Search Options

Results per page
Sort
Preferred Languages
Advance

Results 361 - 370 of 687 for Uses (0.04 sec)

  1. LICENSE

    of the particular user or of the way in which the particular user
    actually uses, or expects or is expected to use, the product.  A product
    is a consumer product regardless of whether the product has substantial
    commercial, industrial or non-consumer uses, unless such uses represent
    the only significant mode of use of the product.
    
      "Installation Information" for a User Product means any methods,
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Apr 23 18:58:53 UTC 2021
    - 33.7K bytes
    - Viewed (0)
  2. guava/src/com/google/common/collect/TreeBasedTable.java

          return new TreeMap<>(comparator);
        }
    
        @GwtIncompatible @J2ktIncompatible private static final long serialVersionUID = 0;
      }
    
      /**
       * Creates an empty {@code TreeBasedTable} that uses the natural orderings of both row and column
       * keys.
       *
       * <p>The method signature specifies {@code R extends Comparable} with a raw {@link Comparable},
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Fri Jul 18 15:05:43 UTC 2025
    - 11.6K bytes
    - Viewed (0)
  3. src/test/java/jcifs/smb/SSPContextTest.java

                // Only stub supportsIntegrity - isEstablished won't be called due to short-circuit
                when(mockCtx.supportsIntegrity()).thenReturn(false);
    
                // A small consumer that only uses MIC if advertised as available
                byte[] data = new byte[] { 1, 2 };
                if (mockCtx.supportsIntegrity() && mockCtx.isEstablished()) {
                    mockCtx.calculateMIC(data);
                }
    
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Thu Aug 14 05:31:44 UTC 2025
    - 15.2K bytes
    - Viewed (0)
  4. docs/en/docs/tutorial/security/first-steps.md

    ```console
    $ pip install python-multipart
    ```
    
    This is because **OAuth2** uses "form data" for sending the `username` and `password`.
    
    ///
    
    Run the example with:
    
    <div class="termy">
    
    ```console
    $ fastapi dev main.py
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 09:15:41 UTC 2025
    - 8.4K bytes
    - Viewed (0)
  5. compat/maven-compat/src/main/mdo/profiles.mdo

              ]]></description>
              <type>String</type>
            </field>
            <field>
              <name>layout</name>
              <version>1.0.0</version>
              <description>The type of layout this repository uses for locating and storing artifacts - can be "legacy" or
                "default".</description>
              <type>String</type>
              <defaultValue>default</defaultValue>
            </field>
          </fields>
    Registered: Sun Sep 07 03:35:12 UTC 2025
    - Last Modified: Wed Jan 22 11:03:29 UTC 2025
    - 13.8K bytes
    - Viewed (0)
  6. fess-crawler/src/main/java/org/codelibs/fess/crawler/extractor/ExtractorFactory.java

     * in descending order. The {@link #getExtractor(String)} method returns a composite
     * extractor that iterates through the available extractors until one successfully
     * extracts the data.
     * </p>
     *
     * <p>
     * The class uses a {@link CrawlerContainer} for managing crawler components and
     * supports dependency injection via the {@link Resource} annotation.
     * </p>
     */
    public class ExtractorFactory {
    
        /** Logger instance for this class */
    Registered: Sun Sep 21 03:50:09 UTC 2025
    - Last Modified: Sun Jul 06 02:13:03 UTC 2025
    - 7.3K bytes
    - Viewed (0)
  7. okhttp/src/jvmTest/kotlin/okhttp3/internal/tls/CertificatePinnerChainValidationTest.kt

       * ```
       *
       * The attacker compromises a CA. They take the public key from an intermediate certificate
       * signed by the compromised CA's certificate and uses it in a non-CA certificate. They ask the
       * pinned CA above to sign it for non-certificate-authority uses:
       *
       * ```
       *   pinnedRoot (trusted by CertificatePinner)
       *     -> pinnedIntermediate (trusted by CertificatePinner)
       *         -> attackerSwitch
    Registered: Fri Sep 05 11:42:10 UTC 2025
    - Last Modified: Fri Jun 20 11:46:46 UTC 2025
    - 24.3K bytes
    - Viewed (1)
  8. src/main/java/org/codelibs/core/convert/TimeConversionUtil.java

     * refer to {@link TimestampConversionUtil}.
     * </p>
     * <p>
     * If the source object is an instance of {@link Date}, {@link Calendar}, or {@link Time},
     * the conversion uses their millisecond value to create the target object.
     * For other types, the conversion uses the string representation of the source object.
     * </p>
     * <p>
     * If no pattern is specified, the pattern used for conversion depends on the locale as follows:
     * </p>
    Registered: Fri Sep 05 20:58:11 UTC 2025
    - Last Modified: Thu Jul 31 08:16:49 UTC 2025
    - 20.3K bytes
    - Viewed (0)
  9. docs/bigdata/README.md

    Kubernetes manages stateless Spark and Hive containers elastically on the compute nodes. Spark has native scheduler integration with Kubernetes. Hive, for legacy reasons, uses YARN scheduler on top of Kubernetes.
    
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Tue Aug 12 18:20:36 UTC 2025
    - 14.7K bytes
    - Viewed (0)
  10. src/test/java/jcifs/smb/SmbRandomAccessFileTest.java

            raf.setLength(100L);
    
            verify(tree, times(1)).send(any(Smb2SetInfoRequest.class), eq(RequestParam.NO_RETRY));
        }
    
        @Test
        @DisplayName("setLength(): NT SMBs capability uses Trans2SetFileInformation")
        void setLength_ntsmbs_usesTrans2() throws Exception {
            SmbRandomAccessFile raf = newInstance("rw", false, true, false);
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Thu Aug 14 05:31:44 UTC 2025
    - 18.1K bytes
    - Viewed (0)
Back to top