- Sort Score
- Result 10 results
- Languages All
Results 491 - 500 of 974 for succ (0.03 sec)
-
android/guava/src/com/google/common/primitives/Floats.java
return -1; } /** * Returns the start position of the first occurrence of the specified {@code target} within * {@code array}, or {@code -1} if there is no such occurrence. * * <p>More formally, returns the lowest index {@code i} such that {@code Arrays.copyOfRange(array, * i, i + target.length)} contains exactly the same elements as {@code target}. *
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Thu Oct 17 15:52:18 UTC 2024 - 25.8K bytes - Viewed (0) -
guava/src/com/google/common/primitives/Doubles.java
return -1; } /** * Returns the start position of the first occurrence of the specified {@code target} within * {@code array}, or {@code -1} if there is no such occurrence. * * <p>More formally, returns the lowest index {@code i} such that {@code Arrays.copyOfRange(array, * i, i + target.length)} contains exactly the same elements as {@code target}. *
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Thu Oct 17 15:52:18 UTC 2024 - 27.9K bytes - Viewed (0) -
guava/src/com/google/common/primitives/Floats.java
return -1; } /** * Returns the start position of the first occurrence of the specified {@code target} within * {@code array}, or {@code -1} if there is no such occurrence. * * <p>More formally, returns the lowest index {@code i} such that {@code Arrays.copyOfRange(array, * i, i + target.length)} contains exactly the same elements as {@code target}. *
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Thu Oct 17 15:52:18 UTC 2024 - 25.8K bytes - Viewed (0) -
common-protos/k8s.io/api/storage/v1beta1/generated.proto
// // The following three cases all imply that no capacity is available for // a certain combination: // - no object exists with suitable topology and storage class name // - such an object exists, but the capacity is unset // - such an object exists, but the capacity is zero // // The producer of these objects can decide which approach is more suitable. // // They are consumed by the kube-scheduler when a CSI driver opts into
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Mon Mar 11 18:43:24 UTC 2024 - 24.9K bytes - Viewed (0) -
cmd/config-current.go
Key: config.SiteSubSys, Description: "label the server and its location", }, config.HelpKV{ Key: config.APISubSys, Description: "manage global HTTP API call specific features, such as throttling, authentication types, etc.", }, config.HelpKV{ Key: config.ScannerSubSys, Description: "manage namespace scanning for usage calculation, lifecycle, healing and more", },
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Tue Sep 03 18:23:41 UTC 2024 - 30.1K bytes - Viewed (0) -
cmd/storage-rest-client.go
case strings.Contains(err.Error(), http.ErrServerClosed.Error()): return true // Corner case, the server closed the connection with a keep-alive timeout // some requests are not retried internally, such as POST request with written body case strings.Contains(err.Error(), "server closed idle connection"): return true } return false } // Converts network error to storageErr. This function is
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Sun Oct 13 13:07:21 UTC 2024 - 30.2K bytes - Viewed (0) -
cmd/auth-handler.go
// that clients cannot decode the token using the temp // secret keys and generate an entirely new claim by essentially // hijacking the policies. We need to make sure that this is // based on admin credential such that token cannot be decoded // on the client side and is treated like an opaque value. claims, err := auth.ExtractClaims(token, secret) if err != nil {
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Tue Sep 17 16:45:46 UTC 2024 - 26.1K bytes - Viewed (0) -
src/main/java/jcifs/smb1/util/DES.java
// DISTRIBUTING THIS SOFTWARE OR ITS DERIVATIVES. // // THIS SOFTWARE IS NOT DESIGNED OR INTENDED FOR USE OR RESALE AS ON-LINE // CONTROL EQUIPMENT IN HAZARDOUS ENVIRONMENTS REQUIRING FAIL-SAFE // PERFORMANCE, SUCH AS IN THE OPERATION OF NUCLEAR FACILITIES, AIRCRAFT // NAVIGATION OR COMMUNICATION SYSTEMS, AIR TRAFFIC CONTROL, DIRECT LIFE // SUPPORT MACHINES, OR WEAPONS SYSTEMS, IN WHICH THE FAILURE OF THE
Registered: Sun Nov 03 00:10:13 UTC 2024 - Last Modified: Fri Mar 22 20:39:42 UTC 2019 - 21.4K bytes - Viewed (0) -
internal/etag/etag.go
// Therefore, an S3 implementation may encrypt an ETag before storing // it. In this case, the stored ETag may not be a well-formed S3 ETag. // For example, it can be larger due to a checksum added by authenticated // encryption schemes. Such an ETag must be decrypted before sent to an // S3 client. // // # S3 Clients // // There are many different S3 client implementations. Most of them // access the ETag by looking for the HTTP response header key "Etag".
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Sun Mar 10 21:09:36 UTC 2024 - 13.3K bytes - Viewed (0) -
src/main/java/jcifs/smb1/smb1/SmbFile.java
/** * Constructs an SmbFile representing a resource on an SMB network such * as a file or directory from a <tt>URL</tt> object. * * @param url The URL of the target resource */ public SmbFile( URL url ) { this( url, new NtlmPasswordAuthentication( url.getUserInfo() )); } /** * Constructs an SmbFile representing a resource on an SMB network such * as a file or directory from a <tt>URL</tt> object and an
Registered: Sun Nov 03 00:10:13 UTC 2024 - Last Modified: Mon Mar 13 12:00:57 UTC 2023 - 107.9K bytes - Viewed (0)