Search Options

Results per page
Sort
Preferred Languages
Advance

Results 31 - 40 of 843 for complex (0.06 sec)

  1. SECURITY.md

        violates the use cases and security assumptions defined in the threat model.
        This will help us evaluate your report quickly, especially if the issue is
        complex.
      - Whether this vulnerability is public or known to third parties. If it is,
        please provide details.
    
    We will try to fix the problems as soon as possible. Vulnerabilities will, in
    Registered: Tue Nov 05 12:39:12 UTC 2024
    - Last Modified: Wed Oct 16 16:10:43 UTC 2024
    - 9.6K bytes
    - Viewed (0)
  2. futures/listenablefuture1/src/com/google/common/util/concurrent/ListenableFuture.java

       * The listener will run when the {@code Future}'s computation is {@linkplain Future#isDone()
       * complete} or, if the computation is already complete, immediately.
       *
       * <p>There is no guaranteed ordering of execution of listeners, but any listener added through
       * this method is guaranteed to be called once the computation is complete.
       *
       * <p>Exceptions thrown by a listener will be propagated up to the executor. Any exception thrown
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Mon Jun 26 21:13:41 UTC 2023
    - 8K bytes
    - Viewed (0)
  3. guava/src/com/google/common/util/concurrent/ListenableFuture.java

       * The listener will run when the {@code Future}'s computation is {@linkplain Future#isDone()
       * complete} or, if the computation is already complete, immediately.
       *
       * <p>There is no guaranteed ordering of execution of listeners, but any listener added through
       * this method is guaranteed to be called once the computation is complete.
       *
       * <p>Exceptions thrown by a listener will be propagated up to the executor. Any exception thrown
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Mon Jun 26 21:13:41 UTC 2023
    - 8K bytes
    - Viewed (0)
  4. docs/en/docs/tutorial/background-tasks.md

    They tend to require more complex configurations, a message/job queue manager, like RabbitMQ or Redis, but they allow you to run background tasks in multiple processes, and especially, in multiple servers.
    
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Sun Oct 27 15:22:48 UTC 2024
    - 4.8K bytes
    - Viewed (0)
  5. docs/en/docs/async.md

    But before that, handling asynchronous code was quite more complex and difficult.
    
    In previous versions of Python, you could have used threads or <a href="https://www.gevent.org/" class="external-link" target="_blank">Gevent</a>. But the code is way more complex to understand, debug, and think about.
    
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Wed Aug 28 23:33:37 UTC 2024
    - 23.5K bytes
    - Viewed (0)
  6. docs/en/docs/tutorial/security/get-current-user.md

    But here's the key point.
    
    The security and dependency injection stuff is written once.
    
    And you can make it as complex as you want. And still, have it written only once, in a single place. With all the flexibility.
    
    But you can have thousands of endpoints (*path operations*) using the same security system.
    
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Sun Oct 06 20:36:54 UTC 2024
    - 7.4K bytes
    - Viewed (0)
  7. docs/en/docs/tutorial/body.md

    To send data, you should use one of: `POST` (the more common), `PUT`, `DELETE` or `PATCH`.
    
    Sending a body with a `GET` request has an undefined behavior in the specifications, nevertheless, it is supported by FastAPI, only for very complex/extreme use cases.
    
    As it is discouraged, the interactive docs with Swagger UI won't show the documentation for the body when using `GET`, and proxies in the middle might not support it.
    
    ///
    
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Sun Oct 27 16:58:19 UTC 2024
    - 6.6K bytes
    - Viewed (0)
  8. architecture/security/istio-agent.md

    For discovery, the JWT token will be read directly from a file and sent as is. For CA, this logic is a bit more complex,
    as the support for external CAs is more mature than external discovery servers. This supports some additional
    configuration, a `CredentialFetcher` which allows fetching a token from places other than a file (for example, a local
    Registered: Wed Nov 06 22:53:10 UTC 2024
    - Last Modified: Thu Jul 18 23:11:18 UTC 2024
    - 7.2K bytes
    - Viewed (0)
  9. api/maven-api-core/src/main/java/org/apache/maven/api/package-info.java

     * <p><dfn>Dependency collection</dfn> builds a graph of {@link org.apache.maven.api.Node} objects representing
     * all the dependencies.</p>
     *
     * <p>The <dfn>Dependency graph flattening</dfn> process in Maven involves reducing a complex,
     * multi-level dependency graph to a simpler list where only the most relevant version of each artifact
     * (based on groupId and artifactId) is retained, resolving conflicts and eliminating duplicates to ensure
    Registered: Sun Nov 03 03:35:11 UTC 2024
    - Last Modified: Tue Aug 27 21:13:34 UTC 2024
    - 6.7K bytes
    - Viewed (0)
  10. guava-tests/test/com/google/common/collect/ImmutableSortedSetTest.java

        assertFalse(set.equals(newHashSet(4, 5, 6)));
        assertFalse(newHashSet(4, 5, 6).equals(set));
    
        Set<String> complex = Sets.newTreeSet(STRING_LENGTH);
        Collections.addAll(complex, "in", "the", "a");
        assertEquals(set, complex);
      }
    
      public void testEquals_bothDefaultOrdering_stringVsInt() {
        SortedSet<String> set = of("a", "b", "c");
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Wed Oct 30 16:15:19 UTC 2024
    - 46.7K bytes
    - Viewed (0)
Back to top