- Sort Score
- Result 10 results
- Languages All
Results 171 - 180 of 402 for slide (0.08 sec)
-
cmd/object-api-options.go
func copyDstOpts(ctx context.Context, r *http.Request, bucket, object string, metadata map[string]string) (opts ObjectOptions, err error) { return putOptsFromReq(ctx, r, bucket, object, metadata) } // get ObjectOptions for Copy calls with encryption headers provided on the source side
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Wed Aug 21 21:13:59 UTC 2024 - 14.4K bytes - Viewed (0) -
internal/s3select/csv/testdata/testdata.zip
East Harlem South 3804 1098 150.02 1 Manhattan 015002 1015002 I MN40 Upper East Side-Carnegie Hill 3805 3389254 2 2014-03-26 19:13:50 2014-03-26 19:19:57 N 1 -73.951805114746094 40.793228149414063 -73.967231750488281 40.793693542480469 1 1.06 6.5 1 0.5 1 0 9 1 1 75 151 green 0.00 0.0 0.0 36 24 11.86 1267 168 1 Manhattan 016800 1016800 E MN33 East Harlem South 3804 1305 185 1 Manhattan 018500 1018500 I MN12 Upper West Side 3806 3389255 1 2014-03-10 17:49:29 2014-03-10 17:53:43 N 1 -73.952110290527344...
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Tue Jun 01 21:59:40 UTC 2021 - 111.6K bytes - Viewed (0) -
android/guava/src/com/google/common/base/Predicate.java
* class documentation above). This method is <i>generally expected</i>, but not absolutely * required, to have the following properties: * * <ul> * <li>Its execution does not cause any observable side effects. * <li>The computation is <i>consistent with equals</i>; that is, {@link Objects#equal * Objects.equal}{@code (a, b)} implies that {@code predicate.apply(a) == * predicate.apply(b))}. * </ul>
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Thu Feb 15 16:12:13 UTC 2024 - 3.6K bytes - Viewed (0) -
guava-tests/test/com/google/common/escape/ArrayBasedCharEscaperTest.java
@Override protected char[] escapeUnsafe(char c) { return ("{" + c + "}").toCharArray(); } }; EscaperAsserts.assertBasic(wrappingEscaper); // '[' and '@' lie either side of [A-Z]. assertEquals("{[}FOO{@}BAR{]}", wrappingEscaper.escape("[FOO@BAR]")); } public void testSafeRange_maxLessThanMin() throws IOException { // Basic escaping of unsafe chars (wrap them in {,}'s)
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Wed Feb 07 23:02:38 UTC 2024 - 3.5K bytes - Viewed (0) -
guava/src/com/google/common/collect/Cut.java
* instance. */ super(""); } @Override Comparable<?> endpoint() { throw new IllegalStateException("range unbounded on this side"); } @Override boolean isLessThan(Comparable<?> value) { return true; } @Override BoundType typeAsLowerBound() { throw new IllegalStateException(); }
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Wed Oct 16 17:21:56 UTC 2024 - 12.2K bytes - Viewed (0) -
android/guava/src/com/google/common/io/ReaderInputStream.java
private void readMoreChars() throws IOException { // Possibilities: // 1) array has space available on right-hand side (between limit and capacity) // 2) array has space available on left-hand side (before position) // 3) array has no space available // // In case 2 we shift the existing chars to the left, and in case 3 we create a bigger
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Sat Oct 19 00:26:48 UTC 2024 - 9.3K bytes - Viewed (0) -
guava/src/com/google/common/io/ReaderInputStream.java
private void readMoreChars() throws IOException { // Possibilities: // 1) array has space available on right-hand side (between limit and capacity) // 2) array has space available on left-hand side (before position) // 3) array has no space available // // In case 2 we shift the existing chars to the left, and in case 3 we create a bigger
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Sat Oct 19 00:26:48 UTC 2024 - 9.3K bytes - Viewed (0) -
common-protos/k8s.io/api/flowcontrol/v1beta1/generated.proto
// There must be at least one member in this slice. // A slice that includes both the system:authenticated and system:unauthenticated user groups matches every request. // +listType=atomic // Required. repeated Subject subjects = 1; // `resourceRules` is a slice of ResourcePolicyRules that identify matching requests according to their verb and the // target resource.
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Mon Mar 11 18:43:24 UTC 2024 - 19.4K bytes - Viewed (0) -
SECURITY.md
### Hardware attacks Physical GPUs or TPUs can also be the target of attacks. [Published research](https://scholar.google.com/scholar?q=gpu+side+channel) shows that it might be possible to use side channel attacks on the GPU to leak data from other running models or processes in the same system. GPUs can also have implementation bugs that might allow attackers to leave malicious code running
Registered: Tue Nov 05 12:39:12 UTC 2024 - Last Modified: Wed Oct 16 16:10:43 UTC 2024 - 9.6K bytes - Viewed (0) -
istioctl/pkg/writer/ztunnel/configdump/workload.go
for _, wl := range zDump.Workloads { if filter.Verify(wl) { verifiedWorkloads = append(verifiedWorkloads, wl) } } // Sort by name, node sort.Slice(verifiedWorkloads, func(i, j int) bool { in := verifiedWorkloads[i].Namespace + "." + verifiedWorkloads[i].Name jn := verifiedWorkloads[j].Namespace + "." + verifiedWorkloads[j].Name if in != jn { return in < jn }
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Wed Jul 24 09:07:30 UTC 2024 - 4.2K bytes - Viewed (0)