Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Història 23
- Engineering & Applied Sciences 11
- Electrical & Computer Engineering 9
- iPhone (Smartphone) 8
- Development 7
- Fonts 7
- Internet telephony 7
- Telecommunications 7
- Application software 6
- Església Catòlica 6
- Smartphones 6
- C# (Computer program language) 5
- Computer software 4
- Historia 4
- Java (Computer program language) 4
- Llucifer 4
- Microsoft .NET Framework 4
- Mobile computing 4
- Security measures 4
- Teologia 4
- Asterisk (Computer file) 3
- Computer networks 3
- Computer programs 3
- Congressos 3
- Cultura sarda 3
- Fonts històriques 3
- Pocket computers 3
- Alberti, Ottorino Pietro 2
- Castell de Càller (Sardenya, Itàlia) 2
- Catecismes 2
-
161por Bryant, RussellTabla de Contenidos: “…Internationalization -- Devices External to the Asterisk Server -- PSTN Connectivity, DAHDI, Digium Cards, and Analog Phones -- DAHDI Drivers -- Asterisk -- Caller ID -- Language and/or Accent of Prompts -- Time/Date Stamps and Pronunciation -- Conclusion-Easy Reference Cheat Sheet -- Chapter 10. …”
Publicado 2013
Libro electrónico -
162Publicado 2016Tabla de Contenidos: “…Testing Navigation Forms -- Maintaining the Navigation Form -- Edit a Navigation form item -- Delete a Navigation Form tab item -- Move a Navigation form item -- Displaying the Navigation Form at Startup -- Part VII The Part of Tens -- Chapter 24 Ten Common Problems -- That's Just Not Normal -- You Type 73.725, but It Changes to 74 -- The Words They Are A-Changing -- Was There and Now It's Gone -- Undo -- Search for the missing record -- Backup recovery -- You Run a Query, but the Results Aren't What You Expect -- The Dreaded Parameter Dialog Box -- The Slowest Database in Town -- Your Database File Is as Big as a Whale -- You Get a Mess When Importing Your Spreadsheet -- We're Sorry -- Your Database File Is Corrupt -- Chapter 25 Ten Uncommon Tips -- Document Everything as Though One Day You'll be Questioned by the FBI -- Keep Your Fields as Small as Possible -- Use Number Fields for Real Numbers -- Validate Your Data -- Use Understandable Names to Keep Things Simple -- Delete with Great Caution -- Backup, Backup, Backup -- Think, Think, and Think Again -- Get Organized and Stay Organized -- There's No Shame in Asking for Help -- Appendix A: Getting Help -- Asking Access for Help -- Installed Help files -- Asking the right questions -- Online Help -- Office.com -- Search engines and other sites -- Who's Our Next Caller? -- Voice calls -- TDD/TT calls -- Index -- EULA…”
Libro electrónico -
163por Camarillo, GonzaloTabla de Contenidos: “…-- 1.4 Relation between IMS and non-IMS Services -- 2 The History of the IMS Standardization -- 2.1 Relations between IMS-related Standardization Bodies -- 2.3 Third Generation Partnership Project -- 2.4 Third Generation Partnership Project 2 -- 2.5 IETF-3GPP/3GPP2 Collaboration -- 2.6 Open Mobile Alliance -- 3 General Principles of the IMS Architecture -- 3.1 From Circuit-switched to Packet-switched -- 3.2 IMS Requirements -- 3.3 Overview of Protocols used in the IMS -- 3.4 Overview of IMS Architecture -- 3.5 Identification in the IMS -- 3.6 SIM, USIM, and ISIM in 3GPP -- 3.7 Next Generation Networks (NGN) -- Part II The Signaling Plane in the IMS -- 4 Session Control on the Internet -- 4.1 SIP Functionality -- 4.2 SIP Entities -- 4.3 Message Format -- 4.4 The Start Line in SIP Responses: the Status Line -- 4.5 The Start Line in SIP Requests: the Request Line -- 4.6 Header Fields -- 4.7 Message Body -- 4.8 SIP Transactions -- 4.9 Message Flow for Session Establishment -- 4.10 SIP Dialogs -- 4.11 Extending SIP -- 4.12 Caller Preferences and User Agent Capabilities -- 4.13 Reliability of Provisional Responses -- 4.14 Preconditions -- 4.15 Event Notification -- 4.16 Signaling Compression -- 4.17 Content Indirection -- 4.18 The REFER Method -- 4.19 Globally Routable User- Agent URIs (GRUU) -- 4.20 NAT Traversal -- 5 Session Control in the IMS -- 5.1 Prerequisites for Operation in the IMS -- 5.2 IPv4 and IPv6 in the IMS -- 5.3 IP Connectivity Access Network -- 5.4 P-CSCF Discovery -- 5.5 IMS-level Registration -- 5.6 Subscription to the reg Event State -- 5.7 Basic Session Setup -- 5.8 Application Servers: Providing Services to Users…”
Publicado 2008
Libro electrónico -
164Publicado 2021Tabla de Contenidos: “…Methods -- 8.1 Controlling Method Scope (Access Modifiers) -- Problem -- Solution -- Discussion -- 8.2 Calling a Method on a Superclass or Trait -- Problem -- Solution -- 8.3 Using Parameter Names When Calling a Method -- Problem -- Solution -- Discussion -- 8.4 Setting Default Values for Method Parameters -- Problem -- Solution -- Discussion -- 8.5 Creating Methods That Take Variable-Argument Fields -- Problem -- Solution -- Discussion -- 8.6 Forcing Callers to Leave Parentheses Off Accessor Methods -- Problem -- Solution -- Discussion -- See Also -- 8.7 Declaring That a Method Can Throw an Exception -- Problem -- Solution -- Discussion -- See Also -- 8.8 Supporting a Fluent Style of Programming -- Problem -- Solution -- Discussion -- See Also -- 8.9 Adding New Methods to Closed Classes with Extension Methods -- Problem -- Solution -- Discussion -- See Also -- Chapter 9. …”
