- Sort Score
- Result 10 results
- Languages All
Results 171 - 180 of 378 for addTag (0.11 sec)
-
okhttp/src/test/java/okhttp3/HttpUrlJvmTest.kt
platform.assumeNotAndroid() // Accessing an URL protocol that was not enabled. The URL protocol mailto is not tested and // might not work as expected. It can be enabled by adding the --enable-url-protocols=mailto // option to the native-image command. platform.assumeNotGraalVMImage() val javaNetUrl = URL("mailto:******@****.***") assertThat(javaNetUrl.toHttpUrlOrNull()).isNull()
Registered: Fri Nov 01 11:42:11 UTC 2024 - Last Modified: Mon Jan 08 01:13:22 UTC 2024 - 11.9K bytes - Viewed (0) -
guava/src/com/google/common/io/Closer.java
* method. Implementations of this method should not throw under any circumstances. */ void suppress(Closeable closeable, Throwable thrown, Throwable suppressed); } /** * Suppresses exceptions by adding them to the exception that will be thrown using the * addSuppressed(Throwable) mechanism. */ private static final Suppressor SUPPRESSING_SUPPRESSOR = (closeable, thrown, suppressed) -> {
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Tue May 07 15:26:58 UTC 2024 - 10.4K bytes - Viewed (0) -
android/guava-tests/test/com/google/common/graph/AbstractStandardUndirectedNetworkTest.java
assertThat(network.outDegree(N1)).isEqualTo(3); } // Element Mutation @Test public void addEdge_existingNodes() { assume().that(graphIsMutable()).isTrue(); // Adding nodes initially for safety (insulating from possible future // modifications to proxy methods) addNode(N1); addNode(N2); assertThat(networkAsMutableNetwork.addEdge(N1, N2, E12)).isTrue();
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Tue Jul 02 18:21:29 UTC 2024 - 18.6K bytes - Viewed (0) -
docs/security/README.md
The *Secure Channel* splits the object content into chunks of a fixed size of `65536` bytes. The last chunk may be smaller to avoid adding additional overhead and is treated specially to prevent truncation attacks. The nonce value is 96 bits long and generated randomly per object / multi-part part. The *Secure Channel* supports plaintexts up to `65536 * 2^32 = 256 TiB`.
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Sat Feb 12 00:51:25 UTC 2022 - 13.8K bytes - Viewed (0) -
guava/src/com/google/common/collect/MinMaxPriorityQueue.java
this.queue = new Object[queueSize]; } @Override public int size() { return size; } /** * Adds the given element to this queue. If this queue has a maximum size, after adding {@code * element} the queue will automatically evict its greatest element (according to its comparator), * which may be {@code element} itself. * * @return {@code true} always */
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Wed Oct 30 16:15:19 UTC 2024 - 34.1K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.28.md
### Container Images All container images are available as manifest lists and support the described architectures. It is also possible to pull a specific architecture directly by adding the "-$ARCH" suffix to the container image name. name | architectures ---- | -------------
Registered: Fri Nov 01 09:05:11 UTC 2024 - Last Modified: Wed Oct 23 04:34:59 UTC 2024 - 456.9K bytes - Viewed (0) -
tensorflow/c/eager/c_api_cluster_test.cc
const char remote_device_name[] = "/job:localhost/replica:0/task:1/device:CPU:0"; CheckRemoteMatMulExecutesOK(ctx, remote_device_name, local_device_name); // Adding a non-existent remote worker to cluster def. This should cause the // UpdateServerDef call to fail. tensorflow::ClusterDef* cluster_def = server_def.mutable_cluster();
Registered: Tue Nov 05 12:39:12 UTC 2024 - Last Modified: Sat Oct 12 05:11:17 UTC 2024 - 19.2K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.17.md
### Bug or Regression - Avoid GCE API calls when initializing GCE CloudProvider for Kubelets. Avoid unnecessary GCE API calls when adding IP alises or reflecting them in Node object in GCE cloud provider. ([#96864](https://github.com/kubernetes/kubernetes/pull/96864), [@tosi3k](https://github.com/tosi3k)) [SIG Apps, Cloud Provider and Network]
Registered: Fri Nov 01 09:05:11 UTC 2024 - Last Modified: Thu Jan 28 10:44:33 UTC 2021 - 346.2K bytes - Viewed (1) -
docs/en/docs/deployment/docker.md
```Dockerfile COPY ./requirements.txt /code/requirements.txt ``` Docker and other tools **build** these container images **incrementally**, adding **one layer on top of the other**, starting from the top of the `Dockerfile` and adding any files created by each of the instructions of the `Dockerfile`.
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Wed Sep 18 16:09:57 UTC 2024 - 28.5K bytes - Viewed (0) -
docs/en/docs/advanced/security/oauth2-scopes.md
And we return the scopes as part of the JWT token. /// danger For simplicity, here we are just adding the scopes received directly to the token. But in your application, for security, you should make sure you only add the scopes that the user is actually able to have, or the ones you have predefined. ///
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Tue Oct 29 11:02:16 UTC 2024 - 13.1K bytes - Viewed (0)