Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1021 - 1030 of 1,060 for please (0.05 sec)

  1. architecture/ambient/ztunnel.md

    * Be lightweight enough to not limit adoption.
      * This puts a much tighter budget on CPU, memory, latency, and throughput requirements than traditional Istio sidecars.
    
    Ztunnel was not designed to be a feature-rich data plane.
    Quite the opposite - an *aggressively* small feature set is the key feature that makes ztunnel viable.
    Registered: Wed Nov 06 22:53:10 UTC 2024
    - Last Modified: Wed Jul 17 23:10:17 UTC 2024
    - 16.8K bytes
    - Viewed (0)
  2. cmd/erasure-multipart.go

    	}
    
    	// Fetch buffer for I/O, returns from the pool if not allocates a new one and returns.
    	var buffer []byte
    	switch size := data.Size(); {
    	case size == 0:
    		buffer = make([]byte, 1) // Allocate at least a byte to reach EOF
    	case size == -1:
    		if size := data.ActualSize(); size > 0 && size < fi.Erasure.BlockSize {
    			// Account for padding and forced compression overhead and encryption.
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Sun Sep 29 22:40:36 UTC 2024
    - 44.7K bytes
    - Viewed (0)
  3. guava/src/com/google/common/util/concurrent/RateLimiter.java

       * permitsPerSecond} are issued during any given second, with sustained requests being smoothly
       * spread over each second. When the incoming request rate exceeds {@code permitsPerSecond} the
       * rate limiter will release one permit every {@code (1.0 / permitsPerSecond)} seconds. When the
       * rate limiter is unused, bursts of up to {@code permitsPerSecond} permits will be allowed, with
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Sat Oct 19 00:51:36 UTC 2024
    - 21.6K bytes
    - Viewed (0)
  4. cmd/admin-heal-ops.go

    	} else {
    		r.ResultIndex = 1 + h.lastSentResultIndex
    	}
    
    	// append to results
    	h.currentStatus.Items = append(h.currentStatus.Items, r)
    
    	// release lock
    	h.mutex.Unlock()
    
    	return nil
    }
    
    // healSequenceStart - this is the top-level background heal
    // routine. It launches another go-routine that actually traverses
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Sat Oct 26 09:58:27 UTC 2024
    - 25.6K bytes
    - Viewed (0)
  5. docs/pt/docs/python-types.md

    * **Validar dados**: provenientes de cada solicitação:
        * Gerando **erros automáticos** retornados ao cliente quando os dados são inválidos.
    * **Documentar** a API usando OpenAPI:
        * que é usado pelas interfaces de usuário da documentação interativa automática.
    
    Tudo isso pode parecer abstrato. Não se preocupe. Você verá tudo isso em ação no [Tutorial - Guia do usuário](tutorial/index.md){.internal-link target=_blank}.
    
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Tue Oct 15 12:32:27 UTC 2024
    - 18K bytes
    - Viewed (0)
  6. docs/pt/docs/advanced/security/oauth2-scopes.md

    ///
    
    ## Utilize `SecurityScopes`
    
    Agora atualize a dependência `get_current_user`.
    
    Este é o usado pelas dependências acima.
    
    Aqui é onde estamos utilizando o mesmo esquema OAuth2 que nós declaramos antes, declarando-o como uma dependência: `oauth2_scheme`.
    
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Sun Oct 06 20:36:54 UTC 2024
    - 21.7K bytes
    - Viewed (0)
  7. src/bytes/bytes.go

    				return i + j - last
    			}
    		} else {
    			// If bytealg.Index is not available a brute force search is
    			// ~1.5-3x faster than Rabin-Karp since n is small.
    			c0 := b[last]
    			c1 := b[last-1] // There are at least 2 chars to match
    		loop:
    			for ; i < len(s); i++ {
    				if s[i] == c0 && s[i-1] == c1 {
    					for k := 2; k < n; k++ {
    						if s[i-k] != b[last-k] {
    							continue loop
    						}
    					}
    Registered: Tue Nov 05 11:13:11 UTC 2024
    - Last Modified: Tue Sep 03 20:55:15 UTC 2024
    - 35.6K bytes
    - Viewed (0)
  8. internal/s3select/sql/value.go

    	if isNumeric {
    		intV, ok1i := v.ToInt()
    		intA, ok2i := a.ToInt()
    		if ok1i && ok2i {
    			return intCompare(op, intV, intA), nil
    		}
    
    		// If both values are numeric, then at least one is
    		// float since we got here, so we convert.
    		flV, _ := v.ToFloat()
    		flA, _ := a.ToFloat()
    		return floatCompare(op, flV, flA), nil
    	}
    
    	strV, ok1s := v.ToString()
    	strA, ok2s := a.ToString()
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Fri Feb 25 20:31:19 UTC 2022
    - 20.2K bytes
    - Viewed (0)
  9. android/guava/src/com/google/common/collect/ImmutableSortedMap.java

              K[] sortedKs = (K[]) sortedKeys;
              Arrays.sort(sortedKs, comparator);
              Object[] sortedValues = new Object[size];
    
              // We might, somehow, be able to reorder values in-place.  But it doesn't seem like
              // there's a way around creating the separate sortedKeys array, and if we're allocating
              // one array of size n, we might as well allocate two -- to say nothing of the allocation
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Wed Oct 30 16:15:19 UTC 2024
    - 53K bytes
    - Viewed (0)
  10. apache-maven/src/main/appended-resources/licenses/CDDL+GPLv2-with-classpath-exception.txt

    which the executable runs, unless that component itself accompanies the
    executable.
    
    If distribution of executable or object code is made by offering access
    to copy from a designated place, then offering equivalent access to copy
    the source code from the same place counts as distribution of the source
    code, even though third parties are not compelled to copy the source
    along with the object code.
    
    Registered: Sun Nov 03 03:35:11 UTC 2024
    - Last Modified: Fri May 17 19:14:22 UTC 2024
    - 38.5K bytes
    - Viewed (0)
Back to top