Search Options

Results per page
Sort
Preferred Languages
Advance

Results 81 - 90 of 1,379 for ways (0.05 sec)

  1. CREDITS

      If your software can interact with users remotely through a computer
    network, you should also make sure that it provides a way for users to
    get its source.  For example, if your program is a web application, its
    interface could display a "Source" link that leads users to an archive
    of the code.  There are many ways you could offer source, and different
    solutions will be better for different programs; see section 13 for the
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Thu Mar 13 05:29:51 UTC 2025
    - 1.8M bytes
    - Viewed (0)
  2. cmd/iam.go

    			}
    		}
    	}
    }
    
    // SetTempUser - set temporary user credentials, these credentials have an
    // expiry. The permissions for these STS credentials is determined in one of the
    // following ways:
    //
    // - RoleARN - if a role-arn is specified in the request, the STS credential's
    // policy is the role's policy.
    //
    // - inherited from parent - this is the case for AssumeRole API, where the
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 75.3K bytes
    - Viewed (0)
  3. android/guava-tests/test/com/google/common/io/testdata/alice_in_wonderland.txt

    sticks and dry leaves, and the fall was over.
    
      Alice was not a bit hurt, and she jumped up on to her feet in a
    moment:  she looked up, but it was all dark overhead; before her
    was another long passage, and the White Rabbit was still in
    sight, hurrying down it.  There was not a moment to be lost:
    away went Alice like the wind, and was just in time to hear it
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Fri Apr 21 02:27:51 UTC 2017
    - 145.2K bytes
    - Viewed (0)
  4. okhttp/src/jvmTest/kotlin/okhttp3/URLConnectionTest.kt

          .timeout()
          .timeout(100, TimeUnit.MILLISECONDS)
        assertContent("This comes after a busted connection", response2)
    
        // Check that a fresh connection was created, either immediately or after attempting reuse.
        // We know that a fresh connection was created if the server recorded a request with sequence
        // number 0. Since the client may have attempted to reuse the broken connection just before
    Registered: Fri Sep 05 11:42:10 UTC 2025
    - Last Modified: Sat Jun 21 20:36:35 UTC 2025
    - 133.2K bytes
    - Viewed (0)
  5. CHANGELOG/CHANGELOG-1.20.md

    - Fix kubelet to properly log when a container is started. Previously, kubelet may log that container is dead and was restarted when it was actually started for the first time. This behavior only happened on pods with initContainers and regular containers. ([#91469](https://github.com/kubernetes/kubernetes/pull/91469), [@rata](https://github.com/rata))
    Registered: Fri Sep 05 09:05:11 UTC 2025
    - Last Modified: Wed Jan 19 21:05:45 UTC 2022
    - 409K bytes
    - Viewed (0)
  6. CHANGELOG/CHANGELOG-1.22.md

      - kube-apiserver v1.22.16
    
    This vulnerability was reported by Richard Turnbull of NCC Group as part of the Kubernetes Audit
    
    
    **CVSS Rating:** Medium (6.5) [CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)
    
    ### CVE-2022-3294: Node address isn't always verified when proxying
    
    Registered: Fri Sep 05 09:05:11 UTC 2025
    - Last Modified: Tue Dec 13 12:43:45 UTC 2022
    - 454.1K bytes
    - Viewed (0)
  7. RELEASE.md

        `instead of graph.proto`.
    *   `ops.NoGradient` was renamed `ops.NotDifferentiable`. `ops.NoGradient` will
        be removed soon.
    *   `dot.h` / DotGraph was removed (it was an early analysis tool prior to
        TensorBoard, no longer that useful). It remains in history should someone
        find the code useful.
    *   re2 / regexp.h was removed from being a public interface of TF. Should users
    Registered: Tue Sep 09 12:39:10 UTC 2025
    - Last Modified: Mon Aug 18 20:54:38 UTC 2025
    - 740K bytes
    - Viewed (1)
  8. doc/go_spec.html

    to the maximum element index plus one.
    </p>
    
    <pre>
    buffer := [10]string{}             // len(buffer) == 10
    intSet := [6]int{1, 2, 3, 5}       // len(intSet) == 6
    days := [...]string{"Sat", "Sun"}  // len(days) == 2
    </pre>
    
    <p>
    A slice literal describes the entire underlying array literal.
    Thus the length and capacity of a slice literal are the maximum
    Registered: Tue Sep 09 11:13:09 UTC 2025
    - Last Modified: Tue May 06 19:12:15 UTC 2025
    - 286.2K bytes
    - Viewed (0)
  9. docs/en/docs/async.md

    This same syntax (or almost identical) was also included recently in modern versions of JavaScript (in Browser and NodeJS).
    
    But before that, handling asynchronous code was quite more complex and difficult.
    
    In previous versions of Python, you could have used threads or <a href="https://www.gevent.org/" class="external-link" target="_blank">Gevent</a>. But the code is way more complex to understand, debug, and think about.
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 09:56:21 UTC 2025
    - 24K bytes
    - Viewed (0)
  10. okhttp/src/commonJvmAndroid/kotlin/okhttp3/internal/http/RetryAndFollowUpInterceptor.kt

      }
    
      private fun isRecoverable(
        e: IOException,
        requestSendStarted: Boolean,
      ): Boolean {
        // If there was a protocol problem, don't recover.
        if (e is ProtocolException) {
          return false
        }
    
        // If there was an interruption don't recover, but if there was a timeout connecting to a route
        // we should try the next route (if there is one).
        if (e is InterruptedIOException) {
    Registered: Fri Sep 05 11:42:10 UTC 2025
    - Last Modified: Tue May 27 14:58:02 UTC 2025
    - 12.4K bytes
    - Viewed (0)
Back to top