Search Options

Results per page
Sort
Preferred Languages
Advance

Results 251 - 260 of 752 for These (0.02 sec)

  1. src/main/java/jcifs/netbios/NbtAddress.java

            /*
             * The NodeStatusResponse.readNodeNameArray method may also set this
             * information. These two places where node status data is populated should
             * be consistent. Be carefull!
             */
            this.hostName = hostName;
            this.address = address;
            this.groupName = groupName;
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Sat Aug 16 01:32:48 UTC 2025
    - 15.1K bytes
    - Viewed (0)
  2. docs/en/docs/tutorial/security/oauth2-jwt.md

    Using these ideas, JWT can be used for way more sophisticated scenarios.
    
    In those cases, several of those entities could have the same ID, let's say `foo` (a user `foo`, a car `foo`, and a blog post `foo`).
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 10:49:48 UTC 2025
    - 10.5K bytes
    - Viewed (0)
  3. api/maven-api-core/src/main/java/org/apache/maven/api/services/ProjectManager.java

        /**
         * Returns an immutable collection of attached artifacts for the given project.
         * Attached artifacts are secondary artifacts produced during the build (e.g., sources jar,
         * javadoc jar, test jars). These artifacts are created and attached during specific
         * lifecycle phases, so the collection contents depend on the build phase when this method
         * is called.
         *
    Registered: Sun Sep 07 03:35:12 UTC 2025
    - Last Modified: Thu Jan 30 23:29:13 UTC 2025
    - 12K bytes
    - Viewed (0)
  4. okhttp-tls/src/main/kotlin/okhttp3/tls/HandshakeCertificates.kt

    import okhttp3.tls.internal.TlsUtil.newTrustManager
    
    /**
     * Certificates to identify which peers to trust and also to earn the trust of those peers in kind.
     * Client and server exchange these certificates during the handshake phase of a TLS connection.
     *
     * ### Server Authentication
     *
     * This is the most common form of TLS authentication: clients verify that servers are trusted and
    Registered: Fri Sep 05 11:42:10 UTC 2025
    - Last Modified: Sat May 10 11:15:14 UTC 2025
    - 8.4K bytes
    - Viewed (0)
  5. docs/metrics/prometheus/README.md

    ### 6. Configure Grafana
    
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Tue Aug 12 18:20:36 UTC 2025
    - 7.1K bytes
    - Viewed (0)
  6. docs/en/docs/tutorial/dependencies/sub-dependencies.md

    But still, it is very powerful, and allows you to declare arbitrarily deeply nested dependency "graphs" (trees).
    
    /// tip
    
    All this might not seem as useful with these simple examples.
    
    But you will see how useful it is in the chapters about **security**.
    
    And you will also see the amounts of code it will save you.
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 09:15:41 UTC 2025
    - 3.7K bytes
    - Viewed (0)
  7. android/guava-tests/test/com/google/common/util/concurrent/FuturesGetCheckedTest.java

      /*
       * TODO(cpovirk): It would be great to run all these tests (including class unloading) in an
       * environment that forces Futures.getChecked to its fallback WeakSetValidator. One awful way of
       * doing so would be to derive a separate test library by using remove_from_jar to strip out
       * ClassValueValidator.
       *
       * Fortunately, we get pretty good coverage "by accident": We run all these tests against the
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Thu Dec 19 18:03:30 UTC 2024
    - 16.4K bytes
    - Viewed (0)
  8. src/main/java/jcifs/smb1/smb1/ACE.java

    /**
     * An Access Control Entry (ACE) is an element in a security descriptor
     * such as those associated with files and directories. The Windows OS
     * determines which users have the necessary permissions to access objects
     * based on these entries.
     * <p>
     * To fully understand the information exposed by this class a description
     * of the access check algorithm used by Windows is required. The following
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Sat Aug 16 01:32:48 UTC 2025
    - 8.8K bytes
    - Viewed (0)
  9. doc/asm.html

    These modes accept only 1, 2, 4, and 8 as scale factors.
    </li>
    
    </ul>
    
    <p>
    When using the compiler and assembler's
    <code>-dynlink</code> or <code>-shared</code> modes,
    any load or store of a fixed memory location such as a global variable
    must be assumed to overwrite <code>CX</code>.
    Therefore, to be safe for use with these modes,
    Registered: Tue Sep 09 11:13:09 UTC 2025
    - Last Modified: Tue Nov 28 19:15:27 UTC 2023
    - 36.3K bytes
    - Viewed (0)
  10. android/guava/src/com/google/common/util/concurrent/Futures.java

      //
      // Future versions of the JMM may revise safe construction semantics in such a way that we can
      // safely publish these objects and we won't need this whole discussion.
      // TODO(user,lukes): consider adding volatile to all these fields since in current known JVMs
      // that should resolve the issue. This comes at the cost of adding more write barriers to the
      // implementations.
    
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Thu Aug 07 16:05:33 UTC 2025
    - 64.3K bytes
    - Viewed (0)
Back to top