- Sort Score
- Result 10 results
- Languages All
Results 261 - 270 of 588 for possible (0.16 sec)
-
CHANGELOG/CHANGELOG-1.26.md
### Container Images All container images are available as manifest lists and support the described architectures. It is also possible to pull a specific architecture directly by adding the "-$ARCH" suffix to the container image name. name | architectures ---- | -------------
Registered: Fri Sep 05 09:05:11 UTC 2025 - Last Modified: Thu Mar 14 16:24:51 UTC 2024 - 425.7K bytes - Viewed (0) -
android/guava/src/com/google/common/base/Throwables.java
* @since 19.0 * @deprecated This method is equivalent to {@link Throwable#getStackTrace()} on JDK versions past * JDK 8 and on all Android versions. Use {@link Throwable#getStackTrace()} directly, or where * possible use the {@code java.lang.StackWalker.walk} method introduced in JDK 9. */ @Deprecated @J2ktIncompatible @GwtIncompatible // lazyStackTraceIsLazy, jlaStackTrace
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Thu Aug 07 16:05:33 UTC 2025 - 20.6K bytes - Viewed (0) -
android/guava/src/com/google/common/math/Quantiles.java
// array[mid] <= array[from] <= array[to]. We know that from < to, so we know mid < to // (although it's possible that mid == from, if to == from + 1). Note that the postcondition // would be impossible to fulfil if mid == to unless we also have array[from] == array[to]. boolean toLessThanMid = (array[to] < array[mid]); boolean midLessThanFrom = (array[mid] < array[from]);
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Mon Mar 17 20:26:29 UTC 2025 - 30.1K bytes - Viewed (0) -
docs/en/docs/advanced/custom-response.md
/// warning `ujson` is less careful than Python's built-in implementation in how it handles some edge-cases. /// {* ../../docs_src/custom_response/tutorial001.py hl[2,7] *} /// tip It's possible that `ORJSONResponse` might be a faster alternative. /// ### `RedirectResponse` { #redirectresponse } Returns an HTTP redirect. Uses a 307 status code (Temporary Redirect) by default.
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 09:15:41 UTC 2025 - 12.2K bytes - Viewed (0) -
guava/src/com/google/common/hash/Hashing.java
* the information of these hash codes in an ordered fashion. That is, whenever two equal hash * codes are produced by two calls to this method, it is <i>as likely as possible</i> that each * was computed from the <i>same</i> input hash codes in the <i>same</i> order. * * @throws IllegalArgumentException if {@code hashCodes} is empty, or the hash codes do not all
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Mon Aug 11 22:06:57 UTC 2025 - 31.1K bytes - Viewed (0) -
android/guava-tests/test/com/google/common/graph/AbstractStandardUndirectedNetworkTest.java
} // Element Mutation @Test public void addEdge_existingNodes() { assume().that(graphIsMutable()).isTrue(); // Adding nodes initially for safety (insulating from possible future // modifications to proxy methods) addNode(N1); addNode(N2); assertThat(networkAsMutableNetwork.addEdge(N1, N2, E12)).isTrue(); assertThat(network.edges()).contains(E12);
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Thu Dec 19 18:03:30 UTC 2024 - 18.6K bytes - Viewed (0) -
android/guava/src/com/google/common/eventbus/EventBus.java
* * <ul> * <li>It makes the cross-references between producer and subscriber harder to find. This can * complicate debugging, lead to unintentional reentrant calls, and force apps to eagerly * initialize all possible subscribers at startup time. * <li>It uses reflection in ways that break when code is processed by optimizers/minimizers like * <a href="https://developer.android.com/studio/build/shrink-code">R8 and Proguard</a>.
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Sat Dec 21 03:10:51 UTC 2024 - 12.7K bytes - Viewed (0) -
docs/en/docs/tutorial/security/oauth2-jwt.md
But it provides you the tools to simplify the process as much as possible without compromising flexibility, robustness, or security. And you can use and implement secure, standard protocols, like OAuth2 in a relatively simple way.
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 10:49:48 UTC 2025 - 10.5K bytes - Viewed (0) -
docs/security/README.md
#### Secure Erasure and Locking The MinIO server requires an available KMS to en/decrypt SSE-S3 encrypted objects. Therefore it is possible to erase or lock some or all encrypted objects. For example in case of a detected attack or other emergency situations the following actions can be taken:
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Wed Feb 26 09:25:50 UTC 2025 - 13.8K bytes - Viewed (0) -
cmd/metrics.go
} } // minioCollector is the Custom Collector type minioCollector struct { desc *prometheus.Desc } // Describe sends the super-set of all possible descriptors of metrics func (c *minioCollector) Describe(ch chan<- *prometheus.Desc) { ch <- c.desc } // Collect is called by the Prometheus registry when collecting metrics.
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Thu Aug 15 12:04:40 UTC 2024 - 16.6K bytes - Viewed (0)