Search Options

Results per page
Sort
Preferred Languages
Advance

Results 141 - 150 of 217 for ongoing (0.12 sec)

  1. android/guava/src/com/google/common/collect/CompactHashSet.java

       *   <li>another java.util.Set delegate implementation. In most modern JDKs, normal java.util hash
       *       collections intelligently fall back to a binary search tree if hash table collisions are
       *       detected. Rather than going to all the trouble of reimplementing this ourselves, we
       *       simply switch over to use the JDK implementation wholesale if probable hash flooding is
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Fri Oct 18 20:24:49 UTC 2024
    - 24K bytes
    - Viewed (0)
  2. android/guava/src/com/google/common/primitives/ImmutableLongArray.java

      // it doesn't escape this class
      @SuppressWarnings("Immutable")
      private final long[] array;
    
      /*
       * TODO(kevinb): evaluate the trade-offs of going bimorphic to save these two fields from most
       * instances. Note that the instances that would get smaller are the right set to care about
       * optimizing, because the rest have the option of calling `trimmed`.
       */
    
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Fri Oct 25 18:05:56 UTC 2024
    - 22.3K bytes
    - Viewed (0)
  3. guava/src/com/google/common/primitives/ImmutableIntArray.java

      // it doesn't escape this class
      @SuppressWarnings("Immutable")
      private final int[] array;
    
      /*
       * TODO(kevinb): evaluate the trade-offs of going bimorphic to save these two fields from most
       * instances. Note that the instances that would get smaller are the right set to care about
       * optimizing, because the rest have the option of calling `trimmed`.
       */
    
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Fri Oct 25 18:05:56 UTC 2024
    - 21.4K bytes
    - Viewed (0)
  4. architecture/ambient/ztunnel.md

    | `Forwarded`   | For outgoing requests, the original source IP. Note that since we spoof IPs in most cases, this usually is the same as the actual IP seen. For incoming requests, this is used only for traffic from waypoints (which are trusted and cannot spoof IPs) |
    Registered: Wed Nov 06 22:53:10 UTC 2024
    - Last Modified: Wed Jul 17 23:10:17 UTC 2024
    - 16.8K bytes
    - Viewed (0)
  5. guava/src/com/google/common/util/concurrent/CycleDetectingLockFactory.java

     *       locks---to each of the acquired locks, an edge from the soon-to-be-acquired lock is either
     *       verified or created.
     *   <li>If a new edge needs to be created, the outgoing edges of the acquired locks are traversed
     *       to check for a cycle that reaches the lock to be acquired. If no cycle is detected, a new
     *       "safe" edge is created.
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Fri Dec 15 19:31:54 UTC 2023
    - 35.9K bytes
    - Viewed (0)
  6. docs/en/docs/tutorial/security/oauth2-jwt.md

    This code is something you can actually use in your application, save the password hashes in your database, etc.
    
    We are going to start from where we left in the previous chapter and increment it.
    
    ## About JWT
    
    JWT means "JSON Web Tokens".
    
    It's a standard to codify a JSON object in a long dense string without spaces. It looks like this:
    
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Sat Oct 26 11:45:10 UTC 2024
    - 12.8K bytes
    - Viewed (0)
  7. android/guava-testlib/src/com/google/common/collect/testing/AbstractIteratorTester.java

        try {
          recurse(0);
        } catch (Exception e) { // sneaky checked exception
          throw new RuntimeException(Arrays.toString(stimuli), e);
        }
      }
    
      private void recurse(int level) {
        // We're going to reuse the stimuli array 3^steps times by overwriting it
        // in a recursive loop.  Sneaky.
        if (level == stimuli.length) {
          // We've filled the array.
          compareResultsForThisListOfStimuli();
        } else {
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Wed Oct 30 16:15:19 UTC 2024
    - 20.6K bytes
    - Viewed (0)
  8. okhttp/src/test/java/okhttp3/internal/ws/WebSocketHttpTest.kt

            .webSocketUpgrade(serverListener)
            .build(),
        )
        val webSocket: WebSocket = newWebSocket()
        clientListener.assertOpen()
    
        // Send messages until the client's outgoing buffer overflows!
        val message: ByteString = ByteString.of(*ByteArray(1024 * 1024))
        var messageCount: Long = 0
        while (true) {
          val success = webSocket.send(message)
          if (!success) break
    Registered: Fri Nov 01 11:42:11 UTC 2024
    - Last Modified: Sun Mar 31 17:16:15 UTC 2024
    - 35.2K bytes
    - Viewed (0)
  9. istioctl/pkg/workload/workload.go

    	configureCmd.PersistentFlags().BoolVar(&dnsCapture, "capture-dns", true, "Enables the capture of outgoing DNS packets on port 53, redirecting to istio-agent")
    	configureCmd.PersistentFlags().StringVar(&internalIP, "internalIP", "", "Internal IP address of the workload")
    Registered: Wed Nov 06 22:53:10 UTC 2024
    - Last Modified: Thu Aug 15 16:31:46 UTC 2024
    - 25.3K bytes
    - Viewed (0)
  10. src/main/java/jcifs/netbios/NameServiceClientImpl.java

                /*
                 * This is almost exactly like InetAddress.java. See the
                 * comments there for a description of how the LOOKUP_TABLE prevents
                 * redundant queries from going out on the wire.
                 */
                if ( ( addr = (NbtAddress) checkLookupTable(name) ) == null ) {
                    try {
                        addr = getByName(name, svr);
                    }
    Registered: Sun Nov 03 00:10:13 UTC 2024
    - Last Modified: Sun Aug 14 14:26:22 UTC 2022
    - 38.2K bytes
    - Viewed (0)
Back to top