- Sort Score
- Num 10 results
- Language All
Results 141 - 150 of 219 for pushes (0.08 seconds)
-
tensorflow/c/eager/immediate_execution_context.h
virtual absl::Status RegisterCustomDevice( const string& name, std::unique_ptr<CustomDevice> device) = 0; // Return FunctionLibraryDefinition. Transformations need to use it to use it // to invoke MLIR compiler passes. virtual FunctionLibraryDefinition* FuncLibDef() = 0; // Resets the global rendezvous used for functions. virtual void ResetGlobalRendezvousForFunction() = 0;
Created: Tue Apr 07 12:39:13 GMT 2026 - Last Modified: Sat Oct 12 05:11:17 GMT 2024 - 12.3K bytes - Click Count (0) -
src/test/java/org/codelibs/fess/exec/SuggestCreatorTest.java
} // Test initializeProbes @Test public void test_initializeProbes() { try { SuggestCreator.initializeProbes(); // If no exception thrown, test passes assertTrue(true); } catch (Exception e) { fail("initializeProbes should not throw exception: " + e.getMessage()); } } // Test process with properties path @TestCreated: Tue Mar 31 13:07:34 GMT 2026 - Last Modified: Fri Mar 13 23:01:26 GMT 2026 - 11K bytes - Click Count (0) -
android/guava-testlib/src/com/google/common/collect/testing/SafeTreeMap.java
import java.util.SortedMap; import java.util.TreeMap; import org.jspecify.annotations.Nullable; /** * A wrapper around {@code TreeMap} that aggressively checks to see if keys are mutually comparable. * This implementation passes the navigable map test suites. * * @author Louis Wasserman */ @GwtIncompatible public final class SafeTreeMap<K, V> implements Serializable, NavigableMap<K, V> { @SuppressWarnings("unchecked")Created: Fri Apr 03 12:43:13 GMT 2026 - Last Modified: Mon Mar 23 21:06:42 GMT 2026 - 7.4K bytes - Click Count (0) -
src/test/java/jcifs/smb1/smb1/NtlmPasswordAuthenticationTest.java
assertEquals("DOMAIN", auth.getDomain()); assertEquals("user", auth.getUsername()); assertNotNull(auth.getPassword()); // Should fall back to default } // Test constructor with external hashes @Test void testConstructorWithExternalHashes() { byte[] challenge = new byte[8]; byte[] ansiHash = new byte[24]; byte[] unicodeHash = new byte[24];
Created: Sun Apr 05 00:10:12 GMT 2026 - Last Modified: Thu Aug 14 05:31:44 GMT 2025 - 9.7K bytes - Click Count (0) -
android/guava/src/com/google/common/util/concurrent/SmoothRateLimiter.java
*/ double stableIntervalMicros; /** * The time when the next request (no matter its size) will be granted. After granting a request, * this is pushed further in the future. Large requests push this further than small requests. */ private long nextFreeTicketMicros = 0L; // could be either in the past or future private SmoothRateLimiter(SleepingStopwatch stopwatch) {
Created: Fri Apr 03 12:43:13 GMT 2026 - Last Modified: Wed May 14 19:40:47 GMT 2025 - 19.3K bytes - Click Count (0) -
android/guava/src/com/google/common/net/InternetDomainName.java
* * <ul> * <li>Any part containing non-ASCII characters is considered valid. * <li>Underscores ('_') are permitted wherever dashes ('-') are permitted. * <li>Parts other than the final part may start with a digit, as mandated by <a * href="https://tools.ietf.org/html/rfc1123#section-2">RFC 1123</a>. * </ul> *
Created: Fri Apr 03 12:43:13 GMT 2026 - Last Modified: Tue Mar 03 21:21:59 GMT 2026 - 26.2K bytes - Click Count (0) -
docs/de/docs/tutorial/security/simple-oauth2.md
##### Warum Passwort-Hashing verwenden? { #why-use-password-hashing } Wenn Ihre Datenbank gestohlen wird, hat der Dieb nicht die Klartext-Passwörter Ihrer Benutzer, sondern nur die Hashes. Der Dieb kann also nicht versuchen, die gleichen Passwörter in einem anderen System zu verwenden (da viele Benutzer überall das gleiche Passwort verwenden, wäre dies gefährlich).Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 17:58:09 GMT 2026 - 11.1K bytes - Click Count (0) -
docs/en/docs/tutorial/security/simple-oauth2.md
But you cannot convert from the gibberish back to the password. ##### Why use password hashing { #why-use-password-hashing } If your database is stolen, the thief won't have your users' plaintext passwords, only the hashes. So, the thief won't be able to try to use those same passwords in another system (as many users use the same password everywhere, this would be dangerous). {* ../../docs_src/security/tutorial003_an_py310.py hl[82:85] *}Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 05 18:13:19 GMT 2026 - 9.4K bytes - Click Count (0) -
docs/es/docs/tutorial/security/simple-oauth2.md
Siempre que pases exactamente el mismo contenido (exactamente el mismo password) obtienes exactamente el mismo galimatías. Pero no puedes convertir del galimatías al password. ##### Por qué usar hashing de passwords { #why-use-password-hashing } Si tu base de datos es robada, el ladrón no tendrá los passwords en texto plano de tus usuarios, solo los hashes.
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 18:15:55 GMT 2026 - 10.2K bytes - Click Count (0) -
android/guava/src/com/google/common/cache/Cache.java
* CacheLoader#loadAll bulk loading implementations} * </ul> * * <p><b>Warning:</b> For any given key, every {@code loader} used with it should compute the same * value. Otherwise, a call that passes one {@code loader} may return the result of another call * with a differently behaving {@code loader}. For example, a call that requests a short timeoutCreated: Fri Apr 03 12:43:13 GMT 2026 - Last Modified: Sun Dec 22 03:38:46 GMT 2024 - 8.3K bytes - Click Count (0)