Search Options

Results per page
Sort
Preferred Languages
Advance

Results 641 - 650 of 790 for secunde (0.1 sec)

  1. mockwebserver/src/test/java/mockwebserver3/MockWebServerTest.kt

      /** Delay the response body by sleeping 1s.  */
      @Test
      fun delayResponse() {
        assumeNotWindows()
        server.enqueue(
          MockResponse.Builder()
            .body("ABCDEF")
            .bodyDelay(1, TimeUnit.SECONDS)
            .build(),
        )
        val startNanos = System.nanoTime()
        val connection = server.url("/").toUrl().openConnection()
        val inputStream = connection!!.getInputStream()
    Registered: Fri Nov 01 11:42:11 UTC 2024
    - Last Modified: Mon Jan 08 01:13:22 UTC 2024
    - 23.5K bytes
    - Viewed (0)
  2. android/guava/src/com/google/common/hash/HashFunction.java

     *       are called <i>cryptographic hash functions</i>. But, whenever it is learned that either of
     *       these feats has become computationally feasible, the function is deemed "broken" and should
     *       no longer be used for secure purposes. (This is the likely eventual fate of <i>all</i>
     *       cryptographic hashes.)
     *   <li><b>fast:</b> perhaps self-explanatory, but often the most important consideration.
     * </ul>
     *
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Tue May 25 18:22:59 UTC 2021
    - 10.9K bytes
    - Viewed (0)
  3. android/guava/src/com/google/common/math/PairedStats.java

       *
       * <p><b>Note:</b> This tests exact equality of the calculated statistics, including the floating
       * point values. Two instances are guaranteed to be considered equal if one is copied from the
       * other using {@code second = new PairedStatsAccumulator().addAll(first).snapshot()}, if both
       * were obtained by calling {@code snapshot()} on the same {@link PairedStatsAccumulator} without
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Fri May 12 17:02:53 UTC 2023
    - 12.6K bytes
    - Viewed (0)
  4. guava/src/com/google/common/hash/HashFunction.java

     *       are called <i>cryptographic hash functions</i>. But, whenever it is learned that either of
     *       these feats has become computationally feasible, the function is deemed "broken" and should
     *       no longer be used for secure purposes. (This is the likely eventual fate of <i>all</i>
     *       cryptographic hashes.)
     *   <li><b>fast:</b> perhaps self-explanatory, but often the most important consideration.
     * </ul>
     *
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Tue May 25 18:22:59 UTC 2021
    - 10.9K bytes
    - Viewed (0)
  5. CHANGELOG/CHANGELOG-1.27.md

    - Kubelet TCP and HTTP probes are now more effective using networking resources:
      conntrack entries, sockets. This is achieved by reducing the `TIME-WAIT` state
      of the connection to 1 second, instead of the defaults 60 seconds. This allows
      kubelet to free the socket, and free conntrack entry and ephemeral port associated. ([#115143](https://github.com/kubernetes/kubernetes/pull/115143), [@aojea](https://github.com/aojea))
    Registered: Fri Nov 01 09:05:11 UTC 2024
    - Last Modified: Wed Jul 17 07:48:22 UTC 2024
    - 466.3K bytes
    - Viewed (1)
  6. cmd/iam.go

    				iamLogIf(ctx, fmt.Errorf("Failure in periodic refresh for IAM (duration: %s): %v", time.Since(refreshStart), err), logger.WarningKind)
    			} else {
    				took := time.Since(refreshStart).Seconds()
    				if took > maxDurationSecondsForLog {
    					// Log if we took a lot of time to load.
    					logger.Info("IAM refresh took (duration: %.2fs)", took)
    				}
    			}
    
    			// Run purge routines once in each hour.
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Tue Oct 29 16:01:48 UTC 2024
    - 74.6K bytes
    - Viewed (0)
  7. docs/en/docs/advanced/security/oauth2-scopes.md

    The most common is the implicit flow.
    
    The most secure is the code flow, but it's more complex to implement as it requires more steps. As it is more complex, many providers end up suggesting the implicit flow.
    
    /// note
    
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Tue Oct 29 11:02:16 UTC 2024
    - 13.1K bytes
    - Viewed (0)
  8. tensorflow/c/eager/gradients.cc

      if (iter == registry_.end()) {
        const string error_msg = "No gradient defined for op: " + op.op_name + ".";
        return errors::NotFound(error_msg);
      }
      gradient_function->reset(iter->second(op));
      return absl::OkStatus();
    }
    
    TapeTensor::TapeTensor(AbstractTensorHandle* handle) : handle_(handle) {
      handle_->Ref();
    }
    TapeTensor::TapeTensor(const TapeTensor& other) {
      handle_ = other.handle_;
    Registered: Tue Nov 05 12:39:12 UTC 2024
    - Last Modified: Sat Oct 12 05:11:17 UTC 2024
    - 19.7K bytes
    - Viewed (0)
  9. CHANGELOG/CHANGELOG-1.2.md

            * DaemonSet’s [selector](http://kubernetes.io/docs/user-guide/labels/#label-selectors) is now more general (supports set-based selector; it only supported
    equality-based selector in 1.1).
      * Running against a secured etcd requires these flags to be passed to
    kube-apiserver (instead of --etcd-config):
         * --etcd-certfile, --etcd-keyfile (if using client cert auth)
         * --etcd-cafile (if not using system roots)
    Registered: Fri Nov 01 09:05:11 UTC 2024
    - Last Modified: Fri Dec 04 06:36:19 UTC 2020
    - 41.4K bytes
    - Viewed (0)
  10. cmd/batch-rotate.go

    				ri.trackCurrentBucketObject(r.Bucket, result, success, attempts)
    				globalBatchJobsMetrics.save(job.ID, ri)
    				// persist in-memory state to disk after every 10secs.
    				batchLogIf(ctx, ri.updateAfter(ctx, api, 10*time.Second, job))
    				if success {
    					break
    				}
    				if delay > 0 {
    					time.Sleep(delay + time.Duration(rnd.Float64()*float64(delay)))
    				}
    			}
    
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Wed Sep 18 17:59:03 UTC 2024
    - 14.7K bytes
    - Viewed (0)
Back to top