- Sort Score
- Result 10 results
- Languages All
Results 521 - 530 of 1,182 for mare (0.16 sec)
-
android/guava/src/com/google/common/collect/SneakyThrows.java
@GwtCompatible final class SneakyThrows<T extends Throwable> { /** * Throws {@code t} as if it were an unchecked {@link Throwable}. * * <p>This method is useful primarily when we make a reflective call to a method with no {@code * throws} clause: Java forces us to handle an arbitrary {@link Throwable} from that method,
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Mon Dec 30 18:44:22 UTC 2024 - 2.4K bytes - Viewed (0) -
android/guava/src/com/google/common/util/concurrent/SneakyThrows.java
@GwtCompatible final class SneakyThrows<T extends Throwable> { /** * Throws {@code t} as if it were an unchecked {@link Throwable}. * * <p>This method is useful primarily when we make a reflective call to a method with no {@code * throws} clause: Java forces us to handle an arbitrary {@link Throwable} from that method,
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Mon Dec 30 18:44:22 UTC 2024 - 2.4K bytes - Viewed (0) -
src/main/java/org/codelibs/fess/app/web/admin/duplicatehost/EditForm.java
*/ @Required @Size(max = 1000) public String id; /** * The username of the user who last updated this duplicate host configuration. * Used for audit trail purposes to track who made changes. */ @Size(max = 1000) public String updatedBy; /** * The timestamp when this duplicate host configuration was last updated.
Registered: Thu Sep 04 12:52:25 UTC 2025 - Last Modified: Thu Jul 17 08:28:31 UTC 2025 - 2.4K bytes - Viewed (0) -
src/archive/zip/example_test.go
{"gopher.txt", "Gopher names:\nGeorge\nGeoffrey\nGonzo"}, {"todo.txt", "Get animal handling licence.\nWrite more examples."}, } for _, file := range files { f, err := w.Create(file.Name) if err != nil { log.Fatal(err) } _, err = f.Write([]byte(file.Body)) if err != nil { log.Fatal(err) } } // Make sure to check the error on Close. err := w.Close() if err != nil { log.Fatal(err) } }
Registered: Tue Sep 09 11:13:09 UTC 2025 - Last Modified: Wed Jan 27 00:22:03 UTC 2016 - 2K bytes - Viewed (0) -
docs/en/docs/advanced/websockets.md
If you need something easy to integrate with FastAPI but that is more robust, supported by Redis, PostgreSQL or others, check <a href="https://github.com/encode/broadcaster" class="external-link" target="_blank">encode/broadcaster</a>. /// ## More info { #more-info } To learn more about the options, check Starlette's documentation for:
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 09:15:41 UTC 2025 - 5.7K bytes - Viewed (0) -
cmd/os-instrumented.go
var m madmin.OSMetrics m.CollectedAt = time.Now() m.LifeTimeOps = make(map[string]uint64, osMetricLast) for i := range osMetricLast { if n := atomic.LoadUint64(&o.operations[i]); n > 0 { m.LifeTimeOps[i.String()] = n } } if len(m.LifeTimeOps) == 0 { m.LifeTimeOps = nil } m.LastMinute.Operations = make(map[string]madmin.TimedAction, osMetricLast) for i := range osMetricLast {
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 6.2K bytes - Viewed (0) -
CODE_OF_CONDUCT.md
which it occurs. All TensorFlow forums and spaces are meant for professional interactions, and any behavior which could reasonably be considered inappropriate in a professional setting is unacceptable. ## Our Responsibilities
Registered: Tue Sep 09 12:39:10 UTC 2025 - Last Modified: Fri Feb 05 18:43:16 UTC 2021 - 5.2K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.13.md
Registered: Fri Sep 05 09:05:11 UTC 2025 - Last Modified: Thu May 05 13:44:43 UTC 2022 - 273.1K bytes - Viewed (0) -
tests/preload_suits_test.go
Name string Level2 Level2 } ) DB.Migrator().DropTable(&Level3{}, &Level2{}, &Level1{}) if err := DB.AutoMigrate(&Level3{}, &Level2{}, &Level1{}); err != nil { t.Error(err) } want := make([]Level3, 2) want[0] = Level3{Level2: Level2{Level1: Level1{Value: "value"}}} if err := DB.Create(&want[0]).Error; err != nil { t.Error(err) } want[1] = Level3{Level2: Level2{Level1: Level1{Value: "value2"}}}
Registered: Sun Sep 07 09:35:13 UTC 2025 - Last Modified: Thu Jun 05 11:34:13 UTC 2025 - 30.4K bytes - Viewed (0) -
docs/en/docs/advanced/security/oauth2-scopes.md
The most common is the implicit flow. The most secure is the code flow, but it's more complex to implement as it requires more steps. As it is more complex, many providers end up suggesting the implicit flow. /// note It's common that each authentication provider names their flows in a different way, to make it part of their brand. But in the end, they are implementing the same OAuth2 standard. ///
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 10:49:48 UTC 2025 - 13.5K bytes - Viewed (0)