Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 4 of 4 for recommendations (0.4 sec)

  1. okhttp-tls/README.md

    IjXEHQgc6w3ELHdnH1houEUom9CgCgYIKoZIzj0DAQehRANCAAQ5pTomd3cQNs8N
    SsKhjbClVGW5FFY+XMVdYw20k705To0o+i0dDr8rPURXa43G2zC1r0rzEIB3IZPE
    OdHOim9+
    -----END PRIVATE KEY-----
    ```
    
    Recommendations
    ---------------
    
    Typically servers need a held certificate plus a chain of intermediates. Servers only need the
    private key for their own certificate. The chain served by a server doesn't need the root
    certificate.
    Plain Text
    - Registered: Fri Apr 26 11:42:10 GMT 2024
    - Last Modified: Sun Dec 17 15:34:10 GMT 2023
    - 9.1K bytes
    - Viewed (1)
  2. cmd/veeam-sos-api.go

    //     system.xml. Vendors can work with Veeam Product Management and the Alliances team on getting approval to integrate
    //     specific system recommendations based on current support case statistics and storage performance possibilities.
    //     Vendors might change the settings based on the configuration and scale out of the solution (more storage nodes =>
    //     higher task limit).
    Go
    - Registered: Sun Apr 28 19:28:10 GMT 2024
    - Last Modified: Tue Jan 30 18:43:58 GMT 2024
    - 8.2K bytes
    - Viewed (2)
  3. common-protos/k8s.io/api/storage/v1alpha1/generated.proto

      // Standard object's metadata. The name has no particular meaning. It must be
      // be a DNS subdomain (dots allowed, 253 characters). To ensure that
      // there are no conflicts with other CSI drivers on the cluster, the recommendation
      // is to use csisc-<uuid>, a generated name, or a reverse-domain name which ends
      // with the unique CSI driver name.
      //
      // Objects are namespaced.
      //
    Plain Text
    - Registered: Wed May 01 22:53:12 GMT 2024
    - Last Modified: Mon Mar 11 18:43:24 GMT 2024
    - 9.4K bytes
    - Viewed (0)
  4. SECURITY.md

    The security impact of skipping those checks should be low, since the attack
    scenario would require a malicious user to be able to control the model which as
    stated above is already equivalent to code execution. In any case, the
    recommendation is not to serve models using Eager mode since it also has
    performance limitations.
    
    ## Multi-Tenant environments
    
    It is possible to run multiple TensorFlow models in parallel. For example,
    Plain Text
    - Registered: Tue Apr 30 12:39:09 GMT 2024
    - Last Modified: Sun Oct 01 06:06:35 GMT 2023
    - 9.6K bytes
    - Viewed (0)
Back to top