- Sort Score
- Result 10 results
- Languages All
Results 1841 - 1850 of 3,743 for more (0.02 sec)
-
cmd/bucket-encryption-handlers.go
// This program is distributed in the hope that it will be useful // but WITHOUT ANY WARRANTY; without even the implied warranty of // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the // GNU Affero General Public License for more details. // // You should have received a copy of the GNU Affero General Public License // along with this program. If not, see <http://www.gnu.org/licenses/>. package cmd import ( "encoding/base64"
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri May 24 23:05:23 UTC 2024 - 6.4K bytes - Viewed (0) -
src/main/java/jcifs/SmbConstants.java
*/ int FLAGS2_UNICODE = 0x8000; /** * No capabilities. */ int CAP_NONE = 0x0000; /** * Raw mode transfers are supported capability. */ int CAP_RAW_MODE = 0x0001; /** * Multiplex mode is supported capability. */ int CAP_MPX_MODE = 0x0002; /** * Unicode strings are supported capability. */Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Sun Aug 24 00:49:49 UTC 2025 - 12.8K bytes - Viewed (0) -
docs/en/docs/tutorial/dependencies/dependencies-with-yield.md
## Execution of dependencies with `yield` { #execution-of-dependencies-with-yield } The sequence of execution is more or less like this diagram. Time flows from top to bottom. And each column is one of the parts interacting or executing code. ```mermaid sequenceDiagram participant client as ClientRegistered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 09:15:41 UTC 2025 - 12.7K bytes - Viewed (0) -
cmd/endpoint-ellipses.go
// This program is distributed in the hope that it will be useful // but WITHOUT ANY WARRANTY; without even the implied warranty of // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the // GNU Affero General Public License for more details. // // You should have received a copy of the GNU Affero General Public License // along with this program. If not, see <http://www.gnu.org/licenses/>. package cmd import ( "errors" "fmt"
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 14.6K bytes - Viewed (0) -
SECURITY.md
vulnerabilities. ## Security properties of execution modes TensorFlow has several execution modes, with Eager-mode being the default in v2. Eager mode lets users write imperative-style statements that can be easily inspected and debugged and it is intended to be used during the development phase. As part of the differences that make Eager mode easier to debug, the [shape inference
Registered: Tue Sep 09 12:39:10 UTC 2025 - Last Modified: Wed Oct 16 16:10:43 UTC 2024 - 9.6K bytes - Viewed (0) -
docs/changelogs/changelog_2x.md
connection takes more than 10 seconds to complete, you’ll need to adjust the timeouts manually. * **OkHttp now rejects request headers that contain invalid characters.** This includes potential security problems (newline characters) as well as simple non-ASCII characters (including international characters and emoji). * **Call canceling is more reliable.** We had a bug where a socket beingRegistered: Fri Sep 05 11:42:10 UTC 2025 - Last Modified: Sun Feb 06 02:19:09 UTC 2022 - 26.6K bytes - Viewed (0) -
cmd/bucket-object-lock.go
} ret := objectlock.GetObjectRetentionMeta(oi.UserDefined) if ret.Mode.Valid() { switch ret.Mode { case objectlock.RetCompliance: // In compliance mode, a protected object version can't be overwritten // or deleted by any user, including the root user in your AWS account. // When an object is locked in compliance mode, its retention mode can't // be changed, and its retention period can't be shortened. Compliance mode
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 08 02:38:25 UTC 2025 - 13.3K bytes - Viewed (0) -
src/main/java/jcifs/internal/smb1/com/SmbComNegotiateResponse.java
* but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU * Lesser General Public License for more details. * * You should have received a copy of the GNU Lesser General Public * License along with this library; if not, write to the Free Software * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Sat Aug 16 01:32:48 UTC 2025 - 15.8K bytes - Viewed (0) -
docs/contribute/code_of_conduct.md
disabilities. Reporting Issues ---------------- If you experience or witness unacceptable behavior — or have any other concerns — please report it by emailing [******@****.***][codeofconduct_at]. For more details, please see our Reporting Guidelines below. Thanks ------ Some of the ideas and wording for the statements and guidelines above were based on work by the
Registered: Fri Sep 05 11:42:10 UTC 2025 - Last Modified: Sun Feb 06 02:19:09 UTC 2022 - 5.1K bytes - Viewed (0) -
android/guava/src/com/google/common/collect/RegularImmutableTable.java
static <R, C, V> RegularImmutableTable<R, C, V> forOrderedComponents( ImmutableList<Cell<R, C, V>> cellList, ImmutableSet<R> rowSpace, ImmutableSet<C> columnSpace) { // use a dense table if more than half of the cells have values // TODO(gak): tune this condition based on empirical evidence return (cellList.size() > (((long) rowSpace.size() * columnSpace.size()) / 2))
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Tue Apr 08 13:05:15 UTC 2025 - 7K bytes - Viewed (0)