Search Options

Display Count
Sort
Preferred Language
Advanced Search

Results 641 - 644 of 644 for managed (0.07 seconds)

  1. RELEASE.md

            V2 but existing endpoint removals are only applied in V2.
        *   Deprecates behavior where device assignment overrides collocation
            constraints inside a collocation context manager.
    *   Keras & Python API
        *   Add to Keras functionality analogous to
            `tf.register_tensor_conversion_function`.
        *   Subclassed Keras models can now be saved through
    Created: Tue Apr 07 12:39:13 GMT 2026
    - Last Modified: Mon Mar 30 18:31:38 GMT 2026
    - 746.5K bytes
    - Click Count (3)
  2. doc/go_spec.html

    </p>
    
    <pre>
    panic(42)
    panic("unreachable")
    panic(Error("cannot parse"))
    </pre>
    
    <p>
    The <code>recover</code> function allows a program to manage behavior
    of a panicking goroutine.
    Suppose a function <code>G</code> defers a function <code>D</code> that calls
    <code>recover</code> and a panic occurs in a function on the same goroutine in which <code>G</code>
    Created: Tue Apr 07 11:13:11 GMT 2026
    - Last Modified: Wed Apr 01 23:39:18 GMT 2026
    - 287.8K bytes
    - Click Count (1)
  3. okhttp-idna-mapping-table/src/main/resources/okhttp3/internal/idna/IdnaMappingTable.txt

    13440..13455  ; valid                                  # 15.0 EGYPTIAN HIEROGLYPH MIRROR HORIZONTALLY..EGYPTIAN HIEROGLYPH MODIFIER DAMAGED
    13456..143FF  ; disallowed                             # NA   <reserved-13456>..<reserved-143FF>
    14400..14646  ; valid                                  # 8.0  ANATOLIAN HIEROGLYPH A001..ANATOLIAN HIEROGLYPH A530
    Created: Fri Apr 03 11:42:14 GMT 2026
    - Last Modified: Sat Feb 10 11:25:47 GMT 2024
    - 854.1K bytes
    - Click Count (0)
  4. lib/fips140/v1.0.0-c2097c7c.zip

    subtle.ConstantTimeByteEq(em[0], 0) seed := em[1 : hash.Size()+1] db := em[hash.Size()+1:] mgf1XOR(seed, mgfHash, db) mgf1XOR(db, mgfHash, seed) lHash2 := db[0:hash.Size()] // We have to validate the plaintext in constant time in order to avoid // attacks like: J. Manger. A Chosen Ciphertext Attack on RSA Optimal // Asymmetric Encryption Padding (OAEP) as Standardized in PKCS #1 // v2.0. In J. Kilian, editor, Advances in Cryptology. lHash2Good := subtle.ConstantTimeCompare(lHash, lHash2) // The remainder of the plaintext...
    Created: Tue Apr 07 11:13:11 GMT 2026
    - Last Modified: Thu Sep 25 19:53:19 GMT 2025
    - 642.7K bytes
    - Click Count (0)
Back to Top