Search Options

Results per page
Sort
Preferred Languages
Advance

Results 71 - 80 of 327 for flow (0.04 sec)

  1. src/main/java/jcifs/audit/SecurityAuditLogger.java

                } else {
                    processLogEntry(entry);
                    returnAuditEntry(entry);
                }
    
            } catch (Exception e) {
                // Never let audit logging failure affect the main flow
                log.error("Failed to log audit event", e);
            }
        }
    
        private boolean checkRateLimit(EventType type) {
            String key = type.name();
    Registered: Sat Dec 20 13:44:44 UTC 2025
    - Last Modified: Sat Aug 30 05:58:03 UTC 2025
    - 26.6K bytes
    - Viewed (0)
  2. docs/smb3-features/03-multi-channel-design.md

            if (ipv6) {
                // IPv6 sockaddr_in6 structure
                writeInt2(buffer, offset, 23);  // AF_INET6
                writeInt2(buffer, offset + 2, 445);  // Port
                writeInt4(buffer, offset + 4, 0);  // Flow info
                System.arraycopy(address.getAddress(), 0, buffer, offset + 8, 16);
                writeInt4(buffer, offset + 24, 0);  // Scope ID
            } else {
                // IPv4 sockaddr_in structure
    Registered: Sat Dec 20 13:44:44 UTC 2025
    - Last Modified: Sat Aug 16 02:53:50 UTC 2025
    - 39.6K bytes
    - Viewed (0)
  3. RELEASE.md

    *   Add toggles `tf.enable_control_flow_v2()` and `tf.disable_control_flow_v2()`
        for enabling/disabling v2 control flow.
    *   Enable v2 control flow as part of `tf.enable_v2_behavior()` and
        `TF2_BEHAVIOR=1`.
    *   AutoGraph translates Python control flow into TensorFlow expressions,
        allowing users to write regular Python inside `tf.function`-decorated
    Registered: Tue Dec 30 12:39:10 UTC 2025
    - Last Modified: Tue Oct 28 22:27:41 UTC 2025
    - 740.4K bytes
    - Viewed (3)
  4. LICENSE

    the work, and the source code for shared libraries and dynamically
    linked subprograms that the work is specifically designed to require,
    such as by intimate data communication or control flow between those
    subprograms and other parts of the work.
    
      The Corresponding Source need not include anything that users
    can regenerate automatically from other parts of the Corresponding
    Source.
    
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Fri Apr 23 18:58:53 UTC 2021
    - 33.7K bytes
    - Viewed (0)
  5. cmd/utils.go

    	dexClient := http.Client{
    		CheckRedirect: checkRedirect,
    	}
    
    	u, err := url.Parse(authCodeURL)
    	if err != nil {
    		return "", fmt.Errorf("url parse err: %v", err)
    	}
    
    	// Start the user auth flow. This page would present the login with
    	// email or LDAP option.
    	req, err := http.NewRequestWithContext(ctx, http.MethodGet, u.String(), nil)
    	if err != nil {
    		return "", fmt.Errorf("new request err: %v", err)
    	}
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Sun Sep 28 20:59:21 UTC 2025
    - 33K bytes
    - Viewed (0)
  6. CHANGELOG.md

        security and performance.
    
     *  New: `ConnectionListener` publishes events for connects, disconnects, and use of pooled
        connections.
    
     *  Fix: Immediately update the connection's flow control window instead of waiting for the
        receiving stream to process it.
    
        This change may increase OkHttp's memory use for applications that make many concurrent HTTP
    Registered: Fri Dec 26 11:42:13 UTC 2025
    - Last Modified: Fri Dec 05 16:02:59 UTC 2025
    - 36.2K bytes
    - Viewed (2)
  7. doc/go_mem.html

    That execution must be consistent with the <i>sequenced before</i> relation,
    defined as the partial order requirements set out by the <a href="/ref/spec">Go language specification</a>
    for Go's control flow constructs as well as the <a href="/ref/spec#Order_of_evaluation">order of evaluation for expressions</a>.
    </p>
    
    <p>
    A Go <i>program execution</i> is modeled as a set of goroutine executions,
    Registered: Tue Dec 30 11:13:12 UTC 2025
    - Last Modified: Tue Aug 05 15:41:37 UTC 2025
    - 26.6K bytes
    - Viewed (0)
  8. CHANGELOG/CHANGELOG-1.32.md

      request. A resource is considered corrupt if it can not be successfully retrieved from the storage due to
      a) transformation error e.g. decryption failure, or b) the object failed to decode. Normal deletion flow is
      attempted first, and if it fails with a corrupt resource error then it triggers unsafe delete.
      In addition, when this feature is enabled, the 'details' field of 'Status' from the LIST response
    Registered: Fri Dec 26 09:05:12 UTC 2025
    - Last Modified: Tue Dec 16 18:27:41 UTC 2025
    - 448.1K bytes
    - Viewed (0)
  9. tensorflow/c/c_api.h

    // the corresponding function's output will equal to this input,
    // instead of the original node's output.
    //
    // Callers must also satisfy the following constraints:
    // - `inputs` cannot refer to TF_Outputs within a control flow context. For
    //   example, one cannot use the output of "switch" node as input.
    // - `inputs` and `outputs` cannot have reference types. Reference types are
    Registered: Tue Dec 30 12:39:10 UTC 2025
    - Last Modified: Thu Oct 26 21:08:15 UTC 2023
    - 82.3K bytes
    - Viewed (0)
  10. cmd/bucket-handlers.go

    	xMinIOErrDescHeader = "x-minio-error-desc"
    
    	postPolicyBucketTagging = "tagging"
    )
    
    // Check if there are buckets on server without corresponding entry in etcd backend and
    // make entries. Here is the general flow
    // - Range over all the available buckets
    // - Check if a bucket has an entry in etcd backend
    // -- If no, make an entry
    // -- If yes, check if the entry matches local IP check if we
    //
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Sun Sep 28 20:59:21 UTC 2025
    - 63.9K bytes
    - Viewed (0)
Back to top