- Sort Score
- Result 10 results
- Languages All
Results 641 - 650 of 959 for sekond (0.04 sec)
-
guava/src/com/google/common/collect/RegularImmutableMap.java
// If duplicates are allowed, this IdentityHashMap will record the final Entry for each // duplicated key. We will use this final Entry to overwrite earlier slots in the entries array // that have the same key. Then a second pass will remove all but the first of the slots that // have this Entry. The value in the map becomes false when this first entry has been copied, so // we know not to copy the remaining ones.Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Sat Aug 09 01:14:59 UTC 2025 - 15.8K bytes - Viewed (0) -
.github/ISSUE_TEMPLATE/feature_request.md
--- name: Feature request about: Suggest an idea title: '' labels: enhancement assignees: '' --- Start by telling us what problem you’re trying to solve. Often a solution already exists!
Registered: Fri Sep 05 11:42:10 UTC 2025 - Last Modified: Sun Dec 30 18:42:51 UTC 2018 - 350 bytes - Viewed (0) -
docs/metrics/prometheus/alerts.md
Alerting with prometheus is two step process. First we setup alerts in Prometheus server and then we need to send alerts to the AlertManager.
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Wed Apr 23 15:13:23 UTC 2025 - 4.4K bytes - Viewed (0) -
cmd/xl-storage.go
s.RLock() diskID := s.diskID fileInfo := s.formatFileInfo lastCheck := s.formatLastCheck // check if we have a valid disk ID that is less than 1 seconds old. if fileInfo != nil && diskID != "" && time.Since(lastCheck) <= 1*time.Second { s.RUnlock() return diskID, nil } s.RUnlock() fi, err := s.checkFormatJSON() if err != nil { return "", err }
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Jun 13 11:33:47 UTC 2025 - 91.7K bytes - Viewed (0) -
docs/en/docs/tutorial/cors.md
Then, the browser will send an HTTP `OPTIONS` request to the `:80`-backend, and if the backend sends the appropriate headers authorizing the communication from this different origin (`http://localhost:8080`) then the `:8080`-browser will let the JavaScript in the frontend send its request to the `:80`-backend. To achieve this, the `:80`-backend must have a list of "allowed origins".
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 09:15:41 UTC 2025 - 5.5K bytes - Viewed (0) -
guava-tests/test/com/google/common/hash/BloomFilterTest.java
import static com.google.common.hash.Funnels.unencodedCharsFunnel; import static com.google.common.truth.Truth.assertThat; import static java.nio.charset.StandardCharsets.UTF_8; import static java.util.concurrent.TimeUnit.SECONDS; import static org.junit.Assert.assertThrows; import com.google.common.base.Stopwatch; import com.google.common.collect.ImmutableSet; import com.google.common.hash.BloomFilterStrategies.LockFreeBitArray;
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Mon Aug 11 19:31:30 UTC 2025 - 22K bytes - Viewed (0) -
cmd/bucket-replication-metrics.go
if m.expMovingAvg == 0 { // Should address initial calculation and should be fine for resuming from 0 m.expMovingAvg = float64(bytesSinceLastWindow) / duration.Seconds() return } increment := float64(bytesSinceLastWindow) / duration.Seconds() m.expMovingAvg = exponentialMovingAverage(beta, m.expMovingAvg, increment) } // exponentialMovingAverage calculates the exponential moving averageRegistered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Thu Aug 15 12:04:40 UTC 2024 - 14.2K bytes - Viewed (0) -
src/test/java/org/codelibs/fess/exception/CommandExecutionExceptionTest.java
// Scenario 2: Command timeout CommandExecutionException timeout = new CommandExecutionException("Command execution timed out after 30 seconds", new RuntimeException("Timeout")); assertTrue(timeout.getMessage().contains("timed out")); assertNotNull(timeout.getCause()); // Scenario 3: Permission deniedRegistered: Thu Sep 04 12:52:25 UTC 2025 - Last Modified: Tue Aug 19 14:09:36 UTC 2025 - 9.2K bytes - Viewed (0) -
okhttp/src/jvmTest/kotlin/okhttp3/internal/ws/WebSocketRecorder.kt
this.delegate = null delegate.onFailure(webSocket, t, response) } else { events.add(Failure(t, response)) } } private fun nextEvent(): Any = events.poll(10, TimeUnit.SECONDS) ?: throw AssertionError("Timed out waiting for event.") fun assertTextMessage(payload: String?) { assertThat(nextEvent()).isEqualTo(Message(string = payload)) }Registered: Fri Sep 05 11:42:10 UTC 2025 - Last Modified: Wed Mar 19 19:25:20 UTC 2025 - 6.8K bytes - Viewed (0) -
docs/de/docs/advanced/security/http-basic-auth.md
#### Ein „professioneller“ Angriff Natürlich würden die Angreifer das alles nicht von Hand versuchen, sondern ein Programm dafür schreiben, möglicherweise mit Tausenden oder Millionen Tests pro Sekunde. Und würden jeweils nur einen zusätzlichen richtigen Buchstaben erhalten.
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Oct 27 15:25:54 UTC 2024 - 5.8K bytes - Viewed (0)