Search Options

Results per page
Sort
Preferred Languages
Advance

Results 11 - 20 of 84 for restrictions (0.13 sec)

  1. LICENSE

      All other non-permissive additional terms are considered "further
    restrictions" within the meaning of section 10.  If the Program as you
    received it, or any part of it, contains a notice stating that it is
    governed by this License along with a term that is a further
    restriction, you may remove that term.  If a license document contains
    a further restriction but permits relicensing or conveying under this
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Fri Apr 23 18:58:53 UTC 2021
    - 33.7K bytes
    - Viewed (0)
  2. apache-maven/src/main/appended-resources/licenses/CDDL+GPLv2-with-classpath-exception.txt

    want it, that you can change the software or use pieces of it in new
    free programs; and that you know you can do these things.
    
    To protect your rights, we need to make restrictions that forbid anyone
    to deny you these rights or to ask you to surrender the rights. These
    restrictions translate to certain responsibilities for you if you
    distribute copies of the software, or if you modify it.
    
    Registered: Sun Nov 03 03:35:11 UTC 2024
    - Last Modified: Fri May 17 19:14:22 UTC 2024
    - 38.5K bytes
    - Viewed (0)
  3. docs/en/docs/tutorial/security/oauth2-jwt.md

    OAuth2 has the notion of "scopes".
    
    You can use them to add a specific set of permissions to a JWT token.
    
    Then you can give this token to a user directly or a third party, to interact with your API with a set of restrictions.
    
    You can learn how to use them and how they are integrated into **FastAPI** later in the **Advanced User Guide**.
    
    ## Recap
    
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Sat Oct 26 11:45:10 UTC 2024
    - 12.8K bytes
    - Viewed (0)
  4. doc/go_mem.html

    is documented in the “Synchronization” section below.
    Individual packages are responsible for providing similar documentation
    for their own operations.
    </p>
    
    <h2 id="restrictions">Implementation Restrictions for Programs Containing Data Races</h2>
    
    <p>
    The preceding section gave a formal definition of data-race-free program execution.
    Registered: Tue Nov 05 11:13:11 UTC 2024
    - Last Modified: Mon Mar 04 15:54:42 UTC 2024
    - 26.6K bytes
    - Viewed (0)
  5. docs/LICENSE

                   receives an offer from the Licensor to exercise the
                   Licensed Rights under the terms and conditions of this
                   Public License.
    
                b. No downstream restrictions. You may not offer or impose
                   any additional or different terms or conditions on, or
                   apply any Effective Technological Measures to, the
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Mon May 10 16:50:06 UTC 2021
    - 18.2K bytes
    - Viewed (0)
  6. tensorflow/c/c_test_util.cc

      values[0] = v;
      return TF_NewTensor(TF_FLOAT, nullptr, 0, values, num_bytes,
                          &FloatDeallocator, nullptr);
    }
    
    // All the *Helper methods are used as a workaround for the restrictions that
    // one cannot call ASSERT_* methods in non-void-returning functions (when
    // exceptions are disabled during compilation)
    void PlaceholderHelper(TF_Graph* graph, TF_Status* s, const char* name,
    Registered: Tue Nov 05 12:39:12 UTC 2024
    - Last Modified: Fri Oct 15 03:16:52 UTC 2021
    - 17.8K bytes
    - Viewed (0)
  7. docs/en/docs/deployment/concepts.md

    * Handled internally by a cloud provider as part of their services (read below 👇)
    
    Another option is that you could use a **cloud service** that does more of the work including setting up HTTPS. It could have some restrictions or charge you more, etc. But in that case, you wouldn't have to set up a TLS Termination Proxy yourself.
    
    I'll show you some concrete examples in the next chapters.
    
    ---
    
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Wed Sep 18 16:09:57 UTC 2024
    - 17.8K bytes
    - Viewed (0)
  8. okhttp/src/main/kotlin/okhttp3/OkHttpClient.kt

        /**
         * Configure a single client scoped listener that will receive all analytic events for this
         * client.
         *
         * @see EventListener for semantics and restrictions on listener implementations.
         */
        fun eventListener(eventListener: EventListener) =
          apply {
            this.eventListenerFactory = eventListener.asFactory()
          }
    
        /**
    Registered: Fri Nov 01 11:42:11 UTC 2024
    - Last Modified: Sat Apr 06 04:21:33 UTC 2024
    - 52K bytes
    - Viewed (0)
  9. compat/maven-artifact/src/main/java/org/apache/maven/artifact/versioning/Restriction.java

                return true;
            }
    
            if (!(other instanceof Restriction)) {
                return false;
            }
    
            Restriction restriction = (Restriction) other;
            if (lowerBound != null) {
                if (!lowerBound.equals(restriction.lowerBound)) {
                    return false;
                }
            } else if (restriction.lowerBound != null) {
                return false;
            }
    
    Registered: Sun Nov 03 03:35:11 UTC 2024
    - Last Modified: Fri Oct 25 12:31:46 UTC 2024
    - 4.3K bytes
    - Viewed (0)
  10. cmd/bucket-handlers.go

    			errAPI.Description = fmt.Sprintf("%s '(%s)'", errAPI.Description, err)
    			writeErrorResponse(ctx, w, errAPI, r.URL)
    			return
    		}
    
    		// Make sure formValues adhere to policy restrictions.
    		if err = checkPostPolicy(formValues, postPolicyForm); err != nil {
    			writeErrorResponse(ctx, w, errorCodes.ToAPIErrWithErr(ErrAccessDenied, err), r.URL)
    			return
    		}
    
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Thu Sep 12 12:24:04 UTC 2024
    - 63.4K bytes
    - Viewed (0)
Back to top