- Sort Score
- Result 10 results
- Languages All
Results 531 - 540 of 636 for ordered (0.22 sec)
-
docs/changelogs/changelog_4x.md
_2020-05-20_ * Fix: Don't crash inspecting whether the host platform is JVM or Android. With 4.7.0 and 4.7.1 we had a crash `IllegalArgumentException: Not a Conscrypt trust manager` because we depended on initialization order of companion objects. ## Version 4.7.1 _2020-05-18_ * Fix: Pass the right arguments in the trust manager created for `addInsecureHost()`. Without the
Registered: Fri Dec 26 11:42:13 UTC 2025 - Last Modified: Wed Apr 17 13:25:31 UTC 2024 - 25.2K bytes - Viewed (0) -
guava/src/com/google/common/reflect/TypeResolver.java
* always a bug if {@code formal} isn't a type variable and contains no type variable. Make * sure you are passing the two parameters in the right order. * @param actual The type that the formal type variable(s) are mapped to. It can be or contain yet * other type variables, in which case these type variables will be further resolved ifRegistered: Fri Dec 26 12:43:10 UTC 2025 - Last Modified: Tue Sep 23 22:30:05 UTC 2025 - 25.3K bytes - Viewed (0) -
docs/features/interceptors.md
 ### Application Interceptors
Registered: Fri Dec 26 11:42:13 UTC 2025 - Last Modified: Sun Feb 06 02:19:09 UTC 2022 - 8.1K bytes - Viewed (0) -
android/guava/src/com/google/common/collect/CompactHashMap.java
* collector by only using a constant number of internal objects. * * <p>If there are no removals, then iteration order for the {@link #entrySet}, {@link #keySet}, and * {@link #values} views is the same as insertion order. Any removal invalidates any ordering * guarantees. * * <p>This class should not be assumed to be universally superior to {@code java.util.HashMap}.Registered: Fri Dec 26 12:43:10 UTC 2025 - Last Modified: Sat Aug 09 01:14:59 UTC 2025 - 35.7K bytes - Viewed (0) -
src/main/java/jcifs/Configuration.java
*/ boolean isDisablePlainTextPasswords(); /** * * * Property {@code jcifs.resolveOrder} (string, default {@code LMHOSTS,DNS,WINS,BCAST}) * * @return order and selection of resolver modules, see {@link ResolverType} */ List<ResolverType> getResolveOrder(); /** * * Property {@code jcifs.netbios.baddr} (string, default {@code 255.255.255.255})Registered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Sun Aug 31 08:00:57 UTC 2025 - 25.4K bytes - Viewed (0) -
src/main/java/org/codelibs/fess/helper/UserInfoHelper.java
protected boolean httpOnly = true; /** * Retrieves the user code for the current request. * The user code is used to uniquely identify users across sessions and requests. * It checks multiple sources in order: request attribute, request parameter, cookie, user bean, or generates a new one. * * @return the user code string, or null if no valid session exists */ public String getUserCode() {Registered: Sat Dec 20 09:19:18 UTC 2025 - Last Modified: Thu Aug 07 03:06:29 UTC 2025 - 14.9K bytes - Viewed (0) -
guava/src/com/google/common/hash/BloomFilterStrategies.java
* of the Bloom filters that use them, thus they must be preserved as is (no updates allowed, only * introduction of new versions). * * <p>Important: the order of the constants cannot change, and they cannot be deleted - we depend on * their ordinal for BloomFilter serialization. * * @author Dimitris Andreou * @author Kurt Alfred Kluever */
Registered: Fri Dec 26 12:43:10 UTC 2025 - Last Modified: Wed Jan 08 14:27:16 UTC 2025 - 10.7K bytes - Viewed (0) -
fess-crawler/src/test/java/org/codelibs/fess/crawler/builder/RequestDataBuilderTest.java
assertEquals("https://api.example.com/users", data.getUrl()); assertEquals(1.2f, data.getWeight(), 0.001f); } public void test_orderIndependence() { // Test that order of method calls doesn't matter RequestData data1 = RequestDataBuilder.newRequestData().url("https://example.com").weight(1.5f).get().build();
Registered: Sat Dec 20 11:21:39 UTC 2025 - Last Modified: Mon Nov 24 03:59:47 UTC 2025 - 10.9K bytes - Viewed (0) -
src/main/java/jcifs/smb1/smb1/ACE.java
* we recommend reading the section on Access Control in Keith Brown's * "The .NET Developer's Guide to Windows Security" (which is also * available online). * <p> * Direct ACEs are evaluated first in order. The SID of the user performing * the operation and the desired access bits are compared to the SID * and access mask of each ACE. If the SID matches, the allow/deny flags * and access mask are considered. If the ACE is a "deny"
Registered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Sat Aug 16 01:32:48 UTC 2025 - 8.8K bytes - Viewed (0) -
src/main/webapp/css/admin/adminlte.min.css.map
.order-sm-5 {\n -ms-flex-order: 5;\n order: 5;\n }\n .order-sm-6 {\n -ms-flex-order: 6;\n order: 6;\n }\n .order-sm-7 {\n -ms-flex-order: 7;\n order: 7;\n }\n .order-sm-8 {\n -ms-flex-order: 8;\n order: 8;\n }\n .order-sm-9 {\n -ms-flex-order: 9;\n order: 9;\n }\n .order-sm-10 {\n -ms-flex-order: 10;\n order: 10;\n }\n .order-sm-11 {\n -ms-flex-order: 11;\n order: 11;\n }\n .order-sm-12 {\n -ms-flex-order: 12;\n order: 12;\n }\n .offset-sm-0...Registered: Sat Dec 20 09:19:18 UTC 2025 - Last Modified: Sat Oct 26 01:49:09 UTC 2024 - 3.7M bytes - Viewed (3)