Search Options

Results per page
Sort
Preferred Languages
Advance

Results 31 - 40 of 818 for They (0.09 sec)

  1. src/test/java/jcifs/ResolverTypeTest.java

        }
    
        /**
         * Tests the names of the enum constants.
         */
        @Test
        void testEnumNames() {
            // Verify the names of the enum constants to ensure they are not accidentally changed
            assertEquals("RESOLVER_WINS", ResolverType.RESOLVER_WINS.name());
            assertEquals("RESOLVER_BCAST", ResolverType.RESOLVER_BCAST.name());
    Registered: Sat Dec 20 13:44:44 UTC 2025
    - Last Modified: Thu Aug 14 05:31:44 UTC 2025
    - 2.1K bytes
    - Viewed (0)
  2. build-logic-commons/basics/src/main/kotlin/gradlebuild.minify.gradle.kts

    /**
     * A map from artifact name to a set of class name prefixes that should be kept.
     * Artifacts matched by this map will be minified to only contain the specified
     * classes and the classes they depend on. The classes are not relocated, they all
     * remain in their original namespace. This reduces the final Gradle distribution
     * size and makes us more conscious of which parts of a library we really need.
     *
    Registered: Wed Dec 31 11:36:14 UTC 2025
    - Last Modified: Thu Dec 25 16:18:05 UTC 2025
    - 5.6K bytes
    - Viewed (0)
  3. docs/en/docs/management.md

    ## Team
    
    There's a team of people that help manage and maintain the project. 😎
    
    They have different levels of permissions and [specific instructions](./management-tasks.md){.internal-link target=_blank}.
    
    Some of the tasks they can perform include:
    
    * Adding labels to PRs.
    * Editing PR titles.
    * Adding commits on top of PRs to tweak them.
    Registered: Sun Dec 28 07:19:09 UTC 2025
    - Last Modified: Wed Jul 31 14:09:15 UTC 2024
    - 1.7K bytes
    - Viewed (0)
  4. docs/sts/ldap.md

    - find accounts whose group memberships have changed; access policies available to a credential are updated to reflect the change, i.e. they will lose any privileges associated with a group they are removed from, and gain any privileges associated with a group they are added to.
    
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Tue Aug 12 18:20:36 UTC 2025
    - 18.9K bytes
    - Viewed (0)
  5. docs/zh-hant/llm-prompt.md

    2) Do not add trailing punctuation to headings.
    
    ### Quotes and punctuation
    
    1) Keep punctuation style consistent with existing Traditional Chinese docs (they often mix English terms like “FastAPI” with Chinese text).
    2) Never change punctuation inside inline code, code blocks, URLs, or file paths.
    Registered: Sun Dec 28 07:19:09 UTC 2025
    - Last Modified: Sat Dec 27 18:49:46 UTC 2025
    - 2.2K bytes
    - Viewed (0)
  6. okhttp-tls/src/main/kotlin/okhttp3/tls/HandshakeCertificates.kt

     *
     * ### Server Authentication
     *
     * This is the most common form of TLS authentication: clients verify that servers are trusted and
     * that they own the hostnames that they represent. Server authentication is required.
     *
     * To perform server authentication:
     *
     *  * The server's handshake certificates must have a [held certificate][HeldCertificate] (a
    Registered: Fri Dec 26 11:42:13 UTC 2025
    - Last Modified: Sat May 10 11:15:14 UTC 2025
    - 8.4K bytes
    - Viewed (0)
  7. src/main/java/jcifs/smb/NtlmPasswordAuthentication.java

         * their caseless domain and username fields are equal and either both hashes are external and they are equal or
         * both internally supplied passwords are equal. If one {@code NtlmPasswordAuthentication} object has external
         * hashes (meaning negotiated via NTLM HTTP Authentication) and the other does not they will not be equal. This is
    Registered: Sat Dec 20 13:44:44 UTC 2025
    - Last Modified: Sat Aug 30 05:58:03 UTC 2025
    - 9.3K bytes
    - Viewed (0)
  8. SECURITY.md

    If you need to run untrusted models, execute them inside a
    [**sandbox**](https://developers.google.com/code-sandboxing). Memory corruptions
    in TensorFlow ops can be recognized as security issues only if they are
    reachable and exploitable through production-grade, benign models.
    
    ### Compilation
    
    Compiling models via the recommended entry points described in
    [XLA](https://www.tensorflow.org/xla) and
    Registered: Tue Dec 30 12:39:10 UTC 2025
    - Last Modified: Wed Oct 16 16:10:43 UTC 2024
    - 9.6K bytes
    - Viewed (0)
  9. guava/src/com/google/common/collect/ForwardingSortedSet.java

     * violate the {@code Set} contract.
     *
     * <p>The {@code standard} methods and the collection views they return are not guaranteed to be
     * thread-safe, even when all of the methods that they depend on are thread-safe.
     *
     * @author Mike Bostock
     * @author Louis Wasserman
     * @since 2.0
     */
    @GwtCompatible
    /*
    Registered: Fri Dec 26 12:43:10 UTC 2025
    - Last Modified: Wed Feb 12 16:28:01 UTC 2025
    - 5.7K bytes
    - Viewed (0)
  10. docs/en/docs/advanced/security/index.md

    ///
    
    ## Read the Tutorial first { #read-the-tutorial-first }
    
    The next sections assume you already read the main [Tutorial - User Guide: Security](../../tutorial/security/index.md){.internal-link target=_blank}.
    
    Registered: Sun Dec 28 07:19:09 UTC 2025
    - Last Modified: Sun Aug 31 09:15:41 UTC 2025
    - 708 bytes
    - Viewed (0)
Back to top