Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1011 - 1020 of 2,564 for when (0.05 sec)

  1. architecture/standards/0002-avoid-using-java-serialization.md

    For internal purposes, we use binary formats for their brevity.
    We use the `Serializer` abstraction to separate the actual implementation of serialization from its uses.
    
    When sharing data with external tools, we use JSON.
    
    ## Status
    
    ACCEPTED
    
    ## Consequences
    
    * The configuration cache serialization infrastructure should be used for all serialization.
    Registered: Wed Nov 06 11:36:14 UTC 2024
    - Last Modified: Thu Feb 29 22:32:18 UTC 2024
    - 2.3K bytes
    - Viewed (0)
  2. licenses/sigs.k8s.io/yaml/goyaml.v3/LICENSE

    #### MIT License ####
    
    The following files were ported to Go from C files of libyaml, and thus
    are still covered by their original MIT license, with the additional
    copyright staring in 2011 when the project was ported over:
    
        apic.go emitterc.go parserc.go readerc.go scannerc.go
        writerc.go yamlh.go yamlprivateh.go
    
    Copyright (c) 2006-2010 Kirill Simonov
    Copyright (c) 2006-2011 Kirill Simonov
    
    Registered: Wed Nov 06 22:53:10 UTC 2024
    - Last Modified: Tue Oct 31 19:53:28 UTC 2023
    - 2.1K bytes
    - Viewed (0)
  3. android/guava-tests/test/com/google/common/io/ByteSourceTest.java

        assertCorrectSlice(100, 100, 10, 0);
        assertCorrectSlice(100, 101, 10, 0);
      }
    
      /**
       * Tests that the default slice() behavior is correct when the source is sliced starting at an
       * offset that is greater than the current length of the source, a stream is then opened to that
       * source, and finally additional bytes are appended to the source before the stream is read.
       *
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Sat Oct 19 00:26:48 UTC 2024
    - 15.4K bytes
    - Viewed (0)
  4. doc/asm.html

    </p>
    
    <p>
    If a vector instruction takes a length or an index as an argument then it will be the
    first argument.
    For example, <code>VLEIF</code> <code>$1,</code> <code>$16,</code> <code>V2</code> will load
    the value sixteen into index one of <code>V2</code>.
    Care should be taken when using vector instructions to ensure that they are available at
    runtime.
    Registered: Tue Nov 05 11:13:11 UTC 2024
    - Last Modified: Tue Nov 28 19:15:27 UTC 2023
    - 36.3K bytes
    - Viewed (0)
  5. buildSrc/src/main/kotlin/Osgi.kt

          BundleTaskExtension::class.java,
          jarTask,
        )
      bundleExtension.run {
        setClasspath(osgi.compileClasspath + sourceSets["main"].compileClasspath)
        bnd(*bndProperties)
      }
      // Call the convention when the task has finished, to modify the jar to contain OSGi metadata.
      jarTask.doLast {
        bundleExtension.buildAction().execute(this)
      }
    }
    
    val Project.sourceSets: SourceSetContainer
    Registered: Fri Nov 01 11:42:11 UTC 2024
    - Last Modified: Sat Jan 20 10:30:28 UTC 2024
    - 2.2K bytes
    - Viewed (0)
  6. cmd/global-heal.go

    		tracker.setBucket(bucket)
    		// Heal current bucket again in case if it is failed
    		// in the beginning of erasure set healing
    		if err := bgSeq.healBucket(objAPI, bucket, true); err != nil {
    			// Set this such that when we return this function
    			// we let the caller retry this disk again for the
    			// buckets that failed healing.
    			retErr = err
    			healingLogIf(ctx, err)
    			continue
    		}
    
    		var (
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Sat Oct 26 09:58:27 UTC 2024
    - 16.3K bytes
    - Viewed (0)
  7. okhttp-testing-support/src/main/kotlin/okhttp3/internal/RecordingOkAuthenticator.kt

      ): Request? {
        if (route == null) throw NullPointerException("route == null")
        responses += response
        routes += route
        if (!schemeMatches(response) || credential == null) return null
        val header =
          when (response.code) {
            407 -> "Proxy-Authorization"
            else -> "Authorization"
          }
        return response.request.newBuilder()
          .addHeader(header, credential)
          .build()
      }
    
    Registered: Fri Nov 01 11:42:11 UTC 2024
    - Last Modified: Mon Jan 08 01:13:22 UTC 2024
    - 1.7K bytes
    - Viewed (0)
  8. api/maven-api-meta/src/main/java/org/apache/maven/api/annotations/Nonnull.java

    import java.lang.annotation.RetentionPolicy;
    import java.lang.annotation.Target;
    
    /**
     * The annotated element must not be null.
     * <p>
     * Annotated fields must not be null after construction has completed.
     * <p>
     * When this annotation is applied to a method it applies to the method return value.
     *
     * @see Nullable
     * @since 4.0.0
     */
    @Experimental
    @Documented
    @Retention(RetentionPolicy.CLASS)
    Registered: Sun Nov 03 03:35:11 UTC 2024
    - Last Modified: Thu Mar 23 05:29:39 UTC 2023
    - 1.4K bytes
    - Viewed (0)
  9. tests/test_tutorial/test_header_params/test_tutorial002_an.py

                                        "title": "Strange Header",
                                    }
                                )
                                | IsDict(
                                    # TODO: remove when deprecating Pydantic v1
                                    {"title": "Strange Header", "type": "string"}
                                ),
                                "name": "strange_header",
                                "in": "header",
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Fri Jul 07 17:12:13 UTC 2023
    - 4K bytes
    - Viewed (0)
  10. docs/en/docs/tutorial/security/oauth2-jwt.md

    ```
    
    It is not encrypted, so, anyone could recover the information from the contents.
    
    But it's signed. So, when you receive a token that you emitted, you can verify that you actually emitted it.
    
    That way, you can create a token with an expiration of, let's say, 1 week. And then when the user comes back the next day with the token, you know that user is still logged in to your system.
    
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Sat Oct 26 11:45:10 UTC 2024
    - 12.8K bytes
    - Viewed (0)
Back to top