- Sort Score
- Result 10 results
- Languages All
Results 61 - 70 of 141 for onKeys (0.04 sec)
-
android/guava/src/com/google/common/util/concurrent/Service.java
*/ FAILED, } /** * A listener for the various state changes that a {@link Service} goes through in its lifecycle. * * <p>All methods are no-ops by default, implementors should override the ones they care about. * * @author Luke Sandberg * @since 15.0 (present as an interface in 13.0) */ abstract class Listener { /** Constructor for use by subclasses. */ public Listener() {}
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Sat Dec 21 03:10:51 UTC 2024 - 10.8K bytes - Viewed (0) -
SECURITY.md
`ModelServer` collates all computation graphs exposed to it (from multiple `SavedModel`) and executes them in parallel on available executors. Running TensorFlow in a multitenant design mixes the risks described above with the inherent ones from multitenant configurations. The primary areas of concern are tenant isolation, resource allocation, model sharing and hardware attacks. ### Tenant isolation
Registered: Tue Sep 09 12:39:10 UTC 2025 - Last Modified: Wed Oct 16 16:10:43 UTC 2024 - 9.6K bytes - Viewed (0) -
docs/en/docs/advanced/openapi-callbacks.md
So we are going to use that same knowledge to document how the *external API* should look like... by creating the *path operation(s)* that the external API should implement (the ones your API will call). /// tip When writing the code to document a callback, it might be useful to imagine that you are that *external developer*. And that you are currently implementing the *external API*, not *your API*.
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 09:15:41 UTC 2025 - 7.9K bytes - Viewed (0) -
docs/en/docs/advanced/generate-clients.md
* Response payloads. You would also have **inline errors** for everything. And whenever you update the backend code, and **regenerate** the frontend, it would have any new *path operations* available as methods, the old ones removed, and any other change would be reflected on the generated code. 🤓
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 09:15:41 UTC 2025 - 10.1K bytes - Viewed (1) -
guava/src/com/google/common/net/InetAddresses.java
* * <p>NOTE: ISATAP addresses are explicitly excluded from this method due to their trivial * spoofability. With other transition addresses spoofing involves (at least) infection of one's * BGP routing table. * * @param ip {@link Inet6Address} to be examined for embedded IPv4 client address * @return {@code true} if there is an embedded IPv4 client address * @since 7.0 */
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Wed Feb 19 21:24:11 UTC 2025 - 47.4K bytes - Viewed (0) -
okhttp/src/commonJvmAndroid/kotlin/okhttp3/internal/http/RetryAndFollowUpInterceptor.kt
// spec says that we may repeat the request without modifications. Modern browsers also // repeat the request (even non-idempotent ones.) if (!client.retryOnConnectionFailure) { // The application layer has directed us not to retry the request. return null } val requestBody = userResponse.request.body
Registered: Fri Sep 05 11:42:10 UTC 2025 - Last Modified: Tue May 27 14:58:02 UTC 2025 - 12.4K bytes - Viewed (0) -
docs/en/docs/deployment/concepts.md
I'll tell you a bit more about these **concepts** here, and that would hopefully give you the **intuition** you would need to decide how to deploy your API in very different environments, possibly even in **future** ones that don't exist yet. By considering these concepts, you will be able to **evaluate and design** the best way to deploy **your own APIs**.
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 09:15:41 UTC 2025 - 18.6K bytes - Viewed (0) -
guava/src/com/google/common/collect/RegularImmutableMap.java
// have this Entry. The value in the map becomes false when this first entry has been copied, so // we know not to copy the remaining ones. IdentityHashMap<Entry<K, V>, Boolean> duplicates = null; int dupCount = 0; for (int entryIndex = n - 1; entryIndex >= 0; entryIndex--) {
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Sat Aug 09 01:14:59 UTC 2025 - 15.8K bytes - Viewed (0) -
docs/security/README.md
- [AEAD](#aead): AES-256-GCM if the CPU supports AES-NI, ChaCha20-Poly1305 otherwise. More specifically AES-256-GCM is only selected for X86-64 CPUs with AES-NI extension. Further any secret key (apart from the KMS-generated ones) is 256 bits long. The KMS-generated keys may be 256 bits but this depends on the KMS capabilities and configuration.
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Wed Feb 26 09:25:50 UTC 2025 - 13.8K bytes - Viewed (0) -
src/test/java/jcifs/internal/smb2/create/Smb2CreateRequestTest.java
request.setPath("third\\path\\"); assertEquals("\\third\\path", request.getPath()); // Multiple leading backslashes - only first one gets stripped, then trailing ones get stripped // But getPath() adds a backslash at the beginning, so \\fourth\path\\ becomes \fourth\path\ request.setPath("\\\\fourth\\path\\\\"); assertEquals("\\\\fourth\\path\\", request.getPath());
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Thu Aug 14 07:14:38 UTC 2025 - 18.6K bytes - Viewed (0)