableList#subList} may retain a reference to the entire data set, preventing it from
     *       being garbage collected. If some of the data is no longer reachable through other means,
     *       this constitutes a memory leak. Pass the view collection to the appropriate {@code copyOf}
     *       method to obtain a correctly-sized copy.
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Thu Aug 07 16:05:33 UTC 2025
    - 18.7K bytes
    - Viewed (0)
  10. README.md

    | Dashboard                                                                                   | Creating a bucket                                                                           |
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Tue Aug 12 18:20:36 UTC 2025
    - 18.7K bytes
    - Viewed (0)
Back to top