- Sort Score
- Result 10 results
- Languages All
Results 21 - 30 of 79 for approach (0.07 sec)
-
guava/src/com/google/common/util/concurrent/AggregateFutureState.java
this.remaining = remainingFutures; } final Set<Throwable> getOrInitSeenExceptions() { /* * The initialization of seenExceptions has to be more complicated than we'd like. The simple * approach would be for each caller CAS it from null to a Set populated with its exception. But * there's another race: If the first thread fails with an exception and a second thread * immediately fails with the same exception:
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Tue May 28 20:40:51 UTC 2024 - 8.4K bytes - Viewed (0) -
android/guava/src/com/google/common/escape/ArrayBasedUnicodeEscaper.java
// If we clip the safe range used during the per-character tests so it is // below the values of characters in surrogate pairs, this cannot occur. // This approach does mean that we break out of the fast path code in cases // where we don't strictly need to, but this situation will almost never // occur in practice. if (safeMin >= Character.MIN_HIGH_SURROGATE) {
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Sat Oct 19 00:26:48 UTC 2024 - 8.6K bytes - Viewed (0) -
docs/metrics/prometheus/README.md
without authentication, you don't need to use `mc` to generate prometheus config. You can skip reading further and move to 3.2 section. The Prometheus endpoint in MinIO requires authentication by default. Prometheus supports a bearer token approach to authenticate prometheus scrape requests, override the default Prometheus config with the one generated using mc. To generate a Prometheus config for an alias, use [mc](https://min.io/docs/minio/linux/reference/minio-mc.html#quickstart) as follows...
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Fri Apr 12 15:49:30 UTC 2024 - 7.1K bytes - Viewed (0) -
docs/en/docs/deployment/docker.md
# FastAPI in Containers - Docker When deploying FastAPI applications a common approach is to build a **Linux container image**. It's normally done using <a href="https://www.docker.com/" class="external-link" target="_blank">**Docker**</a>. You can then deploy that container image in one of a few possible ways. Using Linux containers has several advantages including **security**, **replicability**, **simplicity**, and others. /// tip
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Wed Sep 18 16:09:57 UTC 2024 - 28.5K bytes - Viewed (0) -
compat/maven-model-builder/src/main/java/org/apache/maven/model/interpolation/reflection/ReflectionValueExtractor.java
public class ReflectionValueExtractor { private static final Object[] OBJECT_ARGS = new Object[0]; /** * Use a WeakHashMap here, so the keys (Class objects) can be garbage collected. * This approach prevents permgen space overflows due to retention of discarded * classloaders. */ private static final Map<Class<?>, WeakReference<ClassMap>> CLASS_MAPS = new WeakHashMap<>(); static final int EOF = -1;
Registered: Sun Nov 03 03:35:11 UTC 2024 - Last Modified: Fri Oct 25 12:31:46 UTC 2024 - 10.8K bytes - Viewed (0) -
samples/guide/src/main/java/okhttp3/recipes/kt/WiresharkExample.kt
import okio.ByteString.Companion.toByteString /** * Logs SSL keys to a log file, allowing Wireshark to decode traffic and be examined with http2 * filter. The approach is to hook into JSSE log events for the messages between client and server * during handshake, and then take the agreed masterSecret from private fields of the session. *
Registered: Fri Nov 01 11:42:11 UTC 2024 - Last Modified: Mon Jan 08 01:13:22 UTC 2024 - 10.7K bytes - Viewed (0) -
guava/src/com/google/common/hash/LittleEndianByteArray.java
/** * Common interface for retrieving a 64-bit long from a little-endian byte array. * * <p>This abstraction allows us to use single-instruction load and put when available, or fall * back on the slower approach of using Longs.fromBytes(byte...). */ private interface LittleEndianBytes { long getLongLittleEndian(byte[] array, int offset); void putLongLittleEndian(byte[] array, int offset, long value); }
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Sat Oct 19 00:26:48 UTC 2024 - 9.8K bytes - Viewed (0) -
CODE_OF_CONDUCT.md
However, for the vast majority of issues, we aim to empower individuals to first resolve conflicts themselves, asking for help when needed, and only after that fails to escalate further. This approach gives people more control over the outcome of their dispute. If you are experiencing or witnessing conflict, we ask you to use the following escalation strategy to address the conflict:
Registered: Tue Nov 05 12:39:12 UTC 2024 - Last Modified: Fri Feb 05 18:43:16 UTC 2021 - 5.2K bytes - Viewed (0) -
android/guava/src/com/google/common/hash/AbstractStreamingHasher.java
* copying the CharSequence to a String and then calling getBytes(Charset) on that String, in * reality there are optimizations that make the getBytes(Charset) approach considerably faster, * at least for commonly used charsets like UTF-8. */ @Override @CanIgnoreReturnValue public final Hasher putByte(byte b) { buffer.put(b); munchIfFull();
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Wed Jun 15 20:59:00 UTC 2022 - 7.1K bytes - Viewed (0) -
common-protos/k8s.io/api/storage/v1alpha1/generated.proto
// - no object exists with suitable topology and storage class name // - such an object exists, but the capacity is unset // - such an object exists, but the capacity is zero // // The producer of these objects can decide which approach is more suitable. // // They are consumed by the kube-scheduler when a CSI driver opts into // capacity-aware scheduling with CSIDriverSpec.StorageCapacity. The scheduler
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Mon Mar 11 18:43:24 UTC 2024 - 9.4K bytes - Viewed (0)