- Sort Score
- Result 10 results
- Languages All
Results 1211 - 1220 of 3,106 for Call (0.02 sec)
-
docs/de/docs/deployment/https.md
In diesem Fall würde er das Zertifikat für `someapp.example.com` verwenden. <img src="/img/deployment/https/https03.svg"> Der Client **vertraut** bereits der Entität, die das TLS-Zertifikat generiert hat (in diesem Fall Let's Encrypt, aber wir werden später mehr darüber erfahren), sodass er **verifizieren** kann, dass das Zertifikat gültig ist.
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Tue Aug 06 04:48:30 UTC 2024 - 13.6K bytes - Viewed (0) -
cmd/endpoint-ellipses.go
endpoints []string // Endpoints saved from previous GetEndpoints(). setIndexes [][]uint64 // All the sets. } // Supported set sizes this is used to find the optimal // single set size. var setSizes = []uint64{2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16} // getDivisibleSize - returns a greatest common divisor of // all the ellipses sizes. func getDivisibleSize(totalSizes []uint64) (result uint64) {
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Wed Aug 14 17:11:51 UTC 2024 - 14.7K bytes - Viewed (0) -
src/main/java/jcifs/ACE.java
* mask of the ACE, the whole access check fails. If the ACE is an "allow" * ACE and <i>all</i> of the bits in the desired access bits match bits in * the access mask of the ACE, the access check is successful. Otherwise, * more ACEs are evaluated until all desired access bits (combined) * are "allowed". If all of the desired access bits are not "allowed" * the then same process is repeated for inherited ACEs. * <p>
Registered: Sun Nov 03 00:10:13 UTC 2024 - Last Modified: Sun Jul 01 13:12:10 UTC 2018 - 6.5K bytes - Viewed (0) -
src/test/java/jcifs/tests/TimeoutTest.java
@Override public Address[] getAllByName ( String hostname, boolean possibleNTDomainOrWorkgroup ) throws UnknownHostException { Address[] all = super.getAllByName(hostname, possibleNTDomainOrWorkgroup); return wrap(hostname, all); } @Override public Address getByName ( String hostname ) throws UnknownHostException {
Registered: Sun Nov 03 00:10:13 UTC 2024 - Last Modified: Sun Jul 01 13:12:10 UTC 2018 - 12.4K bytes - Viewed (0) -
common-protos/k8s.io/api/discovery/v1/generated.proto
// must handle different types of addresses in the context of their own // capabilities. This must contain at least one address but no more than // 100. These are all assumed to be fungible and clients may choose to only // use the first element. Refer to: https://issue.k8s.io/106267 // +listType=set repeated string addresses = 1;
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Mon Mar 11 18:43:24 UTC 2024 - 8K bytes - Viewed (0) -
common-protos/k8s.io/api/autoscaling/v2beta1/generated.proto
// targetAverageUtilization is the target value of the average of the // resource metric across all relevant pods, represented as a percentage of // the requested value of the resource for the pods. // +optional optional int32 targetAverageUtilization = 2; // targetAverageValue is the target value of the average of the // resource metric across all relevant pods, as a raw value (instead of as
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Mon Mar 11 18:43:24 UTC 2024 - 21.2K bytes - Viewed (0) -
common-protos/k8s.io/api/node/v1/generated.proto
} // RuntimeClass defines a class of container runtime supported in the cluster. // The RuntimeClass is used to determine which container runtime is used to run // all containers in a pod. RuntimeClasses are manually defined by a // user or cluster provisioner, and referenced in the PodSpec. The Kubelet is // responsible for resolving the RuntimeClassName reference before running the
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Mon Mar 11 18:43:24 UTC 2024 - 4.4K bytes - Viewed (0) -
LICENSE
"Licensor" shall mean the copyright owner or entity authorized by the copyright owner that is granting the License. "Legal Entity" shall mean the union of the acting entity and all other entities that control, are controlled by, or are under common control with that entity. For the purposes of this definition, "control" means (i) the power, direct or indirect, to cause the
Registered: Wed Nov 06 11:36:14 UTC 2024 - Last Modified: Tue Jan 23 11:07:23 UTC 2024 - 23.1K bytes - Viewed (0) -
CODE_OF_CONDUCT.md
## Enforcement Instances of abusive, harassing, or otherwise unacceptable behavior may be reported to the community leaders responsible for enforcement at . All complaints will be reviewed and investigated promptly and fairly. All community leaders are obligated to respect the privacy and security of the reporter of any incident. ## Enforcement Guidelines
Registered: Sun Nov 03 09:35:10 UTC 2024 - Last Modified: Thu Oct 17 06:18:13 UTC 2024 - 5K bytes - Viewed (0) -
ci/official/containers/linux_arm64/build.sh
#!/bin/bash # Copyright 2023 The TensorFlow Authors. All Rights Reserved. # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS,
Registered: Tue Nov 05 12:39:12 UTC 2024 - Last Modified: Thu Aug 01 15:44:57 UTC 2024 - 2.4K bytes - Viewed (0)