- Sort Score
- Result 10 results
- Languages All
Results 661 - 670 of 1,105 for Seed (0.05 sec)
-
cmd/batch-expire.go
// specified in the filter var match bool for k, v := range obj.UserDefined { if !stringsHasPrefixFold(k, "x-amz-meta-") && !isStandardHeader(k) { continue } // We only need to match x-amz-meta or standardHeaders if kv.Match(BatchJobKV{Key: k, Value: v}) { match = true } } if !match { return false } } }
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Wed Sep 18 17:59:03 UTC 2024 - 21.9K bytes - Viewed (0) -
src/bytes/buffer.go
// invalid usage. opReadRuneX constants are chosen such that // converted to int they correspond to the rune size that was read. type readOp int8 // Don't use iota for these, as the values need to correspond with the // names and comments, which is easier to see when being explicit. const ( opRead readOp = -1 // Any other read operation. opInvalid readOp = 0 // Non-read operation.
Registered: Tue Nov 05 11:13:11 UTC 2024 - Last Modified: Tue Oct 29 16:47:05 UTC 2024 - 15.7K bytes - Viewed (0) -
docs/en/docs/python-types.md
As Python advances, **newer versions** come with improved support for these type annotations and in many cases you won't even need to import and use the `typing` module to declare the type annotations. If you can choose a more recent version of Python for your project, you will be able to take advantage of that extra simplicity.
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Sat Oct 26 11:47:53 UTC 2024 - 16.7K bytes - Viewed (0) -
cmd/api-router.go
if err != nil { host = r.Host } // Make sure to skip matching minio.<domain>` this is // specifically meant for operator/k8s deployment // The reason we need to skip this is for a special // usecase where we need to make sure that // minio.<namespace>.svc.<cluster_domain> is ignored // by the bucketDNS style to ensure that path style // is available and honored at this domain. //
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Tue Aug 13 15:25:16 UTC 2024 - 23.1K bytes - Viewed (0) -
src/cmd/cgo/ast.go
f.Ref = make([]*Ref, 0, 8) } f.walk(ast2, ctxProg, (*File).validateIdents) f.walk(ast2, ctxProg, (*File).saveExprs) // Accumulate exported functions. // The comments are only on ast1 but we need to // save the function bodies from ast2. // The first walk fills in ExpFunc, and the // second walk changes the entries to // refer to ast2 instead. f.walk(ast1, ctxProg, (*File).saveExport)
Registered: Tue Nov 05 11:13:11 UTC 2024 - Last Modified: Mon Oct 14 15:47:06 UTC 2024 - 14.3K bytes - Viewed (0) -
docs/en/docs/help-fastapi.md
* Also don't worry about style rules, there are already automatized tools checking that. And if there's any other style or consistency need, I'll ask directly for that, or I'll add commits on top with the needed changes. ### Check the code * Check and read the code, see if it makes sense, **run it locally** and see if it actually solves the problem.
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Thu Aug 15 23:30:12 UTC 2024 - 13.7K bytes - Viewed (0) -
Makefile.core.mk
export ISTIO_BIN=$(GOBIN) # If we are running in the Linux build container on non Linux hosts, we add the # linux binaries to the build dependencies, BUILD_DEPS, which can be added to other targets # that would need the Linux binaries (ex. tests). BUILD_DEPS:= ifeq ($(IN_BUILD_CONTAINER),1) ifneq ($(GOOS_LOCAL),"linux") BUILD_DEPS += build-linux endif endif export ARTIFACTS ?= $(TARGET_OUT)
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Thu Oct 03 23:53:59 UTC 2024 - 18.4K bytes - Viewed (0) -
LICENSE
it if you want it; that you can change the software and use pieces of it in new free programs; and that you are informed that you can do these things. To protect your rights, we need to make restrictions that forbid distributors to deny you these rights or to ask you to surrender these rights. These restrictions translate to certain responsibilities for
Registered: Sun Nov 03 00:10:13 UTC 2024 - Last Modified: Mon Jan 18 20:25:38 UTC 2016 - 25.8K bytes - Viewed (0) -
android/guava/src/com/google/common/cache/Striped64.java
* needed. * * A single spinlock ("busy") is used for initializing and * resizing the table, as well as populating slots with new Cells. * There is no need for a blocking lock; when the lock is not * available, threads try other slots (or the base). During these * retries, there is increased contention and reduced locality, * which is still better than alternatives. *
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Fri Jun 14 17:55:55 UTC 2024 - 11.5K bytes - Viewed (0) -
SECURITY.md
computation [**graphs**](https://developers.google.com/machine-learning/glossary/#graph). Since models are practically programs that TensorFlow executes, using untrusted models or graphs is equivalent to running untrusted code. If you need to run untrusted models, execute them inside a [**sandbox**](https://developers.google.com/code-sandboxing). Memory corruptions in TensorFlow ops can be recognized as security issues only if they are
Registered: Tue Nov 05 12:39:12 UTC 2024 - Last Modified: Wed Oct 16 16:10:43 UTC 2024 - 9.6K bytes - Viewed (0)