Search Options

Display Count
Sort
Preferred Language
Advanced Search

Results 211 - 220 of 446 for GPoint (0.04 seconds)

The search processing time has exceeded the limit. The displayed results may be partial.

  1. okhttp-testing-support/src/main/kotlin/okhttp3/OkHttpClientTestRule.kt

        EventListener.Factory { call ->
          ClientRuleEventListener(::addEvent) + eventListenerFactory.create(call)
        }
    
      /**
       * Returns an OkHttpClient for tests to use as a starting point.
       *
       * The returned client installs a default event listener that gathers debug information. This will
       * be logged if the test fails.
       *
    Created: Fri Apr 03 11:42:14 GMT 2026
    - Last Modified: Tue Nov 04 19:13:52 GMT 2025
    - 10.8K bytes
    - Click Count (0)
  2. compat/maven-compat/src/main/java/org/apache/maven/repository/metadata/MetadataGraph.java

        public static final int DEFAULT_EDGES = 64;
    
        // flags to indicate the granularity of vertices
        private boolean versionedVertices = false;
        private boolean scopedVertices = false;
        /**
         * the entry point we started building the graph from
         */
        MetadataGraphVertex entry;
    
        // graph vertices
        TreeSet<MetadataGraphVertex> vertices;
    
        /**
         * incident and excident edges per node
         */
    Created: Sun Apr 05 03:35:12 GMT 2026
    - Last Modified: Wed Jul 23 17:27:08 GMT 2025
    - 13K bytes
    - Click Count (0)
  3. docs/kms/IAM.md

    > since you will not be able to decrypt the IAM/configuration data anymore.
    For distributed MinIO deployments, specify the *same* `MINIO_KMS_SECRET_KEY` for each MinIO server process.
    
    At any point in time you can switch from `MINIO_KMS_SECRET_KEY` to a full KMS
    deployment. You just need to import the generated key into KES - for example via
    the KES CLI once you have successfully setup KES:
    
    ```sh
    Created: Sun Apr 05 19:28:12 GMT 2026
    - Last Modified: Thu Jan 18 07:03:17 GMT 2024
    - 5.3K bytes
    - Click Count (0)
  4. docs/en/docs/tutorial/security/simple-oauth2.md

    For the error, we use the exception `HTTPException`:
    
    {* ../../docs_src/security/tutorial003_an_py310.py hl[3,79:81] *}
    
    ### Check the password { #check-the-password }
    
    At this point we have the user data from our database, but we haven't checked the password.
    
    Let's put that data in the Pydantic `UserInDB` model first.
    
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Thu Mar 05 18:13:19 GMT 2026
    - 9.4K bytes
    - Click Count (0)
  5. cmd/admin-handlers-idp-config.go

    	writeSuccessResponseHeadersOnly(w)
    }
    
    func handleCreateUpdateValidation(s config.Config, subSys, cfgTarget string, isUpdate bool) APIErrorCode {
    	if cfgTarget != madmin.Default {
    		// This cannot give an error at this point.
    		subSysTargets, _ := s.GetAvailableTargets(subSys)
    		subSysTargetsSet := set.CreateStringSet(subSysTargets...)
    		if isUpdate && !subSysTargetsSet.Contains(cfgTarget) {
    			return ErrAdminConfigIDPCfgNameDoesNotExist
    		}
    Created: Sun Apr 05 19:28:12 GMT 2026
    - Last Modified: Tue Feb 18 16:25:55 GMT 2025
    - 12.7K bytes
    - Click Count (0)
  6. docs/en/docs/deployment/server-workers.md

    Let's check back those deployment concepts from before:
    
    * Security - HTTPS
    * Running on startup
    * Restarts
    * **Replication (the number of processes running)**
    * Memory
    * Previous steps before starting
    
    Up to this point, with all the tutorials in the docs, you have probably been running a **server program**, for example, using the `fastapi` command, that runs Uvicorn, running a **single process**.
    
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Thu Mar 05 18:13:19 GMT 2026
    - 8.2K bytes
    - Click Count (0)
  7. src/bytes/buffer.go

    	b.lastRead = opInvalid
    	m, ok := b.tryGrowByReslice(1)
    	if !ok {
    		m = b.grow(1)
    	}
    	b.buf[m] = c
    	return nil
    }
    
    // WriteRune appends the UTF-8 encoding of Unicode code point r to the
    // buffer, returning its length and an error, which is always nil but is
    // included to match [bufio.Writer]'s WriteRune. The buffer is grown as needed;
    // if it becomes too large, WriteRune will panic with [ErrTooLarge].
    Created: Tue Apr 07 11:13:11 GMT 2026
    - Last Modified: Fri Nov 14 19:01:17 GMT 2025
    - 16.5K bytes
    - Click Count (0)
  8. android/guava/src/com/google/common/collect/SortedLists.java

          @Override
          public int resultIndex(int higherIndex) {
            return higherIndex;
          }
        },
        /**
         * Return {@code ~insertionIndex}, where {@code insertionIndex} is defined as the point at which
         * the key would be inserted into the list: the index of the next higher element in the list, or
         * {@code list.size()} if there is no such element.
         *
    Created: Fri Apr 03 12:43:13 GMT 2026
    - Last Modified: Sun Dec 22 03:38:46 GMT 2024
    - 10.9K bytes
    - Click Count (0)
  9. android/guava/src/com/google/common/hash/Murmur3_32HashFunction.java

              shift += 24;
              len += 3;
            } else {
              int codePoint = Character.codePointAt(input, i);
              if (codePoint == c) {
                // not a valid code point; let the JDK handle invalid Unicode
                return hashBytes(input.toString().getBytes(charset));
              }
              i++;
              buffer |= codePointToFourUtf8Bytes(codePoint) << shift;
    Created: Fri Apr 03 12:43:13 GMT 2026
    - Last Modified: Thu Mar 19 18:53:45 GMT 2026
    - 11.8K bytes
    - Click Count (0)
  10. android/guava/src/com/google/common/util/concurrent/ListenerCallQueue.java

     *   <li>All events for a given listener dispatch on the provided executor.
     *   <li>It is easy for the user to ensure that listeners are never invoked while holding locks.
     * </ul>
     *
     * The last point is subtle. Often the observable object will be managing its own internal state
     * using a lock, however it is dangerous to dispatch listeners while holding a lock because they
    Created: Fri Apr 03 12:43:13 GMT 2026
    - Last Modified: Tue May 13 17:27:14 GMT 2025
    - 8.1K bytes
    - Click Count (0)
Back to Top