Search Options

Results per page
Sort
Preferred Languages
Advance

Results 341 - 350 of 936 for Changes (0.32 sec)

  1. guava/src/com/google/common/collect/ImmutableMap.java

       * the same order. If you want a different order, consider using {@link ImmutableSortedMap} to
       * sort by keys, or call {@link #orderEntriesByValue(Comparator)}, which changes this builder to
       * sort entries by value.
       *
       * <p>Builder instances can be reused - it is safe to call {@link #buildOrThrow} multiple times to
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Sat Aug 09 01:14:59 UTC 2025
    - 44.3K bytes
    - Viewed (0)
  2. android/guava/src/com/google/common/collect/ImmutableMap.java

       * the same order. If you want a different order, consider using {@link ImmutableSortedMap} to
       * sort by keys, or call {@link #orderEntriesByValue(Comparator)}, which changes this builder to
       * sort entries by value.
       *
       * <p>Builder instances can be reused - it is safe to call {@link #buildOrThrow} multiple times to
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Sat Aug 09 01:14:59 UTC 2025
    - 41.2K bytes
    - Viewed (0)
  3. src/cmd/asm/internal/asm/parse.go

    		// Could happen for an architecture having other registers prefixed by R
    		p.errorf("expected g or R0 through R15; found %s", name)
    		return 0
    	}
    	return uint16(reg)
    }
    
    // Note: There are two changes in the expression handling here
    // compared to the old yacc/C implementations. Neither has
    // much practical consequence because the expressions we
    // see in assembly code are simple, but for the record:
    //
    Registered: Tue Sep 09 11:13:09 UTC 2025
    - Last Modified: Fri Feb 14 15:13:11 UTC 2025
    - 37.3K bytes
    - Viewed (0)
  4. src/main/java/org/codelibs/fess/ldap/LdapManager.java

                }
            });
        }
    
        /**
         * Changes the password for a user in the LDAP directory.
         *
         * @param username the username of the user
         * @param password the new password
         * @return true if the password was changed successfully, false otherwise
         */
        public boolean changePassword(final String username, final String password) {
    Registered: Thu Sep 04 12:52:25 UTC 2025
    - Last Modified: Thu Aug 07 03:06:29 UTC 2025
    - 82K bytes
    - Viewed (0)
  5. cmd/data-scanner.go

    // applyActions will apply lifecycle checks on to a scanned item.
    // The resulting size on disk will always be returned.
    // The metadata will be compared to consensus on the object layer before any changes are applied.
    // If no metadata is supplied, -1 is returned if no action is taken.
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 45.5K bytes
    - Viewed (0)
  6. cmd/object-handlers.go

    	// We have to copy metadata only if source and destination are same.
    	// this changes for encryption which can be observed below.
    	if cpSrcDstSame {
    		srcInfo.metadataOnly = true
    	}
    
    	var chStorageClass bool
    	if dstSc != "" && dstSc != srcInfo.StorageClass {
    		chStorageClass = true
    		srcInfo.metadataOnly = false
    	} // no changes in storage-class expected so its a metadataonly operation.
    
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Sun Sep 07 16:13:09 UTC 2025
    - 120.6K bytes
    - Viewed (0)
  7. cmd/erasure-multipart.go

    	}
    
    	actualSize := data.ActualSize()
    	if actualSize < 0 {
    		_, encrypted := crypto.IsEncrypted(fi.Metadata)
    		compressed := fi.IsCompressed()
    		switch {
    		case compressed:
    			// ... nothing changes for compressed stream.
    			// if actualSize is -1 we have no known way to
    			// determine what is the actualSize.
    		case encrypted:
    			decSize, err := sio.DecryptedSize(uint64(n))
    			if err == nil {
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Sun Sep 07 16:13:09 UTC 2025
    - 47.3K bytes
    - Viewed (0)
  8. cmd/notification.go

    	// rest of the `99*9` requests.
    	//
    	// This essentially splits the workload properly and also allows for network
    	// utilization to be optimal, instead of blindly throttling the way we are
    	// doing below. However the changes that are needed here are a bit involved,
    	// further discussion advised. Remove this comment and remove the worker model
    	// for this function in future.
    	maxWorkers := runtime.GOMAXPROCS(0) / 2
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 45.9K bytes
    - Viewed (0)
  9. cmd/testdata/xl-meta-merge.zip

    above. For example if the zone is `public`, use ```sh firewall-cmd --zone=public --add-port=9000/tcp --permanent ``` Note that `permanent` makes sure the rules are persistent across firewall start, restart or reload. Finally reload the firewall for changes to take effect. ```sh firewall-cmd --reload ``` ### iptables For hosts with iptables enabled (RHEL, CentOS, etc), you can use `iptables` command to enable all traffic coming to specific ports. Use below command to allow access to port 9000 ```sh iptables...
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Mar 08 17:50:48 UTC 2024
    - 30.2K bytes
    - Viewed (0)
  10. android/guava-tests/test/com/google/common/io/testdata/alice_in_wonderland.txt

    all would change to dull reality--the grass would be only
    rustling in the wind, and the pool rippling to the waving of the
    reeds--the rattling teacups would change to tinkling sheep-
    bells, and the Queen's shrill cries to the voice of the shepherd
    boy--and the sneeze of the baby, the shriek of the Gryphon, and
    all thy other queer noises, would change (she knew) to the
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Fri Apr 21 02:27:51 UTC 2017
    - 145.2K bytes
    - Viewed (0)
Back to top