- Sort Score
- Result 10 results
- Languages All
Results 41 - 50 of 99 for Shard (0.02 sec)
-
docs/es/llm-prompt.md
* full-stack: full-stack (do not translate to "de pila completa") * stack: stack (do not translate to "pila") * loop (as in async loop): loop (do not translate to "bucle" or "ciclo") * hard dependencies: dependencias obligatorias (do not translate to "dependencias duras") * locking: locking (do not translate to "bloqueo") * testing (as in software testing): escribir pruebas (do not translate to "probar")
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sat Jul 26 18:57:50 UTC 2025 - 5.3K bytes - Viewed (0) -
cmd/bitrot.go
} } return nil } // bitrotSelfTest performs a self-test to ensure that bitrot // algorithms compute correct checksums. If any algorithm // produces an incorrect checksum it fails with a hard error. // // bitrotSelfTest tries to catch any issue in the bitrot implementation // early instead of silently corrupting data. func bitrotSelfTest() { checksums := map[BitrotAlgorithm]string{
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Wed Feb 26 19:26:13 UTC 2025 - 7.7K bytes - Viewed (0) -
docs/sts/wso2.md
### 2. Configure WSO2 Once WSO2 is up and running, configure WSO2 to generate Self contained id_tokens. In OAuth 2.0 specification there are primarily two ways to provide id_tokens 1. The id_token is an identifier that is hard to guess. For example, a randomly generated string of sufficient length, that the server handling the protected resource can use to lookup the associated authorization information.
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Tue Aug 12 18:20:36 UTC 2025 - 8.7K bytes - Viewed (0) -
okhttp/src/jvmTest/kotlin/okhttp3/internal/ws/WebSocketHttpTest.kt
val server = serverListener.assertOpen() // Initiate a close on the client, which will schedule a hard cancel in 500 ms. val closeAtNanos = System.nanoTime() webSocket.close(1000, "goodbye", 500L) serverListener.assertClosing(1000, "goodbye") // Confirm that the hard cancel occurred after 500 ms. clientListener.assertFailure() val elapsedUntilFailure = System.nanoTime() - closeAtNanos
Registered: Fri Sep 05 11:42:10 UTC 2025 - Last Modified: Fri Jun 20 11:46:46 UTC 2025 - 35.5K bytes - Viewed (0) -
src/archive/tar/writer_test.go
testWrite{"hello\n", 6, nil}, testClose{nil}, }, }, { // This file was produced using GNU tar v1.26: // echo "Slartibartfast" > file.txt // ln file.txt hard.txt // tar -b 1 --format=ustar -c -f hardlink.tar file.txt hard.txt file: "testdata/hardlink.tar", tests: []testFnc{ testHeader{Header{ Typeflag: TypeReg, Name: "file.txt", Size: 15, Mode: 0644,
Registered: Tue Sep 09 11:13:09 UTC 2025 - Last Modified: Mon Feb 03 16:38:43 UTC 2025 - 39.8K bytes - Viewed (0) -
src/main/java/jcifs/smb/SmbTransportImpl.java
} } } protected synchronized void doDisconnect(final boolean hard) throws IOException { doDisconnect(hard, false); } @Override protected synchronized boolean doDisconnect(final boolean hard, final boolean inUse) throws IOException { final ListIterator<SmbSessionImpl> iter = this.sessions.listIterator();
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Sat Aug 30 05:58:03 UTC 2025 - 69.8K bytes - Viewed (0) -
cmd/naughty-disk_test.go
"io" "sync" "time" "github.com/minio/madmin-go/v3" ) // naughtyDisk wraps a POSIX disk and returns programmed errors // specified by the developer. The purpose is to simulate errors // that are hard to simulate in practice like DiskNotFound. // Programmed errors are stored in errors field. type naughtyDisk struct { // The real disk disk StorageAPI // Programmed errors: API call number => error to return
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Apr 25 05:41:04 UTC 2025 - 10.1K bytes - Viewed (0) -
docs/kms/IAM.md
There used to be two different mechanisms - one for regular S3 objects and one for IAM data. - Reduced server startup time. For IAM encryption with the root credentials, MinIO had to use a memory-hard function (Argon2) that (on purpose) consumes a lot of memory and CPU. The new KMS-based approach can use a key derivation function that is orders of magnitudes cheaper w.r.t. memory and CPU.
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Thu Jan 18 07:03:17 UTC 2024 - 5.3K bytes - Viewed (0) -
src/main/java/jcifs/smb1/smb1/SmbTransport.java
} } } @Override protected void doDisconnect(final boolean hard) throws IOException { final ListIterator iter = sessions.listIterator(); try { while (iter.hasNext()) { final SmbSession ssn = (SmbSession) iter.next(); ssn.logoff(hard); } socket.shutdownOutput(); out.close();
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Sat Aug 16 01:32:48 UTC 2025 - 31.8K bytes - Viewed (0) -
guava/src/com/google/common/collect/CompactHashMap.java
* world. Figure out what sort of space-time tradeoff we're actually going to get here with the * *Map variants. This class is particularly hard to benchmark, because the benefit is not only in * less allocation, but also having the GC do less work to scan the heap because of fewer * references, which is particularly hard to quantify. */ /** Creates an empty {@code CompactHashMap} instance. */
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Tue Jul 08 18:32:10 UTC 2025 - 39.6K bytes - Viewed (0)