- Sort Score
- Result 10 results
- Languages All
Results 121 - 130 of 233 for bit (0.03 sec)
-
docs/en/docs/history-design-future.md
> What’s the history of this project? It seems to have come from nowhere to awesome in a few weeks [...] Here's a little bit of that history. ## Alternatives I have been creating APIs with complex requirements for several years (Machine Learning, distributed systems, asynchronous jobs, NoSQL databases, etc), leading several teams of developers.
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Mon Jul 29 23:35:07 UTC 2024 - 4.1K bytes - Viewed (0) -
guava-tests/test/com/google/common/hash/FarmHashFingerprint64Test.java
.isNotEqualTo(fingerprint(stringB.getBytes(UTF_8))); // ISO 8859-1 only has 0-255 (ubyte) representation so throws away UTF-8 characters // greater than 127 (ie with their top bit set). // Don't attempt to do this in real code. assertEquals( fingerprint(stringA.getBytes(ISO_8859_1)), fingerprint(stringB.getBytes(ISO_8859_1))); } public void testPutNonChars() {
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Tue Jul 23 14:22:54 UTC 2024 - 6.2K bytes - Viewed (0) -
android/guava/src/com/google/common/net/InetAddresses.java
* Evaluates whether the argument is an ISATAP address. * * <p>From RFC 5214: "ISATAP interface identifiers are constructed in Modified EUI-64 format [...] * by concatenating the 24-bit IANA OUI (00-00-5E), the 8-bit hexadecimal value 0xFE, and a 32-bit * IPv4 address in network byte order [...]" * * <p>For more on ISATAP addresses see section 6.1 of <a target="_parent"
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Sat Oct 19 00:26:48 UTC 2024 - 47.1K bytes - Viewed (0) -
docs/select/README.md
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Thu Sep 29 04:28:45 UTC 2022 - 6.5K bytes - Viewed (0) -
docs/security/README.md
### Server-Side Encryption with client-provided Keys
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Sat Feb 12 00:51:25 UTC 2022 - 13.8K bytes - Viewed (0) -
android/guava-tests/test/com/google/common/hash/FarmHashFingerprint64Test.java
.isNotEqualTo(fingerprint(stringB.getBytes(UTF_8))); // ISO 8859-1 only has 0-255 (ubyte) representation so throws away UTF-8 characters // greater than 127 (ie with their top bit set). // Don't attempt to do this in real code. assertEquals( fingerprint(stringA.getBytes(ISO_8859_1)), fingerprint(stringB.getBytes(ISO_8859_1))); } public void testPutNonChars() {
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Tue Jul 23 14:22:54 UTC 2024 - 6.2K bytes - Viewed (0) -
src/cmd/asm/internal/asm/asm.go
// effectively discarded. In these cases, the offset determines // the CR bit. prog.Reg = a[1].Reg if a[1].Type != obj.TYPE_REG { // The CR bit is represented as a constant 0-31. Convert it to a Reg. c := p.getConstant(prog, op, &a[1]) reg, success := ppc64.ConstantToCRbit(c) if !success { p.errorf("invalid CR bit register number %d", c) } prog.Reg = reg } break }
Registered: Tue Nov 05 11:13:11 UTC 2024 - Last Modified: Mon Oct 21 14:11:44 UTC 2024 - 25.5K bytes - Viewed (0) -
src/bufio/example_test.go
fmt.Fprintln(os.Stderr, "reading input:", err) } fmt.Printf("%d\n", count) // Output: 15 } // Use a Scanner with a custom split function (built by wrapping ScanWords) to validate // 32-bit decimal input. func ExampleScanner_custom() { // An artificial input source. const input = "1234 5678 1234567901234567890" scanner := bufio.NewScanner(strings.NewReader(input))
Registered: Tue Nov 05 11:13:11 UTC 2024 - Last Modified: Fri Nov 01 21:52:12 UTC 2024 - 5.5K bytes - Viewed (0) -
src/main/java/jcifs/smb/NtlmContext.java
} if ( !msg2.getFlag(NtlmFlags.NTLMSSP_NEGOTIATE_128) ) { throw new SmbUnsupportedOperationException("Server does not support 128-bit keys"); } } this.ntlmsspFlags &= msg2.getFlags(); Type3Message msg3 = createType3Message(msg2); msg3.setupMIC(this.type1Bytes, token);
Registered: Sun Nov 03 00:10:13 UTC 2024 - Last Modified: Tue Jul 07 12:07:20 UTC 2020 - 15.7K bytes - Viewed (0) -
docs/en/docs/tutorial/security/first-steps.md
It can be used by third party applications and systems. And it can also be used by yourself, to debug, check and test the same application. ## The `password` flow Now let's go back a bit and understand what is all that. The `password` "flow" is one of the ways ("flows") defined in OAuth2, to handle security and authentication.
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Sun Oct 06 20:36:54 UTC 2024 - 9.2K bytes - Viewed (0)