- Sort Score
- Result 10 results
- Languages All
Results 111 - 120 of 202 for naming (0.04 sec)
-
guava/src/com/google/common/util/concurrent/NullnessCasts.java
* {@code null}!) before returning it to callers. Depending on how the code is structured, a * nullness analysis might not understand that the field has been populated. To avoid that problem * without having to add {@code @SuppressWarnings}, the code can call this method. * * <p>Why <i>not</i> just add {@code SuppressWarnings}? The problem is that this method isRegistered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Wed Aug 13 20:49:47 UTC 2025 - 4K bytes - Viewed (0) -
docs/en/docs/tutorial/security/index.md
**FastAPI** provides several tools to help you deal with **Security** easily, rapidly, in a standard way, without having to study and learn all the security specifications. But first, let's check some small concepts. ## In a hurry? { #in-a-hurry }
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 10:49:48 UTC 2025 - 4.4K bytes - Viewed (0) -
README.md
* Automatic and clear errors when the data is invalid. * Validation even for deeply nested JSON objects. * <abbr title="also known as: serialization, parsing, marshalling">Conversion</abbr> of input data: coming from the network to Python data and types. Reading from: * JSON. * Path parameters. * Query parameters. * Cookies. * Headers. * Forms. * Files.Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 15:19:49 UTC 2025 - 24.3K bytes - Viewed (0) -
src/bytes/bytes.go
// upper case, giving priority to the special casing rules. func ToUpperSpecial(c unicode.SpecialCase, s []byte) []byte { return Map(c.ToUpper, s) } // ToLowerSpecial treats s as UTF-8-encoded bytes and returns a copy with all the Unicode letters mapped to their // lower case, giving priority to the special casing rules. func ToLowerSpecial(c unicode.SpecialCase, s []byte) []byte {
Registered: Tue Sep 09 11:13:09 UTC 2025 - Last Modified: Wed Sep 03 14:04:47 UTC 2025 - 35.5K bytes - Viewed (0) -
docs/en/docs/advanced/custom-response.md
3. This `yield from` tells the function to iterate over that thing named `file_like`. And then, for each part iterated, yield that part as coming from this generator function (`iterfile`). So, it is a generator function that transfers the "generating" work to something else internally.
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 09:15:41 UTC 2025 - 12.2K bytes - Viewed (0) -
android/guava-tests/test/com/google/common/net/InternetDomainNameTest.java
private static final ImmutableSet<String> NO_PS = ImmutableSet.of("www", "foo.ihopethiswillneverbeapublicsuffix", "x.y.z"); /** * Having a public suffix is equivalent to having a registry suffix, because all registry suffixes * are public suffixes, and all public suffixes have registry suffixes. */ private static final ImmutableSet<String> NO_RS = NO_PS;
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Thu Aug 07 16:05:33 UTC 2025 - 17.5K bytes - Viewed (0) -
docs/erasure/README.md
## What is Bit Rot protection? Bit Rot, also known as data rot or silent data corruption is a data loss issue faced by disk drives today. Data on the drive may silently get corrupted without signaling an error has occurred, making bit rot more dangerous than a permanent hard drive failure. MinIO's erasure coded backend uses high speed [HighwayHash](https://github.com/minio/highwayhash) checksums to protect against Bit Rot.
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Tue Aug 12 18:20:36 UTC 2025 - 4.2K bytes - Viewed (0) -
docs/en/docs/tutorial/query-params.md
``` ...this would work: ```JSON { "item_id": "foo-item", "needy": "sooooneedy" } ``` And of course, you can define some parameters as required, some as having a default value, and some entirely optional: {* ../../docs_src/query_params/tutorial006_py310.py hl[8] *} In this case, there are 3 query parameters: * `needy`, a required `str`.Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 10:29:01 UTC 2025 - 4.5K bytes - Viewed (0) -
RELEASE.md
### Breaking Changes `tf.keras`:
Registered: Tue Sep 09 12:39:10 UTC 2025 - Last Modified: Mon Aug 18 20:54:38 UTC 2025 - 740K bytes - Viewed (2) -
docs/en/docs/tutorial/security/oauth2-jwt.md
And be compatible with all of them at the same time. /// Create a utility function to hash a password coming from the user. And another utility to verify if a received password matches the hash stored. And another one to authenticate and return a user.
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 10:49:48 UTC 2025 - 10.5K bytes - Viewed (0)