- Sort Score
- Result 10 results
- Languages All
Results 1 - 5 of 5 for cpus (0.05 sec)
-
RELEASE.md
`.predict` is available for Cloud TPUs, Cloud TPU, for all types of Keras models (sequential, functional and subclassing models). * Automatic outside compilation is now enabled for Cloud TPUs. This allows `tf.summary` to be used more conveniently with Cloud TPUs. * Dynamic batch sizes with DistributionStrategy and Keras are supported on Cloud TPUs.Registered: Tue Sep 09 12:39:10 UTC 2025 - Last Modified: Mon Aug 18 20:54:38 UTC 2025 - 740K bytes - Viewed (2) -
CHANGELOG/CHANGELOG-1.19.md
- Fixes regression in CPUManager that caused freeing of exclusive CPUs at incorrect times ([#90377](https://github.com/kubernetes/kubernetes/pull/90377), [@cbf123](https://github.com/cbf123)) [SIG Cloud Provider and Node]
Registered: Fri Sep 05 09:05:11 UTC 2025 - Last Modified: Wed Jan 05 05:42:32 UTC 2022 - 489.7K bytes - Viewed (0) -
lib/fips140/v1.0.0.zip
gcmAesFinish(productTable *[256]byte, tagMask, T *[16]byte, pLen, dLen uint64) // Keep in sync with crypto/tls.hasAESGCMHardwareSup. var supportsAESGCM = cpu.X86HasAES && cpu.X86HasPCLMULQDQ && cpu.X86HasSSE41 && cpu.X86HasSSSE3 || cpu.ARM64HasAES && cpu.ARM64HasPMULL func init() { if cpu.AMD64 { impl.Register("gcm", "AES-NI", &supportsAESGCM) } if cpu.ARM64 { impl.Register("gcm", "Armv8.0", &supportsAESGCM) } } // checkGenericIsExpect is called by the variable-time implementation to make // sure it...
Registered: Tue Sep 09 11:13:09 UTC 2025 - Last Modified: Wed Jan 29 15:10:35 UTC 2025 - 635K bytes - Viewed (0) -
src/main/java/org/codelibs/fess/mylasta/direction/FessConfig.java
*/ String getCrawlerHotthreadTimeout(); /** * Get the value for the key 'crawler.hotthread.type'. <br> * The value is, e.g. cpu <br> * comment: Type of hot thread monitoring (e.g., cpu). * @return The value of found property. (NotNull: if not found, exception but basically no way) */ String getCrawlerHotthreadType(); /**Registered: Thu Sep 04 12:52:25 UTC 2025 - Last Modified: Thu Jul 17 08:28:31 UTC 2025 - 525.6K bytes - Viewed (2) -
docs/en/docs/release-notes.md
* This solves a vulnerability that could allow denial of service attacks by using many small multipart fields/files (parts), consuming high CPU and memory. * Only applications using forms (e.g. file uploads) could be affected. * For most cases, upgrading won't have any breaking changes. ## 0.91.0 ### UpgradesRegistered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Fri Sep 05 12:48:45 UTC 2025 - 544.1K bytes - Viewed (0)