Libro electrónico -
165Publicado 2016“…Covering topics from guns to abortion, the morality of drinking alone, hating a sports team, and being rude to cold callers, the essays will make you think again about the judgements we make on a daily basis and the ways in which we choose to conduct our lives…”
Libro electrónico -
166Publicado 2021Tabla de Contenidos: “…-- 4.4 How ownership moves -- 4.5 Resolving ownership issues -- 4.5.1 Use references where full ownership is not required -- 4.5.2 Use fewer long-lived values -- 4.5.3 Duplicate the value -- 4.5.4 Wrap data within specialty types -- Summary -- Part 2 Demystifying systems programming -- 5 Data in depth -- 5.1 Bit patterns and types -- 5.2 Life of an integer -- 5.2.1 Understanding endianness -- 5.3 Representing decimal numbers -- 5.4 Floating-point numbers -- 5.4.1 Looking inside an f32 -- 5.4.2 Isolating the sign bit -- 5.4.3 Isolating the exponent -- 5.4.4 Isolate the mantissa -- 5.4.5 Dissecting a floating-point number -- 5.5 Fixed-point number formats -- 5.6 Generating random probabilities from random bytes -- 5.7 Implementing a CPU to establish that functions are also data -- 5.7.1 CPU RIA/1: The Adder -- 5.7.2 Full code listing for CPU RIA/1: The Adder -- 5.7.3 CPU RIA/2: The Multiplier -- 5.7.4 CPU RIA/3: The Caller -- 5.7.5 CPU 4: Adding the rest -- Summary -- 6 Memory -- 6.1 Pointers -- 6.2 Exploring Rust's reference and pointer types -- 6.2.1 Raw pointers in Rust -- 6.2.2 Rust's pointer ecosystem -- 6.2.3 Smart pointer building blocks -- 6.3 Providing programs with memory for their data -- 6.3.1 The stack -- 6.3.2 The heap -- 6.3.3 What is dynamic memory allocation? …”
Libro electrónico -
167por Kotelly, Blade“…Instead of prompting callers to choose an option by entering numbers, the system asks questions and understands spoken responses. …”
Publicado 2003
Libro electrónico -
168Publicado 2010“…You will learn how to use Google Voice's tons of cool features that go beyond mere voicemail and call forwarding, including: " Connecting phones using one number, and manage which phone rings when-by time, by caller, and more. " Find out who's calling so you can answer or route the call to voicemail. " Get transcribed voicemail messages delivered to an email inbox. " Record personalized voicemail greetings for specific callers. " Record calls and save the recordings online Google Voice is a revolutionary new free service, which lets you manage all your phone numbers through a single number, among many other cool features Organized into lessons that distill the most crucial information on each Google Voice topic Tips and cautions point out shortcuts, solutions, and help you avoid common pitfalls…”
Libro electrónico -
169Publicado 2009“…* What is the basis of the communicative asymmetries between hosts and callers?* How are their arguments constructed, and in what ways does the setting enable and constrain the production of conflict talk?…”
Libro -
170Publicado 2017“…You will learn: The ease with which you can scale an application’s services up and down How Reactive systems provide process resilience during service interruptions Techniques for performing a rolling upgrade of an application’s key services How the Lightbend Enterprise Suite enables callers to locate the correct service addresses A solution for collecting and consolidating logs generated by the application Out-of-the-box defenses against network partitions that occur when parts of the network become unreachable…”
Libro electrónico -
171Publicado 2005“…Asterisk: The Future of Telephony outlines all the options, and shows you how to set up voicemail services, call conferencing, interactive voice response, call waiting, caller ID, and more. You'll also learn how Asterisk merges voice and data traffic seamlessly across disparate networks. …”
Libro electrónico -
172Publicado 2016“…In the final project, we combine Flask with more modern technologies, such as Twitter's Bootstrap and the NoSQL database MongoDB, to create a Waiter Caller application that allows restaurant patrons to easily call a waiter to their table. …”
Libro electrónico -
173Publicado 2018“…Includes Lucy Wyman's (Puppet) primer on blockchain technology and Mack Hendricks's (CEO, Flyball) session on using blockchain technology to stop fraudulent calls on telephone caller ID systems. Cloud strategies and implementation: Discover how cloud strategies and implementations impact business. …”
-
174Publicado 2016“…Run through new forms of type declarations and assignments, source code callers, static using syntax, auto-property initializers, dictionary initializers, null conditional operators, and many others. …”
Libro electrónico