Search Options

Display Count
Sort
Preferred Language
Advanced Search

Results 41 - 50 of 164 for complex64 (0.06 seconds)

The search processing time has exceeded the limit. The displayed results may be partial.

  1. api/maven-api-core/src/main/java/org/apache/maven/api/services/TransportProvider.java

     * This API does not try to cover all the requirements out there, just the basic ones, and is intentionally simple.
     * If plugin or extension needs anything more complex feature wise (i.e. HTTP range support or alike) it should
     * probably roll its own.
     * <p>
     * This implementation is backed by Maven Resolver API, supported protocols and transport selection depends on it. If
    Created: Sun Apr 05 03:35:12 GMT 2026
    - Last Modified: Thu Mar 23 05:29:39 GMT 2023
    - 2.1K bytes
    - Click Count (0)
  2. docs/fr/docs/history-design-future.md

    Voici un petit bout de cette histoire.
    
    ## Alternatives { #alternatives }
    
    Je crée des API avec des exigences complexes depuis plusieurs années (Machine Learning, systèmes distribués, jobs asynchrones, bases de données NoSQL, etc), en dirigeant plusieurs équipes de développeurs.
    
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Thu Mar 19 18:37:13 GMT 2026
    - 4.8K bytes
    - Click Count (0)
  3. src/test/java/jcifs/pac/PacTest.java

            assertNotNull(e.getMessage());
        }
    
        @Test
        void testMockedSuccessfulParsing() throws PACDecodingException, IOException {
            // Test with mocked PacMac to avoid complex signature calculation
            try (MockedStatic<PacMac> pacMacMock = mockStatic(PacMac.class)) {
                // Mock the calculateMac method to return a valid checksum
                byte[] mockChecksum = new byte[16];
    Created: Sun Apr 05 00:10:12 GMT 2026
    - Last Modified: Thu Aug 14 05:31:44 GMT 2025
    - 7.9K bytes
    - Click Count (0)
  4. docs/pt/docs/async.md

    Mas antes disso, controlar código assíncrono era bem mais complexo e difícil.
    
    Nas versões anteriores do Python, você poderia utilizar threads ou [Gevent](https://www.gevent.org/). Mas o código é bem mais complexo de entender, debugar, e pensar sobre.
    
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Thu Mar 19 18:20:43 GMT 2026
    - 25.2K bytes
    - Click Count (0)
  5. docs/pt/docs/tutorial/security/get-current-user.md

    Mas aqui está o ponto principal.
    
    O código relacionado à segurança e à injeção de dependências é escrito apenas uma vez.
    
    E você pode torná-lo tão complexo quanto quiser. E ainda assim, tê-lo escrito apenas uma vez, em um único lugar. Com toda a flexibilidade.
    
    Mas você pode ter milhares de endpoints (*operações de rota*) usando o mesmo sistema de segurança.
    
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Fri Feb 13 13:48:53 GMT 2026
    - 4.6K bytes
    - Click Count (0)
  6. ci/official/utilities/setup.sh

    # Important: "tfrun foo | bar" is "( tfrun foo ) | bar", not "tfrun (foo | bar)".
    # Therefore, "tfrun" commands cannot include pipes -- which is
    # probably for the better. If a pipe is necessary for something, it is probably
    # complex. Write a well-documented script under utilities/ to encapsulate the
    # functionality instead.
    tfrun() { "$@"; }
    
    if [[ $(uname -s) = MSYS_NT* ]]; then
      source ./ci/official/utilities/windows.sh
    Created: Tue Apr 07 12:39:13 GMT 2026
    - Last Modified: Thu Jan 09 18:37:25 GMT 2025
    - 6.2K bytes
    - Click Count (0)
  7. docs/en/docs/tutorial/security/oauth2-jwt.md

    ## Recap { #recap }
    
    With what you have seen up to now, you can set up a secure **FastAPI** application using standards like OAuth2 and JWT.
    
    In almost any framework handling the security becomes a rather complex subject quite quickly.
    
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Thu Mar 05 18:13:19 GMT 2026
    - 10.7K bytes
    - Click Count (0)
  8. docs/pt/docs/advanced/security/oauth2-scopes.md

    O mais comum é o fluxo implícito.
    
    O mais seguro é o fluxo de código, mas ele é mais complexo para implementar, pois ele necessita mais passos. Como ele é mais complexo, muitos provedores terminam sugerindo o fluxo implícito.
    
    /// note | Nota
    
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Thu Mar 19 18:20:43 GMT 2026
    - 14.9K bytes
    - Click Count (0)
  9. src/test/java/org/codelibs/fess/helper/JobHelperTest.java

                // Mock implementation that doesn't require client
                entity.setLastUpdated(System.currentTimeMillis());
            }
        }
    
        // Simple mock class without complex interface requirements
        private static class MockLaCron implements LaCron {
            @Override
    Created: Tue Mar 31 13:07:34 GMT 2026
    - Last Modified: Fri Mar 13 23:01:26 GMT 2026
    - 6.5K bytes
    - Click Count (0)
  10. docs/en/docs/tutorial/security/get-current-user.md

    But here's the key point.
    
    The security and dependency injection stuff is written once.
    
    And you can make it as complex as you want. And still, have it written only once, in a single place. With all the flexibility.
    
    But you can have thousands of endpoints (*path operations*) using the same security system.
    
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Thu Feb 12 13:19:43 GMT 2026
    - 4K bytes
    - Click Count (0)
Back to Top