- Sort Score
- Result 10 results
- Languages All
Results 151 - 160 of 660 for adding (0.16 sec)
-
guava/src/com/google/common/io/Closer.java
* method. Implementations of this method should not throw under any circumstances. */ void suppress(Closeable closeable, Throwable thrown, Throwable suppressed); } /** * Suppresses exceptions by adding them to the exception that will be thrown using the * addSuppressed(Throwable) mechanism. */ private static final Suppressor SUPPRESSING_SUPPRESSOR = (closeable, thrown, suppressed) -> {
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Tue May 07 15:26:58 UTC 2024 - 10.4K bytes - Viewed (0) -
android/guava-tests/test/com/google/common/graph/AbstractStandardUndirectedNetworkTest.java
assertThat(network.outDegree(N1)).isEqualTo(3); } // Element Mutation @Test public void addEdge_existingNodes() { assume().that(graphIsMutable()).isTrue(); // Adding nodes initially for safety (insulating from possible future // modifications to proxy methods) addNode(N1); addNode(N2); assertThat(networkAsMutableNetwork.addEdge(N1, N2, E12)).isTrue();
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Tue Jul 02 18:21:29 UTC 2024 - 18.6K bytes - Viewed (0) -
docs/security/README.md
``` Only the root/admin user can perform an SSE-S3 key rotation using the Admin-API via [mc](https://github.com/minio/mc). For more details about how to perform key management operations using the CLI refer to [mc admin guide](https://github.com/minio/mc/blob/master/docs/minio-admin-complete-guide.md) or run `mc admin kms key`. #### Secure Erasure and Locking
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Sat Feb 12 00:51:25 UTC 2022 - 13.8K bytes - Viewed (0) -
guava/src/com/google/common/collect/MinMaxPriorityQueue.java
this.queue = new Object[queueSize]; } @Override public int size() { return size; } /** * Adds the given element to this queue. If this queue has a maximum size, after adding {@code * element} the queue will automatically evict its greatest element (according to its comparator), * which may be {@code element} itself. * * @return {@code true} always */
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Wed Oct 30 16:15:19 UTC 2024 - 34.1K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.17.md
### CLI Improvements - The kubectl's api-resource command now has a `--sort-by` flag to sort resources by name or kind. ([#81971](https://github.com/kubernetes/kubernetes/pull/81971), [@laddng](https://github.com/laddng))
Registered: Fri Nov 01 09:05:11 UTC 2024 - Last Modified: Thu Jan 28 10:44:33 UTC 2021 - 346.2K bytes - Viewed (1) -
CHANGELOG/CHANGELOG-1.28.md
### Container Images All container images are available as manifest lists and support the described architectures. It is also possible to pull a specific architecture directly by adding the "-$ARCH" suffix to the container image name. name | architectures ---- | -------------
Registered: Fri Nov 01 09:05:11 UTC 2024 - Last Modified: Wed Oct 23 04:34:59 UTC 2024 - 456.9K bytes - Viewed (0) -
tensorflow/c/eager/c_api_cluster_test.cc
const char remote_device_name[] = "/job:localhost/replica:0/task:1/device:CPU:0"; CheckRemoteMatMulExecutesOK(ctx, remote_device_name, local_device_name); // Adding a non-existent remote worker to cluster def. This should cause the // UpdateServerDef call to fail. tensorflow::ClusterDef* cluster_def = server_def.mutable_cluster();
Registered: Tue Nov 05 12:39:12 UTC 2024 - Last Modified: Sat Oct 12 05:11:17 UTC 2024 - 19.2K bytes - Viewed (0) -
docs/en/docs/deployment/docker.md
```Dockerfile COPY ./requirements.txt /code/requirements.txt ``` Docker and other tools **build** these container images **incrementally**, adding **one layer on top of the other**, starting from the top of the `Dockerfile` and adding any files created by each of the instructions of the `Dockerfile`.
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Wed Sep 18 16:09:57 UTC 2024 - 28.5K bytes - Viewed (0) -
docs/en/docs/advanced/security/oauth2-scopes.md
And we return the scopes as part of the JWT token. /// danger For simplicity, here we are just adding the scopes received directly to the token. But in your application, for security, you should make sure you only add the scopes that the user is actually able to have, or the ones you have predefined. ///
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Tue Oct 29 11:02:16 UTC 2024 - 13.1K bytes - Viewed (0) -
cmd/metrics-v3-types.go
return MetricValues{ values: make(map[MetricName][]metricValue, len(d)), descriptors: d, } } // ToPromMetrics - converts the internal metric values to Prometheus // adding the given name prefix. The extraLabels are added to each metric as // constant labels. func (m *MetricValues) ToPromMetrics(namePrefix string, extraLabels map[string]string, ) []prometheus.Metric {
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Tue Jul 30 22:28:46 UTC 2024 - 15.6K bytes - Viewed (0)