- Sort Score
- Result 10 results
- Languages All
Results 881 - 890 of 1,060 for Mach (0.02 sec)
-
cmd/iam.go
} } }() } r := rand.New(rand.NewSource(time.Now().UnixNano())) // Calculate the waitInterval between periodic refreshes so that each server // independently picks a (uniformly distributed) random time in an interval // of size = baseInterval. // // For example: // // - if baseInterval=10s, then 5s <= waitInterval() < 15s //
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 75.3K bytes - Viewed (0) -
android/guava/src/com/google/common/primitives/Longs.java
checkArgument(min <= max, "min (%s) must be less than or equal to max (%s)", min, max); return Math.min(Math.max(value, min), max); } /** * Returns the values from each provided array combined into a single array. For example, {@code * concat(new long[] {a, b}, new long[] {}, new long[] {c}} returns the array {@code {a, b, c}}. * * @param arrays zero or more {@code long} arrays
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Thu Jul 17 15:26:41 UTC 2025 - 29.1K bytes - Viewed (0) -
android/guava/src/com/google/common/util/concurrent/Uninterruptibles.java
* timeout elapses, and only then re-interrupts the thread. * * @author Anthony Zana * @since 10.0 */ @GwtCompatible public final class Uninterruptibles { // Implementation Note: As of 3-7-11, the logic for each blocking/timeout // methods is identical, save for method being invoked. /** Invokes {@code latch.}{@link CountDownLatch#await() await()} uninterruptibly. */ @J2ktIncompatible @GwtIncompatible // concurrencyRegistered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Thu Aug 07 16:05:33 UTC 2025 - 19.8K bytes - Viewed (0) -
src/test/java/jcifs/netbios/NodeStatusResponseTest.java
addressArrayField.setAccessible(true); NbtAddress[] addresses = (NbtAddress[]) addressArrayField.get(response); assertEquals(numNames, addresses.length); // Verify each address has correct data for (int i = 0; i < numNames; i++) { assertNotNull(addresses[i]); assertTrue(addresses[i].isActive); assertFalse(addresses[i].groupName); }
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Thu Aug 14 07:14:38 UTC 2025 - 19.3K bytes - Viewed (0) -
cmd/peer-s3-client.go
} } return res, nil } // ListBuckets lists buckets across all nodes and returns a consistent view: // - Return an error when a pool cannot return N/2+1 valid bucket information // - For each pool, check if the bucket exists in N/2+1 nodes before including it in the final result func (sys *S3PeerSys) ListBuckets(ctx context.Context, opts BucketOptions) ([]BucketInfo, error) { g := errgroup.WithNErrs(len(sys.peerClients))
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 15.6K bytes - Viewed (0) -
cmd/xl-storage-disk-id-check.go
diskMetric.TotalErrorsTimeout = p.totalErrsTimeout.Load() diskMetric.TotalErrorsAvailability = p.totalErrsAvailability.Load() return diskMetric } // lockedLastMinuteLatency accumulates totals lockless for each second. type lockedLastMinuteLatency struct { cachedSec int64 cached atomic.Pointer[AccElem] mu sync.Mutex init sync.Once lastMinuteLatency }
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Apr 25 05:41:04 UTC 2025 - 34.5K bytes - Viewed (0) -
android/guava/src/com/google/common/hash/Crc32cHashFunction.java
/* * The striding algorithm works roughly as follows: it is universally the case that * CRC(x ^ y) == CRC(x) ^ CRC(y). The approach we take is to break the message as follows, * with each letter representing a 4-byte word: ABCDABCDABCDABCD... and to calculate * CRC(A000A000A000...), CRC(0B000B000B...), CRC(00C000C000C...), CRC(000D000D000D...)Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Sat Dec 28 01:26:26 UTC 2024 - 21.2K bytes - Viewed (0) -
guava/src/com/google/common/base/Functions.java
} /** * Returns the composition of two functions. For {@code f: A->B} and {@code g: B->C}, composition * is defined as the function h such that {@code h(a) == g(f(a))} for each {@code a}. * * <p><b>JRE users and Android users who opt in to library desugaring:</b> use {@code * g.compose(f)} or (probably clearer) {@code f.andThen(g)} instead. Note that it is not * serializable. *Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Wed Aug 06 17:32:30 UTC 2025 - 15.4K bytes - Viewed (0) -
docs/de/docs/advanced/security/oauth2-scopes.md
# OAuth2-Scopes Sie können OAuth2-<abbr title="Geltungsbereiche">Scopes</abbr> direkt in **FastAPI** verwenden, sie sind nahtlos integriert. Das ermöglicht es Ihnen, ein feingranuliertes Berechtigungssystem nach dem OAuth2-Standard in Ihre OpenAPI-Anwendung (und deren API-Dokumentation) zu integrieren.
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 10:49:48 UTC 2025 - 15.1K bytes - Viewed (0) -
docs/de/docs/deployment/https.md
### Verlängerung des Zertifikats Irgendwann in der Zukunft würde jedes Zertifikat **ablaufen** (etwa 3 Monate nach dem Erwerb). Und dann gäbe es ein anderes Programm (in manchen Fällen ist es ein anderes Programm, in manchen Fällen ist es derselbe TLS-Terminierungsproxy), das mit Let's Encrypt kommuniziert und das/die Zertifikat(e) erneuert.
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun May 11 13:37:26 UTC 2025 - 13.6K bytes - Viewed (0)