Search Options

Results per page
Sort
Preferred Languages
Advance

Results 421 - 430 of 4,686 for uses (0.05 sec)

  1. ci/devinfra/docker/windows/Dockerfile

    # NOTE: This Dockerfile is no longer in use.
    # It is kept just in case, but it's recommended to use the 2022 version,
    # and that is what internal CI uses as well.
    
    # This Dockerfile creates an image that has:
    # - the correct MTU setting for networking from inside the container to work.
    # - Visual Studio 2022 Build Tools
    # - MSVC 14.39
    # - LLVM/Clang 18.1.4
    # - MSYS2 + curl, git, patch, vim, unzip, zip
    # - Python 3.12.3
    # - Bazelisk 1.19.0
    Registered: Tue Dec 30 12:39:10 UTC 2025
    - Last Modified: Fri Jan 17 16:35:57 UTC 2025
    - 8.4K bytes
    - Viewed (0)
  2. compat/maven-model-builder/src/test/java/org/apache/maven/model/inheritance/DefaultInheritanceAssemblerTest.java

         * Model interpolation does not give same result when calculated from build or from repo...
         * This is why MNG-5000 fix in code is marked as bad practice (uses file names)
         * @throws IOException Model read problem
         */
        @Test
        void testFlatTrickyUrls() throws IOException {
            // parent references child with artifactId (which is not directory name)
    Registered: Sun Dec 28 03:35:09 UTC 2025
    - Last Modified: Wed Sep 17 10:01:14 UTC 2025
    - 8.2K bytes
    - Viewed (0)
  3. android/guava/src/com/google/common/collect/CompactHashing.java

      /** Default size of a compact hash-based collection. */
      static final int DEFAULT_SIZE = 3;
    
      /**
       * Minimum size of the hash table of a compact hash-based collection. Because small hash tables
       * use a byte[], any smaller size uses the same amount of memory due to object padding.
       */
      private static final int MIN_HASH_TABLE_SIZE = 4;
    
      private static final int BYTE_MAX_SIZE = 1 << Byte.SIZE; // 2^8 = 256
    Registered: Fri Dec 26 12:43:10 UTC 2025
    - Last Modified: Mon Aug 11 19:31:30 UTC 2025
    - 7K bytes
    - Viewed (0)
  4. docs/en/docs/deployment/manually.md

    # Run a Server Manually { #run-a-server-manually }
    
    ## Use the `fastapi run` Command { #use-the-fastapi-run-command }
    
    In short, use `fastapi run` to serve your FastAPI application:
    
    <div class="termy">
    
    ```console
    $ <font color="#4E9A06">fastapi</font> run <u style="text-decoration-style:solid">main.py</u>
    
      <span style="background-color:#009485"><font color="#D3D7CF"> FastAPI </font></span>  Starting production server 🚀
    
    Registered: Sun Dec 28 07:19:09 UTC 2025
    - Last Modified: Sat Oct 11 17:48:49 UTC 2025
    - 6.9K bytes
    - Viewed (0)
  5. android/guava/src/com/google/common/util/concurrent/FuturesGetChecked.java

        return GetCheckedTypeValidatorHolder.WeakSetValidator.INSTANCE;
      }
    
      /**
       * Provides a check of whether an exception type is valid for use with {@link
       * FuturesGetChecked#getChecked(Future, Class)}, possibly using caching.
       *
       * <p>Uses reflection to gracefully fall back to when certain implementations aren't available.
       */
      private static final class GetCheckedTypeValidatorHolder {
    Registered: Fri Dec 26 12:43:10 UTC 2025
    - Last Modified: Sat Aug 09 01:14:59 UTC 2025
    - 10.2K bytes
    - Viewed (0)
  6. guava/src/com/google/common/collect/TreeMultimap.java

     * by supplied comparators. In all cases, this implementation uses {@link Comparable#compareTo} or
     * {@link Comparator#compare} instead of {@link Object#equals} to determine equivalence of
     * instances.
     *
     * <p><b>Warning:</b> The comparators or comparables used must be <i>consistent with equals</i> as
    Registered: Fri Dec 26 12:43:10 UTC 2025
    - Last Modified: Thu Aug 07 16:05:33 UTC 2025
    - 8.5K bytes
    - Viewed (0)
  7. src/main/java/org/codelibs/fess/suggest/concurrent/Deferred.java

     *   The Promise class has then and error methods that allow you to register callbacks
     *   for successful and unsuccessful computations, respectively.
     * </p>
     *
     * <p>
     *   The Deferred class uses a CountDownLatch to allow you to wait for the computation to complete.
     *   The resolve and reject methods decrement the CountDownLatch, allowing the getResponse method
     *   to return the result of the computation.
     * </p>
     *
    Registered: Sat Dec 20 13:04:59 UTC 2025
    - Last Modified: Fri Jul 04 14:00:23 UTC 2025
    - 7.8K bytes
    - Viewed (0)
  8. src/test/java/jcifs/smb1/util/LogStreamTest.java

            // Test setting a custom instance
            LogStream.setInstance(testStream);
            LogStream instance = LogStream.getInstance();
            assertNotNull(instance);
    
            // Write something to verify it uses our test stream
            instance.println("test message");
            instance.flush();
            String output = testOutput.toString();
            assertTrue(output.contains("test message"));
        }
    
        @Test
    Registered: Sat Dec 20 13:44:44 UTC 2025
    - Last Modified: Thu Aug 14 05:31:44 UTC 2025
    - 8.3K bytes
    - Viewed (0)
  9. src/main/java/org/codelibs/core/convert/TimeConversionUtil.java

     * </p>
     * <p>
     * If the source object is an instance of {@link Date}, {@link Calendar}, or {@link Time},
     * the conversion uses their millisecond value to create the target object.
     * For other types, the conversion uses the string representation of the source object.
     * </p>
     * <p>
     * If no pattern is specified, the pattern used for conversion depends on the locale as follows:
     * </p>
     * <table border="1">
     * <caption>Conversion Patterns</caption>
    Registered: Sat Dec 20 08:55:33 UTC 2025
    - Last Modified: Thu Jul 31 08:16:49 UTC 2025
    - 20.3K bytes
    - Viewed (0)
  10. okhttp/src/jvmTest/kotlin/okhttp3/internal/tls/CertificatePinnerChainValidationTest.kt

       * ```
       *
       * The attacker compromises a CA. They take the public key from an intermediate certificate
       * signed by the compromised CA's certificate and uses it in a non-CA certificate. They ask the
       * pinned CA above to sign it for non-certificate-authority uses:
       *
       * ```
       *   pinnedRoot (trusted by CertificatePinner)
       *     -> pinnedIntermediate (trusted by CertificatePinner)
       *         -> attackerSwitch
    Registered: Fri Dec 26 11:42:13 UTC 2025
    - Last Modified: Fri Jun 20 11:46:46 UTC 2025
    - 24.3K bytes
    - Viewed (2)
Back to top