Search Options

Display Count
Sort
Preferred Language
Advanced Search

Results 41 - 50 of over 10,000 for usen (0.03 seconds)

  1. android/guava-testlib/src/com/google/common/testing/GcFinalization.java

        // load timeout multiplier.  Or we could try to use a CPU time bound instead of wall clock time
        // bound.  But these ideas are harder to implement.  We do not try to detect or handle a
        // user-specified -XX:+DisableExplicitGC.
        //
        // TODO(user): Consider using
        // java/lang/management/OperatingSystemMXBean.html#getSystemLoadAverage()
        //
        // TODO(user): Consider scaling by number of mutator threads,
    Created: Fri Apr 03 12:43:13 GMT 2026
    - Last Modified: Thu Mar 12 20:19:19 GMT 2026
    - 12.3K bytes
    - Click Count (0)
  2. SECURITY.md

    [JAX](https://jax.readthedocs.io/en/latest/jax-101/02-jitting.html)
    documentation should be safe, while some of the testing and debugging tools that
    come with the compiler are not designed to be used with untrusted data and
    should be used with caution when working with untrusted models.
    
    ### Saved graphs and checkpoints
    
    When loading untrusted serialized computation graphs (in form of a `GraphDef`,
    Created: Tue Apr 07 12:39:13 GMT 2026
    - Last Modified: Wed Oct 16 16:10:43 GMT 2024
    - 9.6K bytes
    - Click Count (0)
  3. docs/en/docs/advanced/openapi-callbacks.md

    These invoices will have an `id`, `title` (optional), `customer`, and `total`.
    
    The user of your API (an external developer) will create an invoice in your API with a POST request.
    
    Then your API will (let's imagine):
    
    * Send the invoice to some customer of the external developer.
    * Collect the money.
    * Send a notification back to the API user (the external developer).
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Thu Mar 05 18:13:19 GMT 2026
    - 7.7K bytes
    - Click Count (0)
  4. docs/sts/ldap.md

    - The user can now use these credentials to make requests to the MinIO server.
    
    The administrator will associate IAM access policies with each group and if required with the user too. The MinIO server then evaluates applicable policies on a user (these are the policies associated with the groups along with the policy on the user if any) to check if the request should be allowed or denied.
    
    Created: Sun Apr 05 19:28:12 GMT 2026
    - Last Modified: Tue Aug 12 18:20:36 GMT 2025
    - 18.9K bytes
    - Click Count (0)
  5. README.md

    track][tls_history] the dynamic TLS ecosystem and adjust OkHttp to improve connectivity and
    security.
    
    OkHttp uses your platform's built-in TLS implementation. On Java platforms OkHttp also supports
    [Conscrypt][conscrypt], which integrates [BoringSSL](https://github.com/google/boringssl) with Java. OkHttp will use Conscrypt if it is
    the first security provider:
    
    ```java
    Security.insertProviderAt(Conscrypt.newProvider(), 1);
    ```
    Created: Fri Apr 03 11:42:14 GMT 2026
    - Last Modified: Thu Oct 30 21:39:59 GMT 2025
    - 9.5K bytes
    - Click Count (0)
  6. LICENSE

    product received by a particular user, "normally used" refers to a
    typical or common use of that class of product, regardless of the status
    of the particular user or of the way in which the particular user
    actually uses, or expects or is expected to use, the product.  A product
    is a consumer product regardless of whether the product has substantial
    commercial, industrial or non-consumer uses, unless such uses represent
    Created: Sun Apr 05 19:28:12 GMT 2026
    - Last Modified: Fri Apr 23 18:58:53 GMT 2021
    - 33.7K bytes
    - Click Count (0)
  7. compat/maven-embedder/src/site/apt/logging.apt

     Maven Logging
     -----
     Hervé Boutemy
     -----
     2013-08-02
     -----
    
    Maven Logging
    
     {{{/maven-logging.html}End-user logging documentation}} is available {{{/maven-logging.html}in Maven site}}.
     This documentation is focused on internal implementation details.
    
    * Logging API
    
     Maven uses
     {{{https://codehaus-plexus.github.io/plexus-containers/plexus-container-default/apidocs/org/codehaus/plexus/logging/package-summary.html}Plexus
    Created: Sun Apr 05 03:35:12 GMT 2026
    - Last Modified: Fri Oct 25 12:31:46 GMT 2024
    - 4.1K bytes
    - Click Count (0)
  8. android/guava/src/com/google/common/collect/MapMaker.java

     *
     * <p><b>Note:</b> by default, the returned map uses equality comparisons (the {@link Object#equals
     * equals} method) to determine equality for keys or values. However, if {@link #weakKeys} was
     * specified, the map uses identity ({@code ==}) comparisons instead for keys. Likewise, if {@link
     * #weakValues} was specified, the map uses identity comparisons for values.
     *
    Created: Fri Apr 03 12:43:13 GMT 2026
    - Last Modified: Thu Aug 07 16:05:33 GMT 2025
    - 12.8K bytes
    - Click Count (0)
  9. docs/en/docs/advanced/testing-dependencies.md

    ### Use cases: external service { #use-cases-external-service }
    
    An example could be that you have an external authentication provider that you need to call.
    
    You send it a token and it returns an authenticated user.
    
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Sun Aug 31 09:15:41 GMT 2025
    - 2.4K bytes
    - Click Count (0)
  10. docs/en/docs/tutorial/request-forms.md

    With `Form` you can declare the same configurations as with `Body` (and `Query`, `Path`, `Cookie`), including validation, examples, an alias (e.g. `user-name` instead of `username`), etc.
    
    /// info
    
    `Form` is a class that inherits directly from `Body`.
    
    ///
    
    /// tip
    
    To declare form bodies, you need to use `Form` explicitly, because without it the parameters would be interpreted as query parameters or body (JSON) parameters.
    
    ///
    
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Thu Mar 05 18:13:19 GMT 2026
    - 2.6K bytes
    - Click Count (0)
Back to Top