- Sort Score
- Result 10 results
- Languages All
Results 181 - 190 of 4,574 for what (0.04 sec)
-
docs/en/docs/tutorial/background-tasks.md
**FastAPI** knows what to do in each case and how to reuse the same object, so that all the background tasks are merged together and are run in the background afterwards: {* ../../docs_src/background_tasks/tutorial002_an_py310.py hl[13,15,22,25] *}
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Sun Oct 27 15:22:48 UTC 2024 - 4.8K bytes - Viewed (0) -
LICENSE
you have the freedom to distribute copies of free software (and charge for this service if you wish); that you receive source code or can get it if you want it; that you can change the software and use pieces of it in new free programs; and that you are informed that you can do these things. To protect your rights, we need to make restrictions that forbid
Registered: Sun Nov 03 00:10:13 UTC 2024 - Last Modified: Mon Jan 18 20:25:38 UTC 2016 - 25.8K bytes - Viewed (0) -
cmd/object-api-datatypes.go
// used for the key-marker request parameter in a subsequent request. NextKeyMarker string // When a list is truncated, this element specifies the value that should be // used for the upload-id-marker request parameter in a subsequent request. NextUploadIDMarker string // Maximum number of multipart uploads that could have been included in the // response.
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Mon Jun 10 15:31:51 UTC 2024 - 20.9K bytes - Viewed (0) -
docs/contribute/code_of_conduct.md
witnesses, please include them as well. * Your account of what occurred, and if you believe the incident is ongoing. If there is a publicly available record (e.g. a mailing list archive or a public IRC logger), please include a link. * Any additional information that may be helpful. After filing a report, a representative from the Square Code of Conduct committee will contact you
Registered: Fri Nov 01 11:42:11 UTC 2024 - Last Modified: Sun Feb 06 02:19:09 UTC 2022 - 5.1K bytes - Viewed (0) -
common-protos/k8s.io/api/resource/v1alpha2/generated.proto
// DriverName defines the name of the dynamic resource driver that is // used for allocation of a ResourceClaim that uses this class. // // Resource drivers have a unique name in forward domain order // (acme.example.com). optional string driverName = 2; // ParametersRef references an arbitrary separate object that may hold // parameters that will be used by the driver when allocating a
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Mon Mar 11 18:43:24 UTC 2024 - 14.4K bytes - Viewed (0) -
src/main/java/jcifs/NetbiosAddress.java
* Microsoft Windows platform. A NetBIOS name can be 15 characters long * and hosts usually registers several names on the network. From a * Windows command prompt you can see * what names a host registers with the nbtstat command. * <p> * <blockquote> * * <pre> * C:\>nbtstat -a 192.168.1.15 * * NetBIOS Remote Machine Name Table * * Name Type Status
Registered: Sun Nov 03 00:10:13 UTC 2024 - Last Modified: Sun Jul 01 13:12:10 UTC 2018 - 6K bytes - Viewed (0) -
src/main/java/jcifs/smb1/smb1/Trans2FindFirst2Response.java
// e.eaSize = readInt4( buffer, bufferIndex + 64 ); // e.shortNameLength = buffer[bufferIndex + 68] & 0xFF; /* With NT, the shortName is in Unicode regardless of what is negotiated. */ // e.shortName = readString( buffer, bufferIndex + 70, e.shortNameLength ); e.filename = readString( buffer, bufferIndex + 94, e.fileNameLength );
Registered: Sun Nov 03 00:10:13 UTC 2024 - Last Modified: Fri Mar 22 21:10:40 UTC 2019 - 8.5K bytes - Viewed (0) -
compat/maven-compat/src/main/java/org/apache/maven/artifact/resolver/ArtifactResolutionRequest.java
private static final String LS = System.lineSeparator(); private Artifact artifact; // Needs to go away // These are really overrides now, projects defining dependencies for a plugin that override what is // specified in the plugin itself. private Set<Artifact> artifactDependencies; private ArtifactRepository localRepository; private List<ArtifactRepository> remoteRepositories;
Registered: Sun Nov 03 03:35:11 UTC 2024 - Last Modified: Fri Oct 25 12:31:46 UTC 2024 - 8.2K bytes - Viewed (0) -
docs/uk/docs/index.md
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Sun Oct 20 19:20:23 UTC 2024 - 24.2K bytes - Viewed (0) -
docs/en/docs/tutorial/security/oauth2-jwt.md
It is not encrypted, so, anyone could recover the information from the contents. But it's signed. So, when you receive a token that you emitted, you can verify that you actually emitted it. That way, you can create a token with an expiration of, let's say, 1 week. And then when the user comes back the next day with the token, you know that user is still logged in to your system.
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Sat Oct 26 11:45:10 UTC 2024 - 12.8K bytes - Viewed (0)