- Sort Score
- Result 10 results
- Languages All
Results 1011 - 1020 of 2,564 for when (2.61 sec)
-
architecture/standards/0002-avoid-using-java-serialization.md
For internal purposes, we use binary formats for their brevity. We use the `Serializer` abstraction to separate the actual implementation of serialization from its uses. When sharing data with external tools, we use JSON. ## Status ACCEPTED ## Consequences * The configuration cache serialization infrastructure should be used for all serialization.
Registered: Wed Nov 06 11:36:14 UTC 2024 - Last Modified: Thu Feb 29 22:32:18 UTC 2024 - 2.3K bytes - Viewed (0) -
licenses/sigs.k8s.io/yaml/goyaml.v3/LICENSE
#### MIT License #### The following files were ported to Go from C files of libyaml, and thus are still covered by their original MIT license, with the additional copyright staring in 2011 when the project was ported over: apic.go emitterc.go parserc.go readerc.go scannerc.go writerc.go yamlh.go yamlprivateh.go Copyright (c) 2006-2010 Kirill Simonov Copyright (c) 2006-2011 Kirill Simonov
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Tue Oct 31 19:53:28 UTC 2023 - 2.1K bytes - Viewed (0) -
android/guava-tests/test/com/google/common/io/ByteSourceTest.java
assertCorrectSlice(100, 100, 10, 0); assertCorrectSlice(100, 101, 10, 0); } /** * Tests that the default slice() behavior is correct when the source is sliced starting at an * offset that is greater than the current length of the source, a stream is then opened to that * source, and finally additional bytes are appended to the source before the stream is read. *
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Sat Oct 19 00:26:48 UTC 2024 - 15.4K bytes - Viewed (0) -
doc/asm.html
</p> <p> If a vector instruction takes a length or an index as an argument then it will be the first argument. For example, <code>VLEIF</code> <code>$1,</code> <code>$16,</code> <code>V2</code> will load the value sixteen into index one of <code>V2</code>. Care should be taken when using vector instructions to ensure that they are available at runtime.
Registered: Tue Nov 05 11:13:11 UTC 2024 - Last Modified: Tue Nov 28 19:15:27 UTC 2023 - 36.3K bytes - Viewed (0) -
buildSrc/src/main/kotlin/Osgi.kt
BundleTaskExtension::class.java, jarTask, ) bundleExtension.run { setClasspath(osgi.compileClasspath + sourceSets["main"].compileClasspath) bnd(*bndProperties) } // Call the convention when the task has finished, to modify the jar to contain OSGi metadata. jarTask.doLast { bundleExtension.buildAction().execute(this) } } val Project.sourceSets: SourceSetContainer
Registered: Fri Nov 01 11:42:11 UTC 2024 - Last Modified: Sat Jan 20 10:30:28 UTC 2024 - 2.2K bytes - Viewed (0) -
cmd/global-heal.go
tracker.setBucket(bucket) // Heal current bucket again in case if it is failed // in the beginning of erasure set healing if err := bgSeq.healBucket(objAPI, bucket, true); err != nil { // Set this such that when we return this function // we let the caller retry this disk again for the // buckets that failed healing. retErr = err healingLogIf(ctx, err) continue } var (
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Sat Oct 26 09:58:27 UTC 2024 - 16.3K bytes - Viewed (0) -
okhttp-testing-support/src/main/kotlin/okhttp3/internal/RecordingOkAuthenticator.kt
): Request? { if (route == null) throw NullPointerException("route == null") responses += response routes += route if (!schemeMatches(response) || credential == null) return null val header = when (response.code) { 407 -> "Proxy-Authorization" else -> "Authorization" } return response.request.newBuilder() .addHeader(header, credential) .build() }
Registered: Fri Nov 01 11:42:11 UTC 2024 - Last Modified: Mon Jan 08 01:13:22 UTC 2024 - 1.7K bytes - Viewed (0) -
api/maven-api-meta/src/main/java/org/apache/maven/api/annotations/Nonnull.java
import java.lang.annotation.RetentionPolicy; import java.lang.annotation.Target; /** * The annotated element must not be null. * <p> * Annotated fields must not be null after construction has completed. * <p> * When this annotation is applied to a method it applies to the method return value. * * @see Nullable * @since 4.0.0 */ @Experimental @Documented @Retention(RetentionPolicy.CLASS)
Registered: Sun Nov 03 03:35:11 UTC 2024 - Last Modified: Thu Mar 23 05:29:39 UTC 2023 - 1.4K bytes - Viewed (0) -
tests/test_tutorial/test_header_params/test_tutorial002_an.py
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Fri Jul 07 17:12:13 UTC 2023 - 4K bytes - Viewed (0) -
docs/en/docs/tutorial/security/oauth2-jwt.md
``` It is not encrypted, so, anyone could recover the information from the contents. But it's signed. So, when you receive a token that you emitted, you can verify that you actually emitted it. That way, you can create a token with an expiration of, let's say, 1 week. And then when the user comes back the next day with the token, you know that user is still logged in to your system.
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Sat Oct 26 11:45:10 UTC 2024 - 12.8K bytes - Viewed (0)