- Sort Score
- Result 10 results
- Languages All
Results 31 - 40 of 107 for Guess (0.04 sec)
-
src/main/java/jcifs/smb1/smb1/Trans2FindFirst2Response.java
Registered: Wed Jun 12 15:45:55 UTC 2024 - Last Modified: Fri Mar 22 21:10:40 UTC 2019 - 8.5K bytes - Viewed (0) -
staging/src/k8s.io/cli-runtime/pkg/genericclioptions/record_flags.go
jsonpatch "gopkg.in/evanphx/json-patch.v4" "k8s.io/apimachinery/pkg/api/meta" "k8s.io/apimachinery/pkg/runtime" "k8s.io/apimachinery/pkg/util/json" ) // ChangeCauseAnnotation is the annotation indicating a guess at "why" something was changed const ChangeCauseAnnotation = "kubernetes.io/change-cause" // RecordFlags contains all flags associated with the "--record" operation type RecordFlags struct {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue May 28 08:48:22 UTC 2024 - 5.5K bytes - Viewed (0) -
cmd/kubeadm/app/phases/upgrade/compute.go
KubeletVersions: kubeletVersions, EtcdVersions: etcdVersions, } // Do a "dumb guess" that a new minor upgrade is available just because the latest stable version is higher than the cluster version // This guess will be corrected once we know if there is a patch version available canDoMinorUpgrade := clusterVersion.LessThan(stableVersion)
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sun Mar 03 03:03:29 UTC 2024 - 14.3K bytes - Viewed (0) -
tensorflow/compiler/jit/device_compilation_profiler.cc
// below) regardless of compilation mode. If it is not, clean up the related // logic. // We always compile a cluster the very first time it is executed. This is an // optimistic guess that pays off for statically shaped TensorFlow graphs // (since they get the benefit of XLA right away without waiting for warmup) // and doesn't hurt much for dynamically shaped TensorFlow graphs (we "pay" at
Registered: Sun Jun 16 05:45:23 UTC 2024 - Last Modified: Thu Feb 22 06:59:07 UTC 2024 - 8.5K bytes - Viewed (0) -
src/main/java/jcifs/internal/smb2/ServerMessageBlock2Response.java
// TODO: SMB2 - do we need to check the MIDs? // We only read what we were waiting for, so first guess would be no. boolean verify = dgst.verify(buffer, i, size, 0, this); this.verifyFailed = verify; return !verify; } return true; }
Registered: Wed Jun 12 15:45:55 UTC 2024 - Last Modified: Sun Aug 05 09:45:59 UTC 2018 - 7.4K bytes - Viewed (0) -
pkg/config/labels/instance.go
func (i Instance) String() string { // Ensure stable ordering keys := slices.Sort(maps.Keys(i)) var buffer strings.Builder // Assume each kv pair is roughly 25 characters. We could be under or over, this is just a guess to optimize buffer.Grow(len(keys) * 25) first := true for _, k := range keys { v := i[k] if !first { buffer.WriteString(",") } else { first = false } if len(v) > 0 {
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Fri Jun 16 06:54:36 UTC 2023 - 5K bytes - Viewed (0) -
subprojects/core/src/main/java/org/gradle/api/internal/file/archive/TarFileTree.java
+ " The tar might be corrupted or it is compressed in an unexpected way.\n" + " By default the tar tree tries to guess the compression based on the file extension.\n" + " If you need to specify the compression explicitly please refer to the DSL reference."; throw new GradleException(message, e);
Registered: Wed Jun 12 18:38:38 UTC 2024 - Last Modified: Tue Mar 26 15:15:04 UTC 2024 - 9.8K bytes - Viewed (0) -
maven-core/src/site/apt/configuration-management.apt
plugin parameters and anything else. We once had a document that Vincent and I agreed upon and I was about to implement it and then I disappeared for 8 months so it never came to pass. So I guess it's important to figure out what people are using properties files for and see if we can't incorporate it all into the POM. Or if we do have properties file (something I would like to avoid) say they don't
Registered: Wed Jun 12 09:55:16 UTC 2024 - Last Modified: Mon Mar 18 00:24:53 UTC 2024 - 5.8K bytes - Viewed (0) -
docs/en/docs/advanced/security/http-basic-auth.md
``` But by using the `secrets.compare_digest()` it will be secure against a type of attacks called "timing attacks". ### Timing Attacks But what's a "timing attack"? Let's imagine some attackers are trying to guess the username and password. And they send a request with a username `johndoe` and a password `love123`. Then the Python code in your application would be equivalent to something like: ```Python
Registered: Mon Jun 17 08:32:26 UTC 2024 - Last Modified: Thu Jan 11 14:33:05 UTC 2024 - 5.9K bytes - Viewed (0) -
android/guava-tests/test/com/google/common/io/ByteSourceTester.java
assertExpectedBytes(out.toByteArray()); } public void testCopyTo_byteSink() throws IOException { final ByteArrayOutputStream out = new ByteArrayOutputStream(); // HERESY! but it's ok just for this I guess source.copyTo( new ByteSink() { @Override public OutputStream openStream() throws IOException { return out; } });
Registered: Wed Jun 12 16:38:11 UTC 2024 - Last Modified: Wed Sep 06 17:04:31 UTC 2023 - 8.6K bytes - Viewed (0)