- Sort Score
- Result 10 results
- Languages All
Results 251 - 260 of 586 for mezery (0.04 sec)
-
api/maven-api-core/src/main/java/org/apache/maven/api/services/ProblemCollector.java
*/ boolean problemsOverflow(); /** * Reports a problem: always maintains the counters, but whether problem is preserved in memory, depends on * implementation and its configuration. * * @param problem the problem to report * @return {@code true} if passed problem is preserved by this call. */
Registered: Sun Sep 07 03:35:12 UTC 2025 - Last Modified: Fri Jul 18 17:30:19 UTC 2025 - 11.4K bytes - Viewed (0) -
docs/en/docs/advanced/websockets.md
``` /// tip The app above is a minimal and simple example to demonstrate how to handle and broadcast messages to several WebSocket connections. But keep in mind that, as everything is handled in memory, in a single list, it will only work while the process is running, and will only work with a single process.
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 09:15:41 UTC 2025 - 5.7K bytes - Viewed (0) -
cmd/batch-expire.go
return } for result := range prefixResultCh { results <- result } } xioutil.SafeClose(results) }() // Goroutine to periodically save batch-expire job's in-memory state saverQuitCh := make(chan struct{}) go func() { saveTicker := time.NewTicker(10 * time.Second) defer saveTicker.Stop() quit := false after := time.Minute for !quit { select {
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Tue Apr 22 11:16:32 UTC 2025 - 23K bytes - Viewed (0) -
src/main/java/org/codelibs/fess/app/service/DuplicateHostService.java
* <p>This method returns all duplicate host configurations in the system, * ordered by sort order, regular name, and duplicate hostname. The results * are limited by the configured maximum fetch size to prevent memory issues.</p> * * @return a list of all DuplicateHost entities */ public List<DuplicateHost> getDuplicateHostList() { return duplicateHostBhv.selectList(cb -> {
Registered: Thu Sep 04 12:52:25 UTC 2025 - Last Modified: Thu Jul 17 08:28:31 UTC 2025 - 7.4K bytes - Viewed (0) -
src/test/java/jcifs/RuntimeCIFSExceptionTest.java
assertEquals(runtimeException, exception.getCause()); }); // Test with error Error error = new OutOfMemoryError("Out of memory"); assertDoesNotThrow(() -> { RuntimeCIFSException exception = new RuntimeCIFSException(error); assertEquals(error, exception.getCause()); }); } @Test
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Thu Aug 14 05:31:44 UTC 2025 - 10.2K bytes - Viewed (0) -
src/test/java/jcifs/internal/smb2/rdma/RdmaBufferManagerTest.java
private AutoCloseable mocks; @BeforeEach public void setUp() throws Exception { mocks = MockitoAnnotations.openMocks(this); // Set up mock provider to return TCP memory regions when(mockProvider.registerMemory(any(ByteBuffer.class), any())).thenAnswer(invocation -> { ByteBuffer buffer = invocation.getArgument(0); EnumSet<RdmaAccess> access = invocation.getArgument(1);
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Sat Aug 23 05:11:12 UTC 2025 - 7.1K bytes - Viewed (0) -
apache-maven/src/assembly/maven/conf/toolchains.xml
<!-- | With toolchains you can refer to installations on your system. This | way you don't have to hardcode paths in your pom.xml. | | Every toolchain consist of 3 elements: | * type: the type of tool. An often used value is 'jdk'. Toolchains-aware | plugins should document which type you must use. | | * provides: A list of key/value-pairs.
Registered: Sun Sep 07 03:35:12 UTC 2025 - Last Modified: Thu Aug 22 14:47:43 UTC 2024 - 3.6K bytes - Viewed (0) -
cmd/lock-rest-server.go
} // Initialize a new ticker with 1 minute between each ticks. lkTimer := time.NewTimer(lockMaintenanceInterval) // Stop the timer upon returning. defer lkTimer.Stop() for { // Verifies every minute for locks held more than 2 minutes. select { case <-ctx.Done(): return case <-lkTimer.C: globalLockServer.expireOldLocks(lockValidityDuration) // Reset the timer for next cycle.
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Jan 31 19:54:34 UTC 2025 - 6.3K bytes - Viewed (0) -
src/main/webapp/js/admin/jquery-3.7.1.min.js
return f.fireWith(this,arguments),this},fired:function(){return!!o}};return f},ce.extend({Deferred:function(e){var o=[["notify","progress",ce.Callbacks("memory"),ce.Callbacks("memory"),2],["resolve","done",ce.Callbacks("once memory"),ce.Callbacks("once memory"),0,"resolved"],["reject","fail",ce.Callbacks("once memory"),ce.Callbacks("once memory"),1,"rejected"]],i="pending",a={state:function(){return i},always:function(){return s.done(arguments).fail(arguments),this},"catch":function(e){return a....
Registered: Thu Sep 04 12:52:25 UTC 2025 - Last Modified: Sat Oct 26 01:07:52 UTC 2024 - 85.5K bytes - Viewed (0) -
guava/src/com/google/common/hash/Fingerprint2011.java
b *= K3; return b; } /** * Computes intermediate hash of 32 bytes of byte array from the given offset. Results are * returned in the output array - this is 12% faster than allocating new arrays every time. */ private static void weakHashLength32WithSeeds( byte[] bytes, int offset, long seedA, long seedB, long[] output) { long part1 = load64(bytes, offset); long part2 = load64(bytes, offset + 8);
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Mon Aug 11 19:31:30 UTC 2025 - 6.5K bytes - Viewed (0)