- Sort Score
- Result 10 results
- Languages All
Results 311 - 320 of 457 for site (0.04 sec)
-
src/main/resources/fess_indices/fess/no/stopwords.txt
sjøl her alle vil bli ble blei blitt kunne inn når være kom noen noe ville dere som deres kun ja etter ned skulle denne for deg si sine sitt mot å meget hvorfor dette disse uten hvordan ingen din ditt blir samme hvilken hvilke sånn inni mellom vår hver hvem vors hvis både
Registered: Thu Oct 31 13:40:30 UTC 2024 - Last Modified: Mon Nov 27 12:59:36 UTC 2023 - 994 bytes - Viewed (0) -
internal/bucket/encryption/bucket-sse-config.go
var config BucketSSEConfig err := xml.NewDecoder(r).Decode(&config) if err != nil { return nil, err } // Validates server-side encryption config rules // Only one rule is allowed on AWS S3 if len(config.Rules) != 1 { return nil, errors.New("only one server-side encryption rule is allowed at a time") } for _, rule := range config.Rules { switch rule.DefaultEncryptionAction.Algorithm { case AES256:
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Tue Oct 25 00:44:15 UTC 2022 - 4.9K bytes - Viewed (0) -
docs/debugging/s3-check-md5/main.go
continue } if _, ok := object.UserMetadata["X-Amz-Server-Side-Encryption-Customer-Algorithm"]; ok { log.Println("SKIPPED: Objects encrypted with SSE-C do not have md5sum as ETag:", objFullPath(object)) continue } if v, ok := object.UserMetadata["X-Amz-Server-Side-Encryption"]; ok && v == "aws:kms" {
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Sat Feb 17 01:15:57 UTC 2024 - 6.3K bytes - Viewed (0) -
SECURITY.md
### Hardware attacks Physical GPUs or TPUs can also be the target of attacks. [Published research](https://scholar.google.com/scholar?q=gpu+side+channel) shows that it might be possible to use side channel attacks on the GPU to leak data from other running models or processes in the same system. GPUs can also have implementation bugs that might allow attackers to leave malicious code running
Registered: Tue Nov 05 12:39:12 UTC 2024 - Last Modified: Wed Oct 16 16:10:43 UTC 2024 - 9.6K bytes - Viewed (0) -
common-protos/k8s.io/api/admissionregistration/v1/generated.proto
// SideEffects states whether this webhook has side effects. // Acceptable values are: None, NoneOnDryRun (webhooks created via v1beta1 may also specify Some or Unknown). // Webhooks with side effects MUST implement a reconciliation system, since a request may be // rejected by a future step in the admission chain and the side effects therefore need to be undone.
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Mon Mar 11 18:43:24 UTC 2024 - 24.4K bytes - Viewed (0) -
.github/ISSUE_TEMPLATE/feature_addition_request.yaml
label: 3. What would that same code look like if we added your feature? validations: required: true - type: markdown attributes: value: > Comparing two approaches to a use case side by side can make it easier to examine the differences between them. Additionally, it's very useful to us if you can provide a "straw API" — what the
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Fri Nov 17 18:47:47 UTC 2023 - 5.8K bytes - Viewed (0) -
src/main/resources/fess_indices/fess/ro/stopwords.txt
avea avem aveţi azi bine bucur bună ca că căci când care cărei căror cărui cât câte câţi către câtva ce cel ceva chiar cînd cine cineva cît cîte cîţi cîtva contra cu cum cumva curând curînd da dă dacă dar datorită de deci deja deoarece departe deşi din dinaintea dintr dintre drept după
Registered: Thu Oct 31 13:40:30 UTC 2024 - Last Modified: Thu Jul 19 06:31:02 UTC 2018 - 1.4K bytes - Viewed (0) -
guava/src/com/google/common/base/Predicate.java
* class documentation above). This method is <i>generally expected</i>, but not absolutely * required, to have the following properties: * * <ul> * <li>Its execution does not cause any observable side effects. * <li>The computation is <i>consistent with equals</i>; that is, {@link Objects#equal * Objects.equal}{@code (a, b)} implies that {@code predicate.apply(a) == * predicate.apply(b))}. * </ul>
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Thu Feb 15 16:12:13 UTC 2024 - 3.5K bytes - Viewed (0) -
okhttp/src/test/java/okhttp3/FallbackTestClientSocketFactory.kt
val enabledCipherSuites = mutableListOf<String>() for (suite in suites) { if (suite != TLS_FALLBACK_SCSV) { enabledCipherSuites.add(suite) } } delegate!!.enabledCipherSuites = enabledCipherSuites.toTypedArray<String>() } } companion object { /** * The cipher suite used during TLS connection fallback to indicate a fallback. See
Registered: Fri Nov 01 11:42:11 UTC 2024 - Last Modified: Mon Jan 08 01:13:22 UTC 2024 - 2K bytes - Viewed (0) -
src/main/resources/fess_indices/fess/tr/stopwords.txt
eğer elli en etmesi etti ettiği ettiğini gibi göre halen hangi hatta hem henüz hep hepsi her herhangi herkesin hiç hiçbir için iki ile ilgili ise işte itibaren itibariyle kadar karşın katrilyon kendi kendilerine kendini kendisi kendisine kendisini kez ki kim kimden kime kimi kimse kırk milyar
Registered: Thu Oct 31 13:40:30 UTC 2024 - Last Modified: Thu Jul 19 06:31:02 UTC 2018 - 1.5K bytes - Viewed (0)