Search Options

Results per page
Sort
Preferred Languages
Advance

Results 41 - 50 of 64 for ask (0.01 sec)

  1. android/guava-tests/test/com/google/common/collect/QueuesTest.java

        for (boolean interruptibly : new boolean[] {true, false}) {
          assertEquals(0, Queues.drain(q, ImmutableList.of(), 1, 10, MILLISECONDS));
    
          Producer producer = new Producer(q, 1);
          // producing one, will ask for two
          Future<?> producerThread = threadPool.submit(producer);
          producer.beganProducing.await();
    
          // make sure we time out
          Stopwatch timer = Stopwatch.createStarted();
    
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Tue May 13 18:46:00 UTC 2025
    - 12.2K bytes
    - Viewed (0)
  2. LICENSE

    it in new free programs; and that you are informed that you can do
    these things.
    
      To protect your rights, we need to make restrictions that forbid
    distributors to deny you these rights or to ask you to surrender these
    rights.  These restrictions translate to certain responsibilities for
    you if you distribute copies of the library or if you modify it.
    
      For example, if you distribute copies of the library, whether gratis
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Mon Jan 18 20:25:38 UTC 2016
    - 25.8K bytes
    - Viewed (0)
  3. okhttp/src/jvmTest/kotlin/okhttp3/internal/tls/CertificatePinnerChainValidationTest.kt

       *       -> realVictim
       * ```
       *
       * The attacker compromises a CA. They take the public key from an intermediate certificate
       * signed by the compromised CA's certificate and uses it in a non-CA certificate. They ask the
       * pinned CA above to sign it for non-certificate-authority uses:
       *
       * ```
       *   pinnedRoot (trusted by CertificatePinner)
       *     -> pinnedIntermediate (trusted by CertificatePinner)
    Registered: Fri Sep 05 11:42:10 UTC 2025
    - Last Modified: Fri Jun 20 11:46:46 UTC 2025
    - 24.3K bytes
    - Viewed (1)
  4. apache-maven/src/main/appended-resources/licenses/CDDL+GPLv2-with-classpath-exception.txt

    want it, that you can change the software or use pieces of it in new
    free programs; and that you know you can do these things.
    
    To protect your rights, we need to make restrictions that forbid anyone
    to deny you these rights or to ask you to surrender the rights. These
    restrictions translate to certain responsibilities for you if you
    distribute copies of the software, or if you modify it.
    
    Registered: Sun Sep 07 03:35:12 UTC 2025
    - Last Modified: Fri May 17 19:14:22 UTC 2024
    - 38.5K bytes
    - Viewed (0)
  5. cmd/erasure-server-pool-rebalance.go

    	disks, _ := set.getOnlineDisksWithHealing(false)
    	if len(disks) == 0 {
    		return fmt.Errorf("no online drives found for set with endpoints %s", set.getEndpoints())
    	}
    
    	// However many we ask, versions must exist on ~50%
    	listingQuorum := (set.setDriveCount + 1) / 2
    
    	// How to resolve partial results.
    	resolver := metadataResolutionParams{
    		dirQuorum: listingQuorum, // make sure to capture all quorum ratios
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Thu Sep 04 20:47:24 UTC 2025
    - 28.9K bytes
    - Viewed (0)
  6. cmd/erasure-metadata.go

    				fmt.Fprint(h, meta.TransitionStatus)
    				fmt.Fprint(h, meta.TransitionTier)
    				fmt.Fprint(h, meta.TransitionedObjName)
    				fmt.Fprint(h, meta.TransitionVersionID)
    			}
    
    			// If metadata says encrypted, ask for it in quorum.
    			if etyp, ok := crypto.IsEncrypted(meta.Metadata); ok {
    				fmt.Fprint(h, etyp)
    			}
    
    			// If compressed, look for compressed FileInfo only
    			if meta.IsCompressed() {
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 21.3K bytes
    - Viewed (0)
  7. src/main/java/jcifs/smb1/smb1/SmbTransport.java

        //        MsrpcDfsRootEnum rpc;
        //        DcerpcHandle handle = null;
        //
        //        /* Procedure:
        //         * Lookup a DC in the target domain
        //         * Ask the DC for a referral for the domain (e.g. "\example.com")
        //         * Do NetrDfsEnumEx on the server returned in the referral to
        //         * get roots in target domain
        //         */
        //
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Sat Aug 16 01:32:48 UTC 2025
    - 31.8K bytes
    - Viewed (0)
  8. docs/en/docs/deployment/concepts.md

    On the other hand, if you have 2 servers and you are using **100% of their CPU and RAM**, at some point one process will ask for more memory, and the server will have to use the disk as "memory" (which can be thousands of times slower), or even **crash**. Or one process might need to do some computation and would have to wait until the CPU is free again.
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 09:15:41 UTC 2025
    - 18.6K bytes
    - Viewed (0)
  9. cmd/erasure-server-pool.go

    			return pinfo, z.poolsWithObject(poolObjInfos, opts), nil
    		}
    
    		if isErrReadQuorum(pinfo.Err) && !opts.MetadataChg {
    			// read quorum is returned when the object is visibly
    			// present but its unreadable, we simply ask the writes to
    			// schedule to this pool instead. If there is no quorum
    			// it will fail anyways, however if there is quorum available
    			// with enough disks online but sufficiently inconsistent to
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 89.1K bytes
    - Viewed (0)
  10. src/bytes/buffer_test.go

    	for i := 0; i <= 5; i++ {
    		for j := i; j <= 5; j++ {
    			for k := 0; k <= 6; k++ {
    				// 0 <= i <= j <= 5; 0 <= k <= 6
    				// Check that if we start with a buffer
    				// of length j at offset i and ask for
    				// Next(k), we get the right bytes.
    				buf := NewBuffer(b[0:j])
    				n, _ := buf.Read(tmp[0:i])
    				if n != i {
    					t.Fatalf("Read %d returned %d", i, n)
    				}
    				bb := buf.Next(k)
    				want := k
    Registered: Tue Sep 09 11:13:09 UTC 2025
    - Last Modified: Mon May 19 16:13:04 UTC 2025
    - 18.6K bytes
    - Viewed (0)
Back to top