Search Options

Results per page
Sort
Preferred Languages
Advance

Results 111 - 120 of 202 for naming (0.04 sec)

  1. guava/src/com/google/common/util/concurrent/NullnessCasts.java

       * {@code null}!) before returning it to callers. Depending on how the code is structured, a
       * nullness analysis might not understand that the field has been populated. To avoid that problem
       * without having to add {@code @SuppressWarnings}, the code can call this method.
       *
       * <p>Why <i>not</i> just add {@code SuppressWarnings}? The problem is that this method is
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Wed Aug 13 20:49:47 UTC 2025
    - 4K bytes
    - Viewed (0)
  2. docs/en/docs/tutorial/security/index.md

    **FastAPI** provides several tools to help you deal with **Security** easily, rapidly, in a standard way, without having to study and learn all the security specifications.
    
    But first, let's check some small concepts.
    
    ## In a hurry? { #in-a-hurry }
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 10:49:48 UTC 2025
    - 4.4K bytes
    - Viewed (0)
  3. README.md

        * Automatic and clear errors when the data is invalid.
        * Validation even for deeply nested JSON objects.
    * <abbr title="also known as: serialization, parsing, marshalling">Conversion</abbr> of input data: coming from the network to Python data and types. Reading from:
        * JSON.
        * Path parameters.
        * Query parameters.
        * Cookies.
        * Headers.
        * Forms.
        * Files.
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 15:19:49 UTC 2025
    - 24.3K bytes
    - Viewed (0)
  4. src/bytes/bytes.go

    // upper case, giving priority to the special casing rules.
    func ToUpperSpecial(c unicode.SpecialCase, s []byte) []byte {
    	return Map(c.ToUpper, s)
    }
    
    // ToLowerSpecial treats s as UTF-8-encoded bytes and returns a copy with all the Unicode letters mapped to their
    // lower case, giving priority to the special casing rules.
    func ToLowerSpecial(c unicode.SpecialCase, s []byte) []byte {
    Registered: Tue Sep 09 11:13:09 UTC 2025
    - Last Modified: Wed Sep 03 14:04:47 UTC 2025
    - 35.5K bytes
    - Viewed (0)
  5. docs/en/docs/advanced/custom-response.md

    3. This `yield from` tells the function to iterate over that thing named `file_like`. And then, for each part iterated, yield that part as coming from this generator function (`iterfile`).
    
        So, it is a generator function that transfers the "generating" work to something else internally.
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 09:15:41 UTC 2025
    - 12.2K bytes
    - Viewed (0)
  6. android/guava-tests/test/com/google/common/net/InternetDomainNameTest.java

      private static final ImmutableSet<String> NO_PS =
          ImmutableSet.of("www", "foo.ihopethiswillneverbeapublicsuffix", "x.y.z");
    
      /**
       * Having a public suffix is equivalent to having a registry suffix, because all registry suffixes
       * are public suffixes, and all public suffixes have registry suffixes.
       */
      private static final ImmutableSet<String> NO_RS = NO_PS;
    
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Thu Aug 07 16:05:33 UTC 2025
    - 17.5K bytes
    - Viewed (0)
  7. docs/erasure/README.md

    ## What is Bit Rot protection?
    
    Bit Rot, also known as data rot or silent data corruption is a data loss issue faced by disk drives today. Data on the drive may silently get corrupted without signaling an error has occurred, making bit rot more dangerous than a permanent hard drive failure.
    
    MinIO's erasure coded backend uses high speed [HighwayHash](https://github.com/minio/highwayhash) checksums to protect against Bit Rot.
    
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Tue Aug 12 18:20:36 UTC 2025
    - 4.2K bytes
    - Viewed (0)
  8. docs/en/docs/tutorial/query-params.md

    ```
    
    ...this would work:
    
    ```JSON
    {
        "item_id": "foo-item",
        "needy": "sooooneedy"
    }
    ```
    
    And of course, you can define some parameters as required, some as having a default value, and some entirely optional:
    
    {* ../../docs_src/query_params/tutorial006_py310.py hl[8] *}
    
    In this case, there are 3 query parameters:
    
    * `needy`, a required `str`.
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 10:29:01 UTC 2025
    - 4.5K bytes
    - Viewed (0)
  9. RELEASE.md

    ### Breaking Changes
    
    
    `tf.keras`:
    
    Registered: Tue Sep 09 12:39:10 UTC 2025
    - Last Modified: Mon Aug 18 20:54:38 UTC 2025
    - 740K bytes
    - Viewed (2)
  10. docs/en/docs/tutorial/security/oauth2-jwt.md

    And be compatible with all of them at the same time.
    
    ///
    
    Create a utility function to hash a password coming from the user.
    
    And another utility to verify if a received password matches the hash stored.
    
    And another one to authenticate and return a user.
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 10:49:48 UTC 2025
    - 10.5K bytes
    - Viewed (0)
Back to top