Search Options

Results per page
Sort
Preferred Languages
Advance

Results 11 - 20 of 222 for recommend (0.04 sec)

  1. README.md

        time. If your code is a library itself (i.e., it is used on the CLASSPATH of
        users outside your own control), you should not use beta APIs unless you
        [repackage] them. **If your code is a library, we strongly recommend using
        the [Guava Beta Checker] to ensure that you do not use any `@Beta` APIs!**
    
    2.  APIs without `@Beta` will remain binary-compatible for the indefinite
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Tue Aug 05 15:30:14 UTC 2025
    - 6.2K bytes
    - Viewed (0)
  2. docs/sts/wso2.md

    operations. MinIO STS API uses [JSON Web Key Set Endpoint](https://docs.wso2.com/display/IS541/JSON+Web+Key+Set+Endpoint) to validate if JWT is valid and is properly signed.
    
    **We recommend setting `policy` as a custom claim for the JWT service provider follow [here](https://docs.wso2.com/display/IS550/Configuring+Claims+for+a+Service+Provider) and [here](https://docs.wso2.com/display/IS550/Handling+Custom+Claims+with+the+JWT+Bearer+Grant+Type) for relevant docs on how to configure claims for a...
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Tue Aug 12 18:20:36 UTC 2025
    - 8.7K bytes
    - Viewed (0)
  3. CONTRIBUTING.md

    ``MinIO`` community welcomes your contribution. To make the process as seamless as possible, we recommend you read this contribution guide.
    
    ## Development Workflow
    
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Mon Aug 05 18:35:53 UTC 2024
    - 2.9K bytes
    - Viewed (0)
  4. SECURITY.md

    ## Reporting vulnerabilities
    
    ### Vulnerabilities in TensorFlow
    
    This document covers different use cases for TensorFlow together with comments
    whether these uses were recommended or considered safe, or where we recommend
    some form of isolation when dealing with untrusted data. As a result, this
    document also outlines what issues we consider as TensorFlow security
    vulnerabilities.
    
    Registered: Tue Sep 09 12:39:10 UTC 2025
    - Last Modified: Wed Oct 16 16:10:43 UTC 2024
    - 9.6K bytes
    - Viewed (0)
  5. docs/distributed/README.md

    **If MinIO distributed setup is using NFS volumes underneath it is not guaranteed MinIO will provide these consistency guarantees since NFS is not strictly consistent (If you must use NFS we recommend that you at least use NFSv4 instead of NFSv3 for relatively better outcomes).**
    
    ## Get started
    
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Tue Aug 12 18:20:36 UTC 2025
    - 8.9K bytes
    - Viewed (0)
  6. docs/docker/README.md

      -e "MINIO_ROOT_PASSWORD=wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY" \
      quay.io/minio/minio server /data --console-address ":9001"
    ```
    
    ## Run Distributed MinIO on Containers
    
    We recommend kubernetes based deployment for production level deployment <https://github.com/minio/operator>.
    
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Tue Aug 12 18:20:36 UTC 2025
    - 8.2K bytes
    - Viewed (0)
  7. src/main/java/jcifs/internal/dtyp/ACE.java

     * To fully understand the information exposed by this class a description
     * of the access check algorithm used by Windows is required. The following
     * is a basic description of the algorithm. For a more complete description
     * we recommend reading the section on Access Control in Keith Brown's
     * "The .NET Developer's Guide to Windows Security" (which is also
     * available online).
     * <p>
     * Direct ACEs are evaluated first in order. The SID of the user performing
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Sat Aug 16 01:32:48 UTC 2025
    - 5.6K bytes
    - Viewed (0)
  8. README.md

    OkHttp depends on [Okio][okio] for high-performance I/O and the [Kotlin standard library][kotlin]. Both are small libraries with strong backward-compatibility.
    
    We highly recommend you keep OkHttp up-to-date. As with auto-updating web browsers, staying current
    with HTTPS clients is an important defense against potential security problems. [We
    Registered: Fri Sep 05 11:42:10 UTC 2025
    - Last Modified: Mon Jul 28 07:33:49 UTC 2025
    - 8.8K bytes
    - Viewed (0)
  9. LICENSE.txt

          replaced with your own identifying information. (Don't include
          the brackets!)  The text should be enclosed in the appropriate
          comment syntax for the file format. We also recommend that a
          file or class name and description of purpose be included on the
          same "printed page" as the copyright notice for easier
          identification within third-party archives.
    
    Registered: Fri Sep 05 11:42:10 UTC 2025
    - Last Modified: Mon Jul 23 14:02:28 UTC 2012
    - 11.1K bytes
    - Viewed (0)
  10. LICENSES/vendor/github.com/containerd/ttrpc/LICENSE

          replaced with your own identifying information. (Don't include
          the brackets!)  The text should be enclosed in the appropriate
          comment syntax for the file format. We also recommend that a
          file or class name and description of purpose be included on the
          same "printed page" as the copyright notice for easier
          identification within third-party archives.
    
    Registered: Fri Sep 05 09:05:11 UTC 2025
    - Last Modified: Fri May 08 04:49:00 UTC 2020
    - 11.2K bytes
    - Viewed (0)
Back to top