Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1651 - 1660 of 1,955 for cash (0.03 sec)

  1. cmd/bucket-lifecycle-handlers_test.go

    		secretKey  string
    		// Sent body
    		body []byte
    		// Expected response
    		expectedRespStatus int
    		lifecycleResponse  []byte
    		errorResponse      APIErrorResponse
    		shouldPass         bool
    	}{
    		// Test case - 1.
    		// Filter contains more than (Prefix,Tag,And) rule
    		{
    			method:             http.MethodPut,
    			bucketName:         bucketName,
    			accessKey:          creds.AccessKey,
    			secretKey:          creds.SecretKey,
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Mon Jun 10 15:50:49 UTC 2024
    - 11.3K bytes
    - Viewed (0)
  2. docs/bucket/lifecycle/README.md

    Using above tier, set up a lifecycle rule with transition:
    
    ```
     mc ilm add --expiry-days 365 --transition-days 45 --storage-class "AZURETIER" myminio/srcbucket
    ```
    
    Note: In the case of S3, it is possible to create a tier from MinIO running in EC2 to S3 using AWS role attached to EC2 as credentials instead of accesskey/secretkey:
    
    ```
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Tue Jul 09 01:45:38 UTC 2024
    - 9K bytes
    - Viewed (0)
  3. android/guava-testlib/src/com/google/common/collect/testing/TestsForSetsInJavaUtil.java

                })
            .named("AbstractSet")
            .withFeatures(
                CollectionFeature.NONE,
                CollectionFeature.ALLOWS_NULL_VALUES,
                CollectionFeature.KNOWN_ORDER, // in this case, anyway
                CollectionSize.ANY)
            .suppressing(suppressForAbstractSet())
            .createTestSuite();
      }
    
      public Test testsForBadlyCollidingHashSet() {
        return SetTestSuiteBuilder.using(
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Wed Oct 30 16:15:19 UTC 2024
    - 15K bytes
    - Viewed (0)
  4. src/main/java/org/codelibs/fess/helper/QueryHelper.java

            }
            return queryContext;
        }
    
        protected void buildVirtualHostQuery(final QueryContext queryContext, final SearchRequestType searchRequestType) {
            switch (searchRequestType) {
            case ADMIN_SEARCH:
                // nothing to do
                break;
            default:
                final String key = ComponentUtil.getVirtualHostHelper().getVirtualHostKey();
                if (StringUtil.isNotBlank(key)) {
    Registered: Thu Oct 31 13:40:30 UTC 2024
    - Last Modified: Thu Feb 22 01:53:18 UTC 2024
    - 11.9K bytes
    - Viewed (0)
  5. android/guava/src/com/google/common/cache/AbstractCache.java

       *
       * <p>This implementation of {@code getAllPresent} lacks any insight into the internal cache data
       * structure, and is thus forced to return the query keys instead of the cached keys. This is only
       * possible with an unsafe cast which requires {@code keys} to actually be of type {@code K}.
       *
       * @since 11.0
       */
      /*
       * <? extends Object> is mostly the same as <?> to plain Java. But to nullness checkers, they
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Tue Jun 15 18:00:07 UTC 2021
    - 9.1K bytes
    - Viewed (0)
  6. android/guava/src/com/google/common/cache/Striped64.java

       * available, a new Cell is created. Otherwise, if the slot
       * exists, a CAS is tried.  Retries proceed by "double hashing",
       * using a secondary hash (Marsaglia XorShift) to try to find a
       * free slot.
       *
       * The table size is capped because, when there are more threads
       * than CPUs, supposing that each thread were bound to a CPU,
       * there would exist a perfect hash function mapping threads to
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Fri Jun 14 17:55:55 UTC 2024
    - 11.5K bytes
    - Viewed (0)
  7. SECURITY.md

    executed.
    
    The security impact of skipping those checks should be low, since the attack
    scenario would require a malicious user to be able to control the model which as
    stated above is already equivalent to code execution. In any case, the
    recommendation is not to serve models using Eager mode since it also has
    performance limitations.
    
    ## Multi-Tenant environments
    
    It is possible to run multiple TensorFlow models in parallel. For example,
    Registered: Tue Nov 05 12:39:12 UTC 2024
    - Last Modified: Wed Oct 16 16:10:43 UTC 2024
    - 9.6K bytes
    - Viewed (0)
  8. ci/official/containers/linux_arm64/devel.usertools/code_check_full.bats

    # vim: filetype=bash
    #
    # Copyright 2022 The TensorFlow Authors. All Rights Reserved.
    #
    # Licensed under the Apache License, Version 2.0 (the "License");
    # you may not use this file except in compliance with the License.
    # You may obtain a copy of the License at
    #
    #     http://www.apache.org/licenses/LICENSE-2.0
    #
    # Unless required by applicable law or agreed to in writing, software
    # distributed under the License is distributed on an "AS IS" BASIS,
    Registered: Tue Nov 05 12:39:12 UTC 2024
    - Last Modified: Wed Aug 14 18:47:44 UTC 2024
    - 12.9K bytes
    - Viewed (0)
  9. architecture/ambient/ztunnel.md

       Note: the application itself may have already resolved the Service IP to a specific pod if it has Kubernetes native routing built in; since we don't have the Service information in this case we will use the destination IP we received (a pod). Most notably, sidecar proxies behave this way.
    1. If the destination is on our node, we "fast path" the request and convert this into an inbound request.
    Registered: Wed Nov 06 22:53:10 UTC 2024
    - Last Modified: Wed Jul 17 23:10:17 UTC 2024
    - 16.8K bytes
    - Viewed (0)
  10. guava/src/com/google/common/util/concurrent/Striped.java

          this.mask = stripes > Ints.MAX_POWER_OF_TWO ? ALL_SET : ceilToPowerOfTwo(stripes) - 1;
        }
    
        @Override
        final int indexFor(Object key) {
          int hash = smear(key.hashCode());
          return hash & mask;
        }
    
        @Override
        public final L get(Object key) {
          return getAt(indexFor(key));
        }
      }
    
      /**
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Wed Jun 26 12:58:35 UTC 2024
    - 20.6K bytes
    - Viewed (0)
Back to top