- Sort Score
- Result 10 results
- Languages All
Results 1081 - 1090 of 1,227 for logger (0.18 sec)
-
docs/en/docs/advanced/generate-clients.md
The response object will also have autocompletion: <img src="/img/tutorial/generate-clients/image05.png"> ## FastAPI App with Tags In many cases your FastAPI app will be bigger, and you will probably use tags to separate different groups of *path operations*. For example, you could have a section for **items** and another section for **users**, and they could be separated by tags:
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Sun Oct 06 20:36:54 UTC 2024 - 10.7K bytes - Viewed (0) -
cmd/bucket-stats.go
bs.XferRateLrg.addSize(sz, duration) } else { bs.XferRateSml.addSize(sz, duration) } } // RMetricName - name of replication metric type RMetricName string const ( // Large - objects larger than 128MiB Large RMetricName = "Large" // Small - objects smaller than 128MiB Small RMetricName = "Small" // Total - metric pertaining to totals Total RMetricName = "Total" )
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Thu Sep 12 11:39:51 UTC 2024 - 13.4K bytes - Viewed (0) -
android/guava-tests/test/com/google/common/reflect/InvokableTest.java
@AndroidIncompatible // lots of failures, possibly some related to bad equals() implementations? public class InvokableTest extends TestCase { // Historically Invokable inherited from java.lang.reflect.AccessibleObject. That's no longer the // case, but we do check that its API still has the same public methods. We exclude some methods // that were added in Java 9 and that people probably weren't calling via Invokable, namely // `boolean canAccess(Object)`.
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Thu Oct 17 13:00:28 UTC 2024 - 30.7K bytes - Viewed (0) -
guava-tests/test/com/google/common/reflect/InvokableTest.java
@AndroidIncompatible // lots of failures, possibly some related to bad equals() implementations? public class InvokableTest extends TestCase { // Historically Invokable inherited from java.lang.reflect.AccessibleObject. That's no longer the // case, but we do check that its API still has the same public methods. We exclude some methods // that were added in Java 9 and that people probably weren't calling via Invokable, namely
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Thu Oct 17 13:00:28 UTC 2024 - 30.7K bytes - Viewed (0) -
docs/en/docs/tutorial/security/oauth2-jwt.md
That way, you can create a token with an expiration of, let's say, 1 week. And then when the user comes back the next day with the token, you know that user is still logged in to your system.
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Sat Oct 26 11:45:10 UTC 2024 - 12.8K bytes - Viewed (0) -
tensorflow/c/eager/c_api_experimental.h
// Creates a new TensorHandle from memory residing in the physical device // device_name. Takes ownership of the memory, and will call deleter to release // it after TF no longer needs it or in case of error. // // Custom devices must use TFE_NewCustomDeviceTensorHandle instead. TF_CAPI_EXPORT extern TFE_TensorHandle* TFE_NewTensorHandleFromDeviceMemory(
Registered: Tue Nov 05 12:39:12 UTC 2024 - Last Modified: Wed Feb 21 22:37:46 UTC 2024 - 39.5K bytes - Viewed (0) -
src/bytes/bytes_test.go
// test fallback to IndexRune {"oxoxoxoxoxoxoxoxoxoxox☺", "☺", 22}, // invalid UTF-8 byte sequence (must be longer than bytealg.MaxBruteForce to // test that we don't use IndexRune) {"xx0123456789012345678901234567890123456789012345678901234567890120123456789012345678901234567890123456xxx\xed\x9f\xc0", "\xed\x9f\xc0", 105}, }
Registered: Tue Nov 05 11:13:11 UTC 2024 - Last Modified: Mon Aug 19 19:09:04 UTC 2024 - 61.2K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.3.md
* Increase request timeout based on termination grace period ([#31275](https://github.com/kubernetes/kubernetes/pull/31275), [@dims](https://github.com/dims)) * Skip safe to detach check if node API object no longer exists ([#30737](https://github.com/kubernetes/kubernetes/pull/30737), [@saad-ali](https://github.com/saad-ali))
Registered: Fri Nov 01 09:05:11 UTC 2024 - Last Modified: Thu Dec 24 02:28:26 UTC 2020 - 84K bytes - Viewed (0) -
android/guava/src/com/google/common/hash/HashFunction.java
* are called <i>cryptographic hash functions</i>. But, whenever it is learned that either of * these feats has become computationally feasible, the function is deemed "broken" and should * no longer be used for secure purposes. (This is the likely eventual fate of <i>all</i> * cryptographic hashes.) * <li><b>fast:</b> perhaps self-explanatory, but often the most important consideration. * </ul> *
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Tue May 25 18:22:59 UTC 2021 - 10.9K bytes - Viewed (0) -
guava/src/com/google/common/hash/HashFunction.java
* are called <i>cryptographic hash functions</i>. But, whenever it is learned that either of * these feats has become computationally feasible, the function is deemed "broken" and should * no longer be used for secure purposes. (This is the likely eventual fate of <i>all</i> * cryptographic hashes.) * <li><b>fast:</b> perhaps self-explanatory, but often the most important consideration. * </ul> *
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Tue May 25 18:22:59 UTC 2021 - 10.9K bytes - Viewed (0)