- Sort Score
- Result 10 results
- Languages All
Results 531 - 540 of 608 for Thread (0.09 sec)
-
CODE_OF_CONDUCT.md
## Attribution
Registered: Tue Nov 05 12:39:12 UTC 2024 - Last Modified: Fri Feb 05 18:43:16 UTC 2021 - 5.2K bytes - Viewed (0) -
docs/distributed/README.md
- **Each object is written to a single EC set, and therefore is spread over no more than 16 drives.** - **All the nodes running distributed MinIO setup are recommended to be homogeneous, i.e. same operating system, same number of drives and same network interconnects.**
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Thu Jan 18 07:03:17 UTC 2024 - 8.8K bytes - Viewed (0) -
docs/en/docs/history-design-future.md
Many developers and teams already depend on **FastAPI** for their projects (including me and my team). But still, there are many improvements and features to come. **FastAPI** has a great future ahead.
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Mon Jul 29 23:35:07 UTC 2024 - 4.1K bytes - Viewed (0) -
cni/pkg/repair/netns.go
return "", fmt.Errorf("failed to parse addr: %s", pod.Status.PodIP) } fs, err := procfs.NewFS("/host/proc") if err != nil { return "", fmt.Errorf("read procfs: %v", err) } procs, err := fs.AllProcs() if err != nil { return "", fmt.Errorf("read procs: %v", err) } oldest := uint64(math.MaxUint64) best := ""
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Fri Jun 28 19:12:54 UTC 2024 - 4.3K bytes - Viewed (0) -
ci/official/containers/linux_arm64/builder.devtoolset/build_devtoolset.sh
case "${VERSION}" in devtoolset-9) wget --retry-connrefused --waitretry=1 --read-timeout=20 --timeout=15 --tries=5 "https://vault.centos.org/centos/7/sclo/Source/rh/devtoolset-9-gcc-9.3.1-2.2.el7.src.rpm" rpm2cpio "devtoolset-9-gcc-9.3.1-2.2.el7.src.rpm" |cpio -idmv tar -xvf "gcc-9.3.1-20200408.tar.xz" --strip 1 ;; devtoolset-10)
Registered: Tue Nov 05 12:39:12 UTC 2024 - Last Modified: Fri Sep 29 00:26:34 UTC 2023 - 6.1K bytes - Viewed (0) -
guava-tests/test/com/google/common/util/concurrent/AbstractAbstractFutureTest.java
} public void testNegativeTimeout() throws Exception { future.set(1); assertEquals(1, future.get(-1, SECONDS).intValue()); } @J2ktIncompatible @GwtIncompatible // threads public void testOverflowTimeout() throws Exception { // First, sanity check that naive multiplication would really overflow to a negative number: long nanosPerSecond = NANOSECONDS.convert(1, SECONDS);
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Mon Oct 21 15:41:36 UTC 2024 - 15.5K bytes - Viewed (0) -
cni/README.md
the project's [log viewer](https://cloud.google.com/logging/docs/view/overview) and/or the `gcloud logging read` capability. The following example grabs the last 10 `kubelet` logs containing the string "cmdAdd" in the log message. ```console $ gcloud logging read "resource.type=k8s_node AND jsonPayload.SYSLOG_IDENTIFIER=kubelet AND jsonPayload.MESSAGE:cmdAdd" --limit 10 --format json ```
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Wed Jul 17 23:10:17 UTC 2024 - 10.5K bytes - Viewed (0) -
src/bufio/bufio.go
return n - remain, b.readErr() } } } // Read reads data into p. // It returns the number of bytes read into p. // The bytes are taken from at most one Read on the underlying [Reader], // hence n may be less than len(p). // To read exactly len(p) bytes, use io.ReadFull(b, p). // If the underlying [Reader] can return a non-zero count with io.EOF, // then this Read method can do so as well; see the [io.Reader] docs.
Registered: Tue Nov 05 11:13:11 UTC 2024 - Last Modified: Thu Oct 12 14:39:08 UTC 2023 - 21.8K bytes - Viewed (0) -
src/archive/zip/reader.go
} func (r *checksumReader) Read(b []byte) (n int, err error) { if r.err != nil { return 0, r.err } n, err = r.rc.Read(b) r.hash.Write(b[:n]) r.nread += uint64(n) if r.nread > r.f.UncompressedSize64 { return 0, ErrFormat } if err == nil { return } if err == io.EOF { if r.nread != r.f.UncompressedSize64 { return 0, io.ErrUnexpectedEOF }
Registered: Tue Nov 05 11:13:11 UTC 2024 - Last Modified: Sat Aug 03 01:05:29 UTC 2024 - 28.1K bytes - Viewed (0) -
SECURITY.md
- An explanation of who can exploit this vulnerability, and what they gain when doing so. Write an attack scenario that demonstrates how your issue violates the use cases and security assumptions defined in the threat model. This will help us evaluate your report quickly, especially if the issue is complex. - Whether this vulnerability is public or known to third parties. If it is, please provide details.
Registered: Tue Nov 05 12:39:12 UTC 2024 - Last Modified: Wed Oct 16 16:10:43 UTC 2024 - 9.6K bytes - Viewed (0)