Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 322 for bots (0.02 sec)

  1. docs/en/docs/tutorial/security/get-current-user.md

    Do you want to just have a `str`? Or just a `dict`? Or a database class model instance directly? It all works the same way.
    
    You actually don't have users that log in to your application but robots, bots, or other systems, that have just an access token? Again, it all works the same.
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 09:15:41 UTC 2025
    - 4K bytes
    - Viewed (0)
  2. docs/en/docs/deployment/concepts.md

    There's also the chance that for some reason you have a **spike** of usage of your API. Maybe it went viral, or maybe some other services or bots start using it. And you might want to have extra resources to be safe in those cases.
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 09:15:41 UTC 2025
    - 18.6K bytes
    - Viewed (0)
  3. ci/official/utilities/code_check_full.bats

    add them to //tensorflow/tools/pip_package/BUILD. Otherwise, add the no_pip tag
    to the test, or change code_check_full.bats in the SIG Build repository. That's
    https://github.com/tensorflow/tensorflow/blob/master/tensorflow/tools/tf_sig_build_dockerfiles/devel.usertools/code_check_full.bats
    Here are the affected tests:
    EOF
        while read dep; do
          echo "For dependency $dep:"
    Registered: Tue Sep 09 12:39:10 UTC 2025
    - Last Modified: Wed Aug 06 20:43:08 UTC 2025
    - 13.4K bytes
    - Viewed (0)
  4. docs/distributed/README.md

    > **NOTE:** `{1...n}` shown have 3 dots! Using only 2 dots `{1..n}` will be interpreted by your shell and won't be passed to MinIO server, affecting the erasure coding order, which would impact performance and high availability. **Always use ellipses syntax `{1...n}` (3 dots!) for optimal erasure-code distribution**
    
    ### Expanding existing distributed setup
    
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Tue Aug 12 18:20:36 UTC 2025
    - 8.9K bytes
    - Viewed (0)
  5. src/main/java/jcifs/netbios/UniAddress.java

            if (Character.isDigit(hostname.charAt(0))) {
                int i, len, dots;
                char[] data;
    
                i = dots = 0; /* quick IP address validation */
                len = hostname.length();
                data = hostname.toCharArray();
                while (i < len && Character.isDigit(data[i++])) {
                    if (i == len && dots == 3) {
                        // probably an IP address
                        return true;
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Sat Aug 16 01:32:48 UTC 2025
    - 8.3K bytes
    - Viewed (0)
  6. src/main/java/jcifs/internal/dtyp/ACE.java

     * the operation and the desired access bits are compared to the SID
     * and access mask of each ACE. If the SID matches, the allow/deny flags
     * and access mask are considered. If the ACE is a "deny"
     * ACE and <i>any</i> of the desired access bits match bits in the access
     * mask of the ACE, the whole access check fails. If the ACE is an "allow"
     * ACE and <i>all</i> of the bits in the desired access bits match bits in
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Sat Aug 16 01:32:48 UTC 2025
    - 5.6K bytes
    - Viewed (0)
  7. src/main/java/jcifs/ACE.java

     * the operation and the desired access bits are compared to the SID
     * and access mask of each ACE. If the SID matches, the allow/deny flags
     * and access mask are considered. If the ACE is a "deny"
     * ACE and <i>any</i> of the desired access bits match bits in the access
     * mask of the ACE, the whole access check fails. If the ACE is an "allow"
     * ACE and <i>all</i> of the bits in the desired access bits match bits in
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Sat Aug 16 01:32:48 UTC 2025
    - 7.1K bytes
    - Viewed (0)
  8. src/test/java/jcifs/internal/TreeConnectResponseTest.java

            @Test
            @DisplayName("Should indicate search bits support")
            void testIsSupportSearchBits() throws Exception {
                // Test with search bits supported
                setPrivateField(response, "supportSearchBits", true);
                assertTrue(response.isSupportSearchBits(), "Should indicate search bits support");
    
                // Test without search bits support
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Thu Aug 14 05:31:44 UTC 2025
    - 24.9K bytes
    - Viewed (0)
  9. guava/src/com/google/common/math/BigIntegerMath.java

        long numeratorAccum = n;
        long denominatorAccum = 1;
    
        int bits = LongMath.log2(n, CEILING);
    
        int numeratorBits = bits;
    
        for (int i = 1; i < k; i++) {
          int p = n - i;
          int q = i + 1;
    
          // log2(p) >= bits - 1, because p >= n/2
    
          if (numeratorBits + bits >= Long.SIZE - 1) {
            // The numerator is as big as it can get without risking overflow.
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Thu Aug 07 16:05:33 UTC 2025
    - 18.8K bytes
    - Viewed (0)
  10. src/main/java/jcifs/smb1/smb1/ACE.java

     * the operation and the desired access bits are compared to the SID
     * and access mask of each ACE. If the SID matches, the allow/deny flags
     * and access mask are considered. If the ACE is a "deny"
     * ACE and <i>any</i> of the desired access bits match bits in the access
     * mask of the ACE, the whole access check fails. If the ACE is an "allow"
     * ACE and <i>all</i> of the bits in the desired access bits match bits in
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Sat Aug 16 01:32:48 UTC 2025
    - 8.8K bytes
    - Viewed (0)
Back to top