- Sort Score
- Result 10 results
- Languages All
Results 1291 - 1300 of 1,387 for always (0.08 sec)
-
guava/src/com/google/common/hash/HashCode.java
/** * Returns the value of this hash code as a byte array. The caller may modify the byte array; * changes to it will <i>not</i> be reflected in this {@code HashCode} object or any other arrays * returned by this method. */ // TODO(user): consider ByteString here, when that is available public abstract byte[] asBytes(); /** * Copies bytes from this hash code into {@code dest}. *
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Wed Oct 30 19:54:59 UTC 2024 - 12.6K bytes - Viewed (0) -
istioctl/pkg/tag/tag.go
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Mon Jul 22 15:40:30 UTC 2024 - 16.5K bytes - Viewed (0) -
docs/en/docs/features.md
* **No brainfuck**: * No new schema definition micro-language to learn. * If you know Python types you know how to use Pydantic. * Plays nicely with your **<abbr title="Integrated Development Environment, similar to a code editor">IDE</abbr>/<abbr title="A program that checks for code errors">linter</abbr>/brain**:
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Thu Aug 15 23:30:12 UTC 2024 - 9.2K bytes - Viewed (0) -
src/main/java/jcifs/smb1/Config.java
* overwriting properties from the file. Thus properties provided on the * commandline with the <code>-Dproperty.name=value</code> VM parameter * will override properties from the configuration file. * <p> * There are several ways to set jCIFS properties. See * the <a href="../overview-summary.html#scp">overview page of the API * documentation</a> for details. */ public class Config { public static int socketCount = 0; /**
Registered: Sun Nov 03 00:10:13 UTC 2024 - Last Modified: Fri Mar 22 21:10:40 UTC 2019 - 11.3K bytes - Viewed (0) -
docs/kms/IAM.md
MinIO supports encrypting config, IAM assets with KMS provided keys. If the KMS is not enabled, MinIO will store the config, IAM data as plain text erasure coded in its backend. ## MinIO KMS Quick Start MinIO supports two ways of encrypting IAM and configuration data. You can either use KES - together with an external KMS - or, much simpler, set the env. variable `MINIO_KMS_SECRET_KEY` and start/restart the MinIO server. For more details about KES and how
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Thu Jan 18 07:03:17 UTC 2024 - 5.3K bytes - Viewed (0) -
android/guava/src/com/google/common/util/concurrent/TimeoutFuture.java
* thus a motivated caller may be able to expose the reference to another thread that would then * call cancel() and be unable to cancel the delegate. * There are a number of ways to solve this, none of which are very pretty, and it is currently * believed to be a purely theoretical problem (since the other actions should supply sufficient * write-barriers). */
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Fri Oct 25 13:13:32 UTC 2024 - 8.1K bytes - Viewed (0) -
migrator/migrator.go
if !field.PrimaryKey { // check type if !strings.HasPrefix(fullDataType, realDataType) { // check type aliases aliases := m.DB.Migrator().GetTypeAliases(realDataType) for _, alias := range aliases { if strings.HasPrefix(fullDataType, alias) { isSameType = true break } } if !isSameType { alterColumn = true } } } if !isSameType { // check size
Registered: Sun Nov 03 09:35:10 UTC 2024 - Last Modified: Fri Apr 26 07:15:49 UTC 2024 - 29K bytes - Viewed (0) -
guava-tests/test/com/google/common/collect/LinkedHashMultimapTest.java
import static com.google.common.collect.testing.Helpers.mapEntry; import static com.google.common.collect.testing.IteratorFeature.MODIFIABLE; import static com.google.common.truth.Truth.assertThat; import static java.util.Arrays.asList; import com.google.common.annotations.GwtCompatible; import com.google.common.annotations.GwtIncompatible; import com.google.common.annotations.J2ktIncompatible;
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Wed Oct 30 16:15:19 UTC 2024 - 18.6K bytes - Viewed (0) -
CONTRIBUTING.md
``` This will catch most license, Python coding style and BUILD file issues that may exist in your changes. #### Running unit tests There are two ways to run TensorFlow unit tests. 1. Using tools and libraries installed directly on your system. Refer to the
Registered: Tue Nov 05 12:39:12 UTC 2024 - Last Modified: Wed Oct 23 06:20:12 UTC 2024 - 15.9K bytes - Viewed (0) -
architecture/ambient/ztunnel.md
The ztunnel is primarily a mechanism to get traffic to the waypoints, securely. ## Proxy implementation In its initial implementations, the ztunnel was actually implemented in 3 different ways: a bespoke Rust implementation, a bespoke Go implementation, and in Envoy.
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Wed Jul 17 23:10:17 UTC 2024 - 16.8K bytes - Viewed (0)