Search Options

Results per page
Sort
Preferred Languages
Advance

Results 531 - 540 of 4,568 for Chat (0.04 sec)

  1. VULNERABILITY_REPORT.md

    Therefore, it lists pre-conditions and actions that should be performed to
    resolve and fix a reported vulnerability.
    
    ## Vulnerability Management Process
    
    The vulnerability management process requires that the vulnerability report
    contains the following information:
    
    - The project / component that contains the reported vulnerability.
    - A description of the vulnerability. In particular, the type of the
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Sat Feb 12 00:51:25 UTC 2022
    - 1.5K bytes
    - Viewed (0)
  2. guava/src/com/google/common/primitives/ImmutableIntArray.java

          if (object instanceof AsList) {
            AsList that = (AsList) object;
            return this.parent.equals(that.parent);
          }
          // We could delegate to super now but it would still box too much
          if (!(object instanceof List)) {
            return false;
          }
          List<?> that = (List<?>) object;
          if (this.size() != that.size()) {
            return false;
          }
          int i = parent.start;
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Fri Oct 25 18:05:56 UTC 2024
    - 21.4K bytes
    - Viewed (0)
  3. docs/features/https.md

     * `RESTRICTED_TLS` is a secure configuration, intended to meet stricter compliance requirements.
     * `MODERN_TLS` is a secure configuration that connects to modern HTTPS servers.
     * `COMPATIBLE_TLS` is a secure configuration that connects to secure–but not current–HTTPS servers.
     * `CLEARTEXT` is an insecure configuration that is used for `http://` URLs.
    
    Registered: Fri Nov 01 11:42:11 UTC 2024
    - Last Modified: Sat Dec 24 00:16:30 UTC 2022
    - 10.5K bytes
    - Viewed (0)
  4. guava/src/com/google/common/util/concurrent/Striped.java

     * lock.
     *
     * <p>The guarantee provided by this class is that equal keys lead to the same lock (or semaphore),
     * i.e. {@code if (key1.equals(key2))} then {@code striped.get(key1) == striped.get(key2)} (assuming
     * {@link Object#hashCode()} is correctly implemented for the keys). Note that if {@code key1} is
     * <strong>not</strong> equal to {@code key2}, it is <strong>not</strong> guaranteed that {@code
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Wed Jun 26 12:58:35 UTC 2024
    - 20.6K bytes
    - Viewed (0)
  5. fastapi/security/oauth2.py

            return data
        ```
    
        Note that for OAuth2 the scope `items:read` is a single scope in an opaque string.
        You could have custom internal logic to separate it by colon characters (`:`) or
        similar, and get the two parts `items` and `read`. Many applications do that to
        group and organize permissions, you could do it as well in your application, just
        know that that it is application specific, it's not part of the specification.
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Wed Oct 23 18:30:18 UTC 2024
    - 21.1K bytes
    - Viewed (0)
  6. guava/src/com/google/common/util/concurrent/MoreExecutors.java

      }
    
      /**
       * Returns an {@link Executor} that runs each task executed sequentially, such that no two tasks
       * are running concurrently.
       *
       * <p>{@linkplain Executor#execute executed} tasks have a happens-before order as defined in the
       * Java Language Specification. Tasks execute with the same happens-before order that the function
       * calls to {@link Executor#execute execute()} that submitted those tasks had.
       *
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Sat Oct 19 00:51:36 UTC 2024
    - 44.1K bytes
    - Viewed (0)
  7. CHANGELOG/CHANGELOG-1.22.md

        - [<code>CSIMigrationvSphere</code> feature gate has not migrated to new CRD APIs](#csimigrationvsphere-feature-gate-has-not-migrated-to-new-crd-apis)
        - [Workloads that saturate nodes with pods may see pods that fail due to node admission](#workloads-that-saturate-nodes-with-pods-may-see-pods-that-fail-due-to-node-admission)
        - [Etcd v3.5.[0-2] data corruption](#etcd-v350-2-data-corruption)
      - [Urgent Upgrade Notes](#urgent-upgrade-notes)
    Registered: Fri Nov 01 09:05:11 UTC 2024
    - Last Modified: Tue Dec 13 12:43:45 UTC 2022
    - 454.1K bytes
    - Viewed (0)
  8. compat/maven-settings-builder/src/main/java/org/apache/maven/settings/building/SettingsProblem.java

     * under the License.
     */
    package org.apache.maven.settings.building;
    
    /**
     * Describes a problem that was encountered during settings building. A problem can either be an exception that was
     * thrown or a simple string message. In addition, a problem carries a hint about its source, e.g. the settings file
     * that exhibits the problem.
     *
     * @deprecated since 4.0.0, use {@link org.apache.maven.api.services.SettingsBuilder} instead
     */
    Registered: Sun Nov 03 03:35:11 UTC 2024
    - Last Modified: Fri Oct 25 12:31:46 UTC 2024
    - 3.5K bytes
    - Viewed (0)
  9. android/guava/src/com/google/common/collect/Range.java

     * endpoint) or <i>closed</i> (includes the endpoint) on that side. With three possibilities on each
     * side, this yields nine basic types of ranges, enumerated below. (Notation: a square bracket
     * ({@code [ ]}) indicates that the range is closed on that side; a parenthesis ({@code ( )}) means
     * it is either open or unbounded. The construct {@code {x | statement}} is read "the set of all
     * <i>x</i> such that <i>statement</i>.")
     *
     * <blockquote>
     *
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Wed Oct 16 17:21:56 UTC 2024
    - 27.8K bytes
    - Viewed (0)
  10. android/guava/src/com/google/common/net/InternetDomainName.java

       * Internet users can register subdomains. An example of a public suffix that is not a registry
       * suffix is {@code blogspot.com}. Note that it is true that all public suffixes <i>have</i>
       * registry suffixes, since domain name registries collectively control all internet domain names.
       *
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Mon Feb 05 20:47:23 UTC 2024
    - 28K bytes
    - Viewed (0)
Back to top