Search Options

Results per page
Sort
Preferred Languages
Advance

Results 131 - 140 of 1,645 for case1 (0.02 sec)

  1. architecture/networking/pilot.md

    `PushContext` is built up by querying the above layers. For some simple use cases, this is as simple as storing something like `configstore.List(SomeType)`; in this case, the only difference from directly exposing the configstore is to snapshot the current state. In other cases, some pre-computations and indexes are computed to make later accesses efficient.
    
    #### Endpoints
    
    Registered: Wed Nov 06 22:53:10 UTC 2024
    - Last Modified: Wed Feb 07 17:53:24 UTC 2024
    - 19.1K bytes
    - Viewed (0)
  2. cmd/bucket-lifecycle-handlers_test.go

    }
    
    // Test for authentication
    func testBucketLifecycleHandlersWrongCredentials(obj ObjectLayer, instanceType, bucketName string, apiRouter http.Handler,
    	credentials auth.Credentials, t *testing.T,
    ) {
    	// test cases with sample input and expected output.
    	testCases := []struct {
    		method     string
    		bucketName string
    		accessKey  string
    		secretKey  string
    		// Sent body
    		body []byte
    		// Expected response
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Mon Jun 10 15:50:49 UTC 2024
    - 11.3K bytes
    - Viewed (0)
  3. cmd/utils.go

    	}
    
    	switch minioErr.Code {
    	case "SlowDownWrite":
    		err = InsufficientWriteQuorum{Bucket: bucket, Object: object}
    	case "SlowDownRead":
    		err = InsufficientReadQuorum{Bucket: bucket, Object: object}
    	case "PreconditionFailed":
    		err = PreConditionFailed{}
    	case "InvalidRange":
    		err = InvalidRange{}
    	case "BucketAlreadyOwnedByYou":
    		err = BucketAlreadyOwnedByYou{}
    	case "BucketNotEmpty":
    		err = BucketNotEmpty{}
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Tue Aug 13 22:22:04 UTC 2024
    - 31.9K bytes
    - Viewed (0)
  4. SECURITY.md

    vulnerabilities to the vendor of the affected hardware accelerator.
    
    ## Reporting vulnerabilities
    
    ### Vulnerabilities in TensorFlow
    
    This document covers different use cases for TensorFlow together with comments
    whether these uses were recommended or considered safe, or where we recommend
    some form of isolation when dealing with untrusted data. As a result, this
    Registered: Tue Nov 05 12:39:12 UTC 2024
    - Last Modified: Wed Oct 16 16:10:43 UTC 2024
    - 9.6K bytes
    - Viewed (0)
  5. api/maven-api-core/src/main/java/org/apache/maven/api/services/DependencyResolverResult.java

         *
         * <p>{@link #getModuleName(Path)} is preferred when only the module name is desired,
         * because a name may be present even if the descriptor is absent. This method is for
         * cases when more information is desired, such as the set of exported packages.</p>
         *
         * @param dependency path to the dependency for which to get the module name
    Registered: Sun Nov 03 03:35:11 UTC 2024
    - Last Modified: Sat Sep 28 09:03:24 UTC 2024
    - 6.2K bytes
    - Viewed (0)
  6. android/guava/src/com/google/common/reflect/AbstractInvocationHandler.java

        return proxyClass.isInstance(arg)
            // Equal proxy instances should mostly be instance of proxyClass
            // Under some edge cases (such as the proxy of JDK types serialized and then deserialized)
            // the proxy type may not be the same.
            // We first check isProxyClass() so that the common case of comparing with non-proxy objects
            // is efficient.
            || (Proxy.isProxyClass(arg.getClass())
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Wed Jan 05 17:43:40 UTC 2022
    - 5.2K bytes
    - Viewed (0)
  7. cni/pkg/repair/netns.go

    			switch v := addr.(type) {
    			case *net.IPNet:
    				if v.IP.Equal(targetAddr) {
    					return true, nil
    				}
    			}
    		}
    	}
    	return false, fmt.Errorf("no interface has the address %s", targetAddr)
    }
    
    // getPodNetNs finds the network namespace for a given pod. There is not a great way to do this. Network namespaces live
    Registered: Wed Nov 06 22:53:10 UTC 2024
    - Last Modified: Fri Jun 28 19:12:54 UTC 2024
    - 4.3K bytes
    - Viewed (0)
  8. android/guava/src/com/google/common/collect/ForwardingSortedMultiset.java

       * {@link #add(Object)} or {@link #pollFirstEntry}. This skeleton implementation correctly
       * delegates each of its operations to the appropriate methods of this {@code
       * ForwardingSortedMultiset}.
       *
       * <p>In many cases, you may wish to override {@link #descendingMultiset()} to return an instance
       * of a subclass of {@code StandardDescendingMultiset}.
       *
       * @since 15.0
       */
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Fri May 12 15:26:39 UTC 2023
    - 8.7K bytes
    - Viewed (0)
  9. internal/lsync/lrwmutex_test.go

    			rlocked <- true
    			wl.Lock()
    			wlocked <- true
    		}
    	}()
    	for i := 0; i < n; i++ {
    		<-rlocked
    		rl.Unlock()
    		select {
    		case <-wlocked:
    			t.Fatal("RLocker() didn't read-lock it")
    		default:
    		}
    		rl.Unlock()
    		<-wlocked
    		select {
    		case <-rlocked:
    			t.Fatal("RLocker() didn't respect the write lock")
    		default:
    		}
    		wl.Unlock()
    	}
    }
    
    // Borrowed from rwmutex_test.go
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Sun Mar 05 04:57:35 UTC 2023
    - 7.9K bytes
    - Viewed (0)
  10. docs/distributed/DESIGN.md

                            return pool.Index
                    }
            }
            // Should not happen, but print values just in case.
            panic(fmt.Errorf("reached end of serverPools (total: %v, atTotal: %v, choose: %v)", total, atTotal, choose))
    }
    ```
    
    ## Other usages
    
    ### Advanced use cases with multiple ellipses
    
    Standalone erasure coded configuration with 4 sets with 16 drives each, which spawns drives across controllers.
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Tue Aug 15 23:04:20 UTC 2023
    - 8K bytes
    - Viewed (1)
Back to top