- Sort Score
- Result 10 results
- Languages All
Results 11 - 20 of 470 for recommend (0.17 sec)
-
.github/ISSUE_TEMPLATE/02-pkgsite-removal.yml
description: | Requesting we remove a module here only hides the generated documentation on pkg.go.dev. It does not affect the behaviour of proxy.golang.org or the go command. Instead we recommend using the retract directive which will be processed by all 3 of the above. If you have deleted your repo, please recreate it and publish a retraction.
Others - Registered: Tue May 07 11:14:38 GMT 2024 - Last Modified: Thu Jan 04 23:31:17 GMT 2024 - 1.9K bytes - Viewed (0) -
android/guava/src/com/google/common/util/concurrent/ForwardingFluentFuture.java
/** * {@link FluentFuture} that forwards all calls to a delegate. * * <h3>Extension</h3> * * If you want a class like {@code FluentFuture} but with extra methods, we recommend declaring your * own subclass of {@link ListenableFuture}, complete with a method like {@link #from} to adapt an * existing {@code ListenableFuture}, implemented atop a {@link ForwardingListenableFuture} that
Java - Registered: Fri Apr 26 12:43:10 GMT 2024 - Last Modified: Wed May 05 22:27:35 GMT 2021 - 2.5K bytes - Viewed (0) -
docs/erasure/README.md
By default, MinIO shards the objects across N/2 data and N/2 parity drives. Though, you can use [storage classes](https://github.com/minio/minio/tree/master/docs/erasure/storage-class) to use a custom configuration. We recommend N/2 data and parity blocks, as it ensures the best protection from drive failures.
Plain Text - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Thu Sep 29 04:28:45 GMT 2022 - 4.1K bytes - Viewed (0) -
CONTRIBUTING.md
``MinIO`` community welcomes your contribution. To make the process as seamless as possible, we recommend you read this contribution guide. ## Development Workflow
Plain Text - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Sat Feb 12 00:51:25 GMT 2022 - 2.8K bytes - Viewed (0) -
docs/sts/wso2.md
operations. MinIO STS API uses [JSON Web Key Set Endpoint](https://docs.wso2.com/display/IS541/JSON+Web+Key+Set+Endpoint) to validate if JWT is valid and is properly signed. **We recommend setting `policy` as a custom claim for the JWT service provider follow [here](https://docs.wso2.com/display/IS550/Configuring+Claims+for+a+Service+Provider) and [here](https://docs.wso2.com/display/IS550/Handling+Custom+Claims+with+the+JWT+Bearer+Grant+Type) for relevant docs on how to configure claims for a...
Plain Text - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Thu Sep 29 04:28:45 GMT 2022 - 8.7K bytes - Viewed (0) -
README.md
time. If your code is a library itself (i.e., it is used on the CLASSPATH of users outside your own control), you should not use beta APIs unless you [repackage] them. **If your code is a library, we strongly recommend using the [Guava Beta Checker] to ensure that you do not use any `@Beta` APIs!** 2. APIs without `@Beta` will remain binary-compatible for the indefinite
Plain Text - Registered: Fri May 03 12:43:13 GMT 2024 - Last Modified: Wed May 01 18:44:57 GMT 2024 - 5.9K bytes - Viewed (0) -
src/main/java/jcifs/ACE.java
* To fully understand the information exposed by this class a description * of the access check algorithm used by Windows is required. The following * is a basic description of the algorithm. For a more complete description * we recommend reading the section on Access Control in Keith Brown's * "The .NET Developer's Guide to Windows Security" (which is also * available online). * <p> * Direct ACEs are evaluated first in order. The SID of the user performing
Java - Registered: Sun May 05 00:10:10 GMT 2024 - Last Modified: Sun Jul 01 13:12:10 GMT 2018 - 6.5K bytes - Viewed (0) -
src/main/java/jcifs/internal/dtyp/ACE.java
* To fully understand the information exposed by this class a description * of the access check algorithm used by Windows is required. The following * is a basic description of the algorithm. For a more complete description * we recommend reading the section on Access Control in Keith Brown's * "The .NET Developer's Guide to Windows Security" (which is also * available online). * <p> * Direct ACEs are evaluated first in order. The SID of the user performing
Java - Registered: Sun May 05 00:10:10 GMT 2024 - Last Modified: Sun Jul 01 13:12:10 GMT 2018 - 5.4K bytes - Viewed (0) -
licenses/github.com/cncf/udpa/go/LICENSE
replaced with your own identifying information. (Don't include the brackets!) The text should be enclosed in the appropriate comment syntax for the file format. We also recommend that a file or class name and description of purpose be included on the same "printed page" as the copyright notice for easier identification within third-party archives.
Plain Text - Registered: Wed Apr 03 22:53:10 GMT 2024 - Last Modified: Wed Nov 27 21:50:41 GMT 2019 - 11.1K bytes - Viewed (0) -
licenses/github.com/go-logr/stdr/LICENSE
replaced with your own identifying information. (Don't include the brackets!) The text should be enclosed in the appropriate comment syntax for the file format. We also recommend that a file or class name and description of purpose be included on the same "printed page" as the copyright notice for easier identification within third-party archives.
Plain Text - Registered: Wed May 08 22:53:08 GMT 2024 - Last Modified: Mon Jul 17 20:25:52 GMT 2023 - 11.1K bytes - Viewed (0)