- Sort Score
- Result 10 results
- Languages All
Results 1421 - 1430 of 1,481 for Implements (0.06 sec)
-
android/guava-tests/test/com/google/common/collect/TableCollectorsTest.java
immutableCell("three", "tres", 3), immutableCell("two", "dos", 4)); } // This function specifically returns a BiPredicate, because Guava7’s Equivalence class does not // actually implement BiPredicate, and CollectorTests expects a BiPredicate. static <C, E extends @Nullable Object, R extends Iterable<E>> BiPredicate<C, C> pairwiseOnResultOf(Function<C, R> arg) {
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Thu Aug 07 16:05:33 UTC 2025 - 12.5K bytes - Viewed (0) -
android/guava/src/com/google/common/util/concurrent/Service.java
* states it cannot ever leave them. * * <p>Implementors of this interface are strongly encouraged to extend one of the abstract classes * in this package which implement this interface and make the threading and state management * easier. * * @author Jesse Wilson * @author Luke Sandberg * @since 9.0 (in 1.0 as {@code com.google.common.base.Service}) */Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Sat Dec 21 03:10:51 UTC 2024 - 10.8K bytes - Viewed (0) -
docs/en/docs/tutorial/security/simple-oauth2.md
You will get an "Inactive user" error, like: ```JSON { "detail": "Inactive user" } ``` ## Recap { #recap } You now have the tools to implement a complete security system based on `username` and `password` for your API. Using these tools, you can make the security system compatible with any database and with any user or data model.
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 09:15:41 UTC 2025 - 9.4K bytes - Viewed (0) -
SECURITY.md
unauthorized access to data or models, but also to prevent malicious users or tenants sending graphs to execute under another tenant’s identity. The isolation mechanisms are the responsibility of the users to design and implement, and therefore security issues deriving from their absence are not considered a vulnerability in TensorFlow. ### Resource allocation A denial of service caused by one model could bring down the entire server, but
Registered: Tue Sep 09 12:39:10 UTC 2025 - Last Modified: Wed Oct 16 16:10:43 UTC 2024 - 9.6K bytes - Viewed (0) -
src/main/java/org/codelibs/fess/job/ExecJob.java
* This class provides common functionality for job execution including process management, * logging configuration, JVM options, and timeout handling. * * <p>Subclasses must implement the abstract methods to define specific job behavior * and execution type identification.</p> * * @version 1.0 */ public abstract class ExecJob { /** Logger instance for this class */Registered: Thu Sep 04 12:52:25 UTC 2025 - Last Modified: Thu Aug 07 03:06:29 UTC 2025 - 14.2K bytes - Viewed (0) -
src/test/java/jcifs/internal/smb2/tree/Smb2TreeDisconnectRequestTest.java
int cmd2 = (int) commandField.get(req2); assertEquals(cmd1, cmd2); assertEquals(SMB2_TREE_DISCONNECT, cmd1); } @Test @DisplayName("Should properly implement wire format protocol") void testWireFormatProtocol() { // Given Configuration mockConfig = mock(Configuration.class); Smb2TreeDisconnectRequest request = new Smb2TreeDisconnectRequest(mockConfig);
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Thu Aug 14 05:31:44 UTC 2025 - 14.1K bytes - Viewed (0) -
docs/en/docs/advanced/security/oauth2-scopes.md
The most common is the implicit flow. The most secure is the code flow, but it's more complex to implement as it requires more steps. As it is more complex, many providers end up suggesting the implicit flow. /// note
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 10:49:48 UTC 2025 - 13.5K bytes - Viewed (0) -
docs/pt/docs/tutorial/first-steps.md
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Thu Jan 09 20:41:07 UTC 2025 - 10.8K bytes - Viewed (0) -
gorm.go
return } if config.TranslateError { if _, ok := db.Dialector.(ErrorTranslator); !ok { config.Logger.Warn(context.Background(), "The TranslateError option is enabled, but the Dialector %s does not implement ErrorTranslator.", db.Dialector.Name()) } } } if config.PrepareStmt { preparedStmt := NewPreparedStmtDB(db.ConnPool, config.PrepareStmtMaxSize, config.PrepareStmtTTL)Registered: Sun Sep 07 09:35:13 UTC 2025 - Last Modified: Tue Aug 26 06:24:29 UTC 2025 - 12.8K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.3.md
* Specifically the new controller watches the API server for scheduled pods. It processes each pod and ensures that any volumes that implement the volume Attacher interface are attached to the node their pod is scheduled to.
Registered: Fri Sep 05 09:05:11 UTC 2025 - Last Modified: Thu Dec 24 02:28:26 UTC 2020 - 84K bytes - Viewed (0)