Search Options

Results per page
Sort
Preferred Languages
Advance

Results 701 - 710 of 773 for sempre (0.45 sec)

  1. okhttp/api/android/okhttp.api

    	public final fun path ()Ljava/lang/String;
    	public final fun persistent ()Z
    	public final fun sameSite ()Ljava/lang/String;
    	public final fun secure ()Z
    	public fun toString ()Ljava/lang/String;
    	public final fun value ()Ljava/lang/String;
    }
    
    public final class okhttp3/Cookie$Builder {
    	public fun <init> ()V
    	public final fun build ()Lokhttp3/Cookie;
    Registered: Fri Sep 05 11:42:10 UTC 2025
    - Last Modified: Sat Aug 16 09:39:51 UTC 2025
    - 69.4K bytes
    - Viewed (0)
  2. src/main/webapp/css/admin/adminlte.min.css.map

    .pace .pace-activity {\n  border-color: #007bff transparent transparent;\n}\n\n.pace-center-radar-primary .pace .pace-activity::before {\n  border-color: #007bff transparent transparent;\n}\n\n.pace-center-simple-primary .pace {\n  background: #fff;\n  border-color: #007bff;\n}\n\n.pace-center-simple-primary .pace .pace-progress {\n  background: #007bff;\n}\n\n.pace-material-primary .pace {\n  color: #007bff;\n}\n\n.pace-corner-indicator-primary .pace .pace-activity {\n  background: #007bff;\n}\n\n....
    Registered: Thu Sep 04 12:52:25 UTC 2025
    - Last Modified: Sat Oct 26 01:49:09 UTC 2024
    - 3.7M bytes
    - Viewed (1)
  3. guava-tests/test/com/google/common/hash/HashTestUtils.java

       * 'affect' a bit(j) in the output if two inputs, identical but for bit(i), will differ at output
       * bit(j) about half the time
       *
       * <p>Funneling is pretty simple to detect. The key idea is to find example keys which
       * unequivocally demonstrate that funneling cannot be occurring. This is done bit-by-bit. For each
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Mon Aug 11 19:31:30 UTC 2025
    - 25.6K bytes
    - Viewed (0)
  4. src/main/java/jcifs/smb1/smb1/NtlmPasswordAuthentication.java

     * Lesser General Public License for more details.
     *
     * You should have received a copy of the GNU Lesser General Public
     * License along with this library; if not, write to the Free Software
     * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA  02111-1307  USA
     */
    
    package jcifs.smb1.smb1;
    
    import java.io.Serializable;
    import java.io.UnsupportedEncodingException;
    import java.security.GeneralSecurityException;
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Sat Aug 16 01:32:48 UTC 2025
    - 26.7K bytes
    - Viewed (0)
  5. docs/LICENSE

         copyright and certain other rights. Our licenses are
         irrevocable. Licensors should read and understand the terms
         and conditions of the license they choose before applying it.
         Licensors should also secure all rights necessary before
         applying our licenses so that the public can reuse the
         material as expected. Licensors should clearly mark any
         material not subject to the license. This includes other CC-
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Mon May 10 16:50:06 UTC 2021
    - 18.2K bytes
    - Viewed (0)
  6. cmd/bucket-replication-utils.go

    	VersionPurgeStatus    VersionPurgeStatusType
    	ResyncTimestamp       string
    	ReplicationResynced   bool // true only if resync attempted for this target
    	endpoint              string
    	secure                bool
    	Err                   error // replication error if any
    }
    
    // Empty returns true for a target if arn is empty
    func (rt replicatedTargetInfo) Empty() bool {
    	return rt.Arn == ""
    }
    
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 26K bytes
    - Viewed (0)
  7. CHANGELOG/CHANGELOG-1.5.md

      * kube-apiserver learned the '--anonymous-auth' flag, which defaults to true. When enabled, requests to the secure port that are not rejected by other configured authentication methods are treated as anonymous requests, and given a username of 'system:anonymous' and a group of 'system:unauthenticated'.
    Registered: Fri Sep 05 09:05:11 UTC 2025
    - Last Modified: Thu Dec 24 02:28:26 UTC 2020
    - 136.4K bytes
    - Viewed (0)
  8. cmd/bucket-replication.go

    	if versionID == "" {
    		versionID = dobj.VersionID
    	}
    
    	rinfo = dobj.ReplicationState.targetState(tgt.ARN)
    	rinfo.OpType = dobj.OpType
    	rinfo.endpoint = tgt.EndpointURL().Host
    	rinfo.secure = tgt.EndpointURL().Scheme == "https"
    	defer func() {
    		if rinfo.ReplicationStatus == replication.Completed && tgt.ResetID != "" && dobj.OpType == replication.ExistingObjectReplicationType {
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 118K bytes
    - Viewed (0)
  9. docs/en/docs/async.md

    But you can also exploit the benefits of parallelism and multiprocessing (having multiple processes running in parallel) for **CPU bound** workloads like those in Machine Learning systems.
    
    That, plus the simple fact that Python is the main language for **Data Science**, Machine Learning and especially Deep Learning, make FastAPI a very good match for Data Science / Machine Learning web APIs and applications (among many others).
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 09:56:21 UTC 2025
    - 24K bytes
    - Viewed (0)
  10. CHANGELOG/CHANGELOG-1.11.md

    * kubeadm: kubelets in kubeadm clusters now disable the readonly port (10255). If you're relying on unauthenticated access to the readonly port, please switch to using the secure port (10250). Instead, you can now use ServiceAccount tokens when talking to the secure port, which will make it easier to get access to, for example, the `/metrics` endpoint of the kubelet, securely. ([#64187](https://github.com/kubernetes/kubernetes/pull/64187), [@luxas](https://github.com/luxas))...
    Registered: Fri Sep 05 09:05:11 UTC 2025
    - Last Modified: Thu Feb 06 06:04:15 UTC 2020
    - 328.4K bytes
    - Viewed (0)
Back to top