Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 67 for becomes (0.18 sec)

  1. android/guava/src/com/google/common/collect/RegularImmutableMap.java

        if (tableSize <= BYTE_MAX_SIZE) {
          /*
           * Use 8 bits per entry. The value is unsigned to allow use up to a size of 2^8.
           *
           * The absent indicator of -1 signed becomes 2^8 - 1 unsigned, which reduces the actual max
           * size to 2^8 - 1. However, due to a load factor < 1 the limit is never approached.
           */
          byte[] hashTable = new byte[tableSize];
    Java
    - Registered: Fri Apr 26 12:43:10 GMT 2024
    - Last Modified: Mon Apr 15 22:32:14 GMT 2024
    - 22.7K bytes
    - Viewed (0)
  2. okhttp/src/main/kotlin/okhttp3/Dispatcher.kt

        }
    
      /**
       * A callback to be invoked each time the dispatcher becomes idle (when the number of running
       * calls returns to zero).
       *
       * Note: The time at which a [call][Call] is considered idle is different depending on whether it
       * was run [asynchronously][Call.enqueue] or [synchronously][Call.execute]. Asynchronous calls
       * become idle after the [onResponse][Callback.onResponse] or [onFailure][Callback.onFailure]
    Plain Text
    - Registered: Fri Apr 26 11:42:10 GMT 2024
    - Last Modified: Sat Apr 20 17:03:43 GMT 2024
    - 9K bytes
    - Viewed (0)
  3. okhttp/src/main/kotlin/okhttp3/Cookie.kt

                year = matcher.group(1).toInt()
              }
            }
    
            pos = dateCharacterOffset(s, end + 1, limit, false)
          }
    
          // Convert two-digit years into four-digit years. 99 becomes 1999, 15 becomes 2015.
          if (year in 70..99) year += 1900
          if (year in 0..69) year += 2000
    
          // If any partial is omitted or out of range, return -1. The date is impossible. Note that leap
    Plain Text
    - Registered: Fri Apr 26 11:42:10 GMT 2024
    - Last Modified: Sat Apr 06 04:12:05 GMT 2024
    - 23.1K bytes
    - Viewed (0)
  4. docs/en/docs/tutorial/security/oauth2-jwt.md

    ## Recap
    
    With what you have seen up to now, you can set up a secure **FastAPI** application using standards like OAuth2 and JWT.
    
    In almost any framework handling the security becomes a rather complex subject quite quickly.
    
    Plain Text
    - Registered: Sun Apr 28 07:19:10 GMT 2024
    - Last Modified: Thu Apr 18 19:53:19 GMT 2024
    - 13K bytes
    - Viewed (0)
  5. manifests/charts/base/crds/crd-all.gen.yaml

                                            description: Destination region the traffic
                                              will fail over to when endpoints in the
                                              'from' region becomes unhealthy.
                                            type: string
                                        type: object
                                      type: array
                                    failoverPriority:
    Others
    - Registered: Wed Apr 24 22:53:08 GMT 2024
    - Last Modified: Mon Apr 22 20:20:47 GMT 2024
    - 606.1K bytes
    - Viewed (0)
  6. android/guava/src/com/google/common/collect/Iterators.java

            if (!hasNext()) {
              throw new NoSuchElementException();
            }
            /*
             * requireNonNull is safe because our callers always pass non-null arguments. Each element
             * of the array becomes null only when we iterate past it and then clear it.
             */
            I result = requireNonNull(elements[index]);
            elements[index] = null;
            index++;
            return result;
          }
        };
    Java
    - Registered: Fri Apr 26 12:43:10 GMT 2024
    - Last Modified: Sat Apr 20 03:33:06 GMT 2024
    - 50.6K bytes
    - Viewed (0)
  7. maven-api-impl/src/test/java/org/apache/maven/internal/impl/standalone/RepositorySystemSupplier.java

     * <p>
     * Important: Given the instance of supplier memorizes the supplier {@link RepositorySystem} instance it supplies,
     * their lifecycle is shared as well: once supplied repository system is shut-down, this instance becomes closed as
     * well. Any subsequent {@code getXXX} method invocation attempt will fail with {@link IllegalStateException}.
     */
    public class RepositorySystemSupplier implements Supplier<RepositorySystem> {
    Java
    - Registered: Sun Apr 28 03:35:10 GMT 2024
    - Last Modified: Fri Apr 26 13:10:42 GMT 2024
    - 43.7K bytes
    - Viewed (0)
  8. docs/en/docs/alternatives.md

    It can't handle nested models very well. So, if the JSON body in the request is a JSON object that has inner fields that in turn are nested JSON objects, it cannot be properly documented and validated.
    
    Plain Text
    - Registered: Sun Apr 28 07:19:10 GMT 2024
    - Last Modified: Thu Apr 18 19:53:19 GMT 2024
    - 23.2K bytes
    - Viewed (0)
  9. cmd/endpoint.go

    		u.Path = path.Clean(u.Path)
    		if isEmptyPath(u.Path) {
    			return ep, fmt.Errorf("empty or root path is not supported in URL endpoint")
    		}
    
    		// On windows having a preceding SlashSeparator will cause problems, if the
    		// command line already has C:/<export-folder/ in it. Final resulting
    		// path on windows might become C:/C:/ this will cause problems
    Go
    - Registered: Sun Apr 28 19:28:10 GMT 2024
    - Last Modified: Sun Apr 21 11:43:18 GMT 2024
    - 34.1K bytes
    - Viewed (0)
  10. docs/en/docs/deployment/docker.md

    ```Dockerfile
    CMD ["uvicorn", "app.main:app", "--proxy-headers", "--host", "0.0.0.0", "--port", "80"]
    ```
    
    ## Recap
    
    Using container systems (e.g. with **Docker** and **Kubernetes**) it becomes fairly straightforward to handle all the **deployment concepts**:
    
    * HTTPS
    * Running on startup
    * Restarts
    * Replication (the number of processes running)
    * Memory
    * Previous steps before starting
    
    Plain Text
    - Registered: Sun Apr 28 07:19:10 GMT 2024
    - Last Modified: Thu Apr 18 19:53:19 GMT 2024
    - 34.3K bytes
    - Viewed (0)
Back to top