Search Options

Results per page
Sort
Preferred Languages
Advance

Results 31 - 40 of 9,905 for they (0.05 sec)

  1. docs/en/docs/how-to/separate-openapi-schemas.md

    <div class="screenshot">
    <img src="/img/tutorial/separate-openapi-schemas/image02.png">
    </div>
    
    This means that it will **always have a value**, it's just that sometimes the value could be `None` (or `null` in JSON).
    
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Sat Oct 26 16:43:54 UTC 2024
    - 4.2K bytes
    - Viewed (0)
  2. ci/official/envs/versions_upload

    # See the License for the specific language governing permissions and
    # limitations under the License.
    # ==============================================================================
    # Release jobs are very basic. They don't use any caching or RBE,
    # but they do upload logs to resultstore.
    # IMPORTANT: trailing slash is required on GCS URIs, as it tells gcloud to
    # pretend the path is a directory.
    Registered: Tue Nov 05 12:39:12 UTC 2024
    - Last Modified: Tue Jul 16 21:54:22 UTC 2024
    - 1.5K bytes
    - Viewed (0)
  3. common/config/.golangci-format.yml

    # WARNING: DO NOT EDIT, THIS FILE IS PROBABLY A COPY
    #
    # The original version of this file is located in the https://github.com/istio/common-files repo.
    # If you're looking at this file in a different repo and want to make a change, please go to the
    # common-files repo, make the change there and check it in. Then come back to this repo and run
    # "make update-common".
    
    run:
      # Timeout for analysis, e.g. 30s, 5m.
      # Default: 1m
      timeout: 20m
      build-tags:
    Registered: Wed Nov 06 22:53:10 UTC 2024
    - Last Modified: Fri Apr 05 03:02:37 UTC 2024
    - 2K bytes
    - Viewed (0)
  4. SECURITY.md

    For example, if an attacker were to upload a malicious video file, they could
    potentially exploit a vulnerability in the TensorFlow code that handles videos,
    which could allow them to execute arbitrary code on the system running
    TensorFlow.
    
    It is important to keep TensorFlow up to date with the latest security patches
    and follow the sandboxing guideline above to protect against these types of
    vulnerabilities.
    
    Registered: Tue Nov 05 12:39:12 UTC 2024
    - Last Modified: Wed Oct 16 16:10:43 UTC 2024
    - 9.6K bytes
    - Viewed (0)
  5. docs/contribute/code_of_conduct.md

       disengages from the project, they should make it known and take the proper steps to ensure that
       others can pick up where they left off.
    
    This code is not exhaustive or complete. It serves to distill our common understanding of a
    collaborative, shared environment, and goals. We expect it to be followed in spirit as much as in
    the letter.
    
    Diversity Statement
    -------------------
    
    Registered: Fri Nov 01 11:42:11 UTC 2024
    - Last Modified: Sun Feb 06 02:19:09 UTC 2022
    - 5.1K bytes
    - Viewed (0)
  6. okhttp-tls/src/main/kotlin/okhttp3/tls/HandshakeCertificates.kt

     *
     *  * The server's handshake certificates must have a [held certificate][HeldCertificate] (a
     *    certificate and its private key). The certificate's subject alternative names must match the
     *    server's hostname. The server must also have is a (possibly-empty) chain of intermediate
     *    certificates to establish trust from a root certificate to the server's certificate. The root
     *    certificate is not included in this chain.
    Registered: Fri Nov 01 11:42:11 UTC 2024
    - Last Modified: Mon Jan 08 01:13:22 UTC 2024
    - 8.5K bytes
    - Viewed (0)
  7. src/main/webapp/WEB-INF/view/common/help.jsp

    <dl>
    	<dt>Field</dt>
    	<dd>
    		You can search any field by typing the field name followed by a colon
    		":" and then the term you are looking for. If you want to find
    		documents which has "Fess" as the document title, you can enter:
    		<pre>title:Fess</pre>
    		The available fields are "url", "host", "site", "title", "content",
    		"content_length", "last_modified" and "mimetype", and they are
    		customizable.
    	</dd>
    	<dt>Sort</dt>
    	<dd>
    Registered: Thu Oct 31 13:40:30 UTC 2024
    - Last Modified: Mon Feb 26 14:01:31 UTC 2018
    - 2.4K bytes
    - Viewed (0)
  8. docs/en/docs/async.md

    * the data from the client to be sent through the network
    * the data sent by your program to be received by the client through the network
    * the contents of a file in the disk to be read by the system and given to your program
    * the contents your program gave to the system to be written to disk
    * a remote API operation
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Wed Aug 28 23:33:37 UTC 2024
    - 23.5K bytes
    - Viewed (0)
  9. android/guava/src/com/google/common/collect/ForwardingSortedMap.java

     * override one or more methods to modify the behavior of the backing sorted map as desired per the
     * <a href="http://en.wikipedia.org/wiki/Decorator_pattern">decorator pattern</a>.
     *
     * <p><b>Warning:</b> The methods of {@code ForwardingSortedMap} forward <i>indiscriminately</i> to
     * the methods of the delegate. For example, overriding {@link #put} alone <i>will not</i> change
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Fri May 12 15:26:39 UTC 2023
    - 5.6K bytes
    - Viewed (0)
  10. docs/sts/ldap.md

    The administrator will associate IAM access policies with each group and if required with the user too. The MinIO server then evaluates applicable policies on a user (these are the policies associated with the groups along with the policy on the user if any) to check if the request should be allowed or denied.
    
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Fri May 24 23:05:23 UTC 2024
    - 18.9K bytes
    - Viewed (0)
Back to top