Search Options

Results per page
Sort
Preferred Languages
Advance

Results 751 - 760 of 1,329 for toen (0.04 sec)

  1. src/main/resources/fess_label_nl.properties

    labels.roleTypeIds=Rol-ID
    labels.scriptData=Script
    labels.scriptResult=Resultaat
    labels.scriptType=Uitvoeringstype
    labels.segmentation=Segmentatie
    labels.startTime=Starttijd
    labels.target=Doel
    labels.token=Token
    labels.synonymFile=Synoniembestand
    labels.stopwordsFile=Stopwoordenbestand
    labels.stemmerOverrideFile=Stemmer-overschrijvingsbestand
    labels.mappingFile=Mappingbestand
    labels.protwordsFile=Protwords-bestand
    Registered: Thu Sep 04 12:52:25 UTC 2025
    - Last Modified: Thu Jul 10 04:56:21 UTC 2025
    - 42.8K bytes
    - Viewed (1)
  2. docs/features/interceptors.md

    Interceptors can be chained. Suppose you have both a compressing interceptor and a checksumming interceptor: you'll need to decide whether data is compressed and then checksummed, or checksummed and then compressed. OkHttp uses lists to track interceptors, and interceptors are called in order.
    
    ![Interceptors Diagram](../assets/images/******@****.***)
    
    ### Application Interceptors
    
    Registered: Fri Sep 05 11:42:10 UTC 2025
    - Last Modified: Sun Feb 06 02:19:09 UTC 2022
    - 8.1K bytes
    - Viewed (0)
  3. cmd/common-main.go

    			if value := env.Get(config.EnvMinIOPrometheusExtraLabels, ""); value != "" {
    				os.Setenv("CONSOLE_PROMETHEUS_EXTRA_LABELS", value)
    			}
    		}
    		// Support Prometheus Auth Token
    		if value := env.Get(config.EnvMinIOPrometheusAuthToken, ""); value != "" {
    			os.Setenv("CONSOLE_PROMETHEUS_AUTH_TOKEN", value)
    		}
    	}
    	// Enable if LDAP is enabled.
    	if globalIAMSys.LDAPConfig.Enabled() {
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 32.5K bytes
    - Viewed (3)
  4. guava/src/com/google/common/collect/CompactHashMap.java

      // hashcode of 0x89abcdef. The imaginary `hash` value would then be the remaining top 25 bits,
      // 0x89abcd80. To this is added (or'd) the `next` value, which is an index within `entries`
      // (and therefore within `keys` and `values`) of another entry that has the same short hash
      // value. In our example, it would be another entry for a key whose short hash is also 0x6f.
      //
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Tue Jul 08 18:32:10 UTC 2025
    - 39.6K bytes
    - Viewed (0)
  5. cmd/object_api_suite_test.go

    		}
    	}
    	{
    		ctx, cancel := context.WithTimeout(context.Background(), time.Second*5)
    		defer cancel()
    		token := ""
    		for ctx.Err() == nil {
    			result, err := obj.ListObjectsV2(ctx, "bucket", "testPrefix", token, "", 2, false, "")
    			if err != nil {
    				t.Fatalf("%s: <ERROR> %s", instanceType, err)
    			}
    			token = result.NextContinuationToken
    			if len(result.Objects) == 0 {
    				break
    			}
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 34.5K bytes
    - Viewed (0)
  6. apache-maven/src/main/appended-resources/licenses/EPL-1.0.txt

    in any such claim at its own expense.
    
    For example, a Contributor might include the Program in a commercial product
    offering, Product X. That Contributor is then a Commercial Contributor. If
    that Commercial Contributor then makes performance claims, or offers warranties
    related to Product X, those performance claims and warranties are such Commercial
    Registered: Sun Sep 07 03:35:12 UTC 2025
    - Last Modified: Mon Sep 17 05:50:12 UTC 2018
    - 11.1K bytes
    - Viewed (0)
  7. src/main/java/org/codelibs/fess/crawler/interval/FessIntervalController.java

        }
    
        /**
         * Delays the crawler while waiting for new URLs to be available.
         * This method calibrates CPU load, checks crawler status, applies
         * interval control rules, and then calls the parent implementation.
         */
        @Override
        protected void delayForWaitingNewUrl() {
            ComponentUtil.getSystemHelper().calibrateCpuLoad();
            try {
    Registered: Thu Sep 04 12:52:25 UTC 2025
    - Last Modified: Thu Jul 17 08:28:31 UTC 2025
    - 4.3K bytes
    - Viewed (0)
  8. docs/en/docs/tutorial/dependencies/dependencies-in-path-operation-decorators.md

    It might also help avoid confusion for new developers that see an unused parameter in your code and could think it's unnecessary.
    
    ///
    
    /// info
    
    In this example we use invented custom headers `X-Key` and `X-Token`.
    
    But in real cases, when implementing security, you would get more benefits from using the integrated [Security utilities (the next chapter)](../security/index.md){.internal-link target=_blank}.
    
    ///
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 09:15:41 UTC 2025
    - 2.9K bytes
    - Viewed (0)
  9. docs/en/docs/tutorial/request-forms.md

    Make sure you create a [virtual environment](../virtual-environments.md){.internal-link target=_blank}, activate it, and then install it, for example:
    
    ```console
    $ pip install python-multipart
    ```
    
    ///
    
    ## Import `Form` { #import-form }
    
    Import `Form` from `fastapi`:
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 09:15:41 UTC 2025
    - 2.7K bytes
    - Viewed (0)
  10. Dockerfile.hotfix

        curl -s -q https://dl.min.io/client/mc/release/linux-${TARGETARCH}/mc.sha256sum -o /go/bin/mc.sha256sum && \
        chmod +x /go/bin/mc
    
    RUN if [ "$TARGETARCH" = "amd64" ]; then \
           curl -L -s -q https://github.com/moparisthebest/static-curl/releases/latest/download/curl-${TARGETARCH} -o /go/bin/curl; \
           chmod +x /go/bin/curl; \
        fi
    
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Wed Apr 09 14:28:39 UTC 2025
    - 3.1K bytes
    - Viewed (0)
Back to top