Search Options

Results per page
Sort
Preferred Languages
Advance

Results 291 - 300 of 715 for simples (0.05 sec)

  1. docs/en/docs/deployment/concepts.md

    ### In a Remote Server { #in-a-remote-server }
    
    When you set up a remote server (a cloud server, a virtual machine, etc.) the simplest thing you can do is use `fastapi run` (which uses Uvicorn) or something  similar, manually, the same way you do when developing locally.
    
    And it will work and will be useful **during development**.
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 09:15:41 UTC 2025
    - 18.6K bytes
    - Viewed (0)
  2. docs/erasure/storage-class/README.md

    You can calculate _approximate_ storage usage ratio using the formula - total drives (N) / data drives (D).
    
    ### Allowed values for STANDARD storage class
    
    `STANDARD` storage class implies more parity than `REDUCED_REDUNDANCY` class. So, `STANDARD` parity drives should be
    
    - Greater than or equal to 2, if `REDUCED_REDUNDANCY` parity is not set.
    - Greater than `REDUCED_REDUNDANCY` parity, if it is set.
    
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Tue Aug 12 18:20:36 UTC 2025
    - 5.9K bytes
    - Viewed (0)
  3. guava/src/com/google/common/collect/TopKSelector.java

       *
       * <p>If all input data to this {@code TopKSelector} is in a single {@code Iterable}, prefer
       * {@link Ordering#leastOf(Iterable, int)}, which provides a simpler API for that use case.
       */
      public void offerAll(Iterable<? extends T> elements) {
        offerAll(elements.iterator());
      }
    
      /**
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Sun Aug 31 13:15:26 UTC 2025
    - 11.4K bytes
    - Viewed (0)
  4. src/test/java/jcifs/smb/SmbTreeHandleImplTest.java

        }
    
        @Test
        @DisplayName("Constructor acquires tree connection; getConfig/isConnected delegate")
        void constructorAndSimpleDelegations() {
            // Ensures constructor acquires tree connection and simple delegate methods forward correctly
            // Verify constructor invoked acquire once
            verify(treeConnection, times(1)).acquire();
    
            // getConfig delegates
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Thu Aug 14 05:31:44 UTC 2025
    - 14.4K bytes
    - Viewed (0)
  5. android/guava-testlib/src/com/google/common/collect/testing/testers/SetEqualsTester.java

      @CollectionSize.Require(absent = CollectionSize.ZERO)
      public void testEquals_otherSetWithDifferentElements() {
        Collection<E> elements = getSampleElements(getNumElements() - 1);
        elements.add(getSubjectGenerator().samples().e3());
    
        assertFalse(
            "A Set should not equal another Set containing different elements.",
            getSet().equals(MinimalSet.from(elements)));
      }
    
      @CollectionSize.Require(absent = CollectionSize.ZERO)
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Thu Nov 14 23:40:07 UTC 2024
    - 3.6K bytes
    - Viewed (0)
  6. guava-testlib/src/com/google/common/collect/testing/testers/SetEqualsTester.java

      @CollectionSize.Require(absent = CollectionSize.ZERO)
      public void testEquals_otherSetWithDifferentElements() {
        Collection<E> elements = getSampleElements(getNumElements() - 1);
        elements.add(getSubjectGenerator().samples().e3());
    
        assertFalse(
            "A Set should not equal another Set containing different elements.",
            getSet().equals(MinimalSet.from(elements)));
      }
    
      @CollectionSize.Require(absent = CollectionSize.ZERO)
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Thu Nov 14 23:40:07 UTC 2024
    - 3.6K bytes
    - Viewed (0)
  7. guava-testlib/src/com/google/common/collect/testing/testers/ListEqualsTester.java

      @CollectionSize.Require(absent = CollectionSize.ZERO)
      public void testEquals_otherListWithDifferentElements() {
        ArrayList<E> other = new ArrayList<>(getSampleElements());
        other.set(other.size() / 2, getSubjectGenerator().samples().e3());
        assertFalse(
            "A List should not equal another List containing different elements.",
            getList().equals(other));
      }
    
      @CollectionSize.Require(absent = CollectionSize.ZERO)
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Thu Nov 14 23:40:07 UTC 2024
    - 3.6K bytes
    - Viewed (0)
  8. src/test/java/jcifs/spnego/SpnegoConstantsTest.java

    import org.junit.jupiter.api.Test;
    
    /**
     * Tests for SpnegoConstants interface.
     * Verifies constant values, modifiers, types, and structural properties.
     */
    class SpnegoConstantsTest {
    
        // Simple OID format: numbers separated by dots (at least one dot)
        private static final Pattern OID_PATTERN = Pattern.compile("\\d+(?:\\.\\d+)+");
    
        @Test
        @DisplayName("Constant values match expected OIDs")
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Thu Aug 14 05:31:44 UTC 2025
    - 3.7K bytes
    - Viewed (0)
  9. android/guava/src/com/google/common/primitives/Ints.java

       * @return a hash code for the value
       */
      @InlineMe(replacement = "Integer.hashCode(value)")
      @InlineMeValidationDisabled(
          "The hash code of a int is the int itself, so it's simplest to return that.")
      public static int hashCode(int value) {
        return value;
      }
    
      /**
       * Returns the {@code int} value that is equal to {@code value}, if possible.
       *
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Thu Aug 07 16:05:33 UTC 2025
    - 31.4K bytes
    - Viewed (0)
  10. docs/en/docs/advanced/advanced-dependencies.md

    {* ../../docs_src/dependencies/tutorial011_an_py39.py hl[22] *}
    
    /// tip
    
    All this might seem contrived. And it might not be very clear how is it useful yet.
    
    These examples are intentionally simple, but show how it all works.
    
    In the chapters about security, there are utility functions that are implemented in this same way.
    
    If you understood all this, you already know how those utility tools for security work underneath.
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 09:15:41 UTC 2025
    - 2.6K bytes
    - Viewed (0)
Back to top