Mostrando 161 - 174 Resultados de 174 Para Buscar '"Cáller"', tiempo de consulta: 0.08s Limitar resultados
  1. 161
    por Bryant, Russell
    Publicado 2013
    Tabla de Contenidos: “…Internationalization -- Devices External to the Asterisk Server -- PSTN Connectivity, DAHDI, Digium Cards, and Analog Phones -- DAHDI Drivers -- Asterisk -- Caller ID -- Language and/or Accent of Prompts -- Time/Date Stamps and Pronunciation -- Conclusion-Easy Reference Cheat Sheet -- Chapter 10. …”
    Libro electrónico
  2. 162
    Publicado 2016
    Tabla de Contenidos: “…Testing Navigation Forms -- Maintaining the Navigation Form -- Edit a Navigation form item -- Delete a Navigation Form tab item -- Move a Navigation form item -- Displaying the Navigation Form at Startup -- Part VII The Part of Tens -- Chapter 24 Ten Common Problems -- That's Just Not Normal -- You Type 73.725, but It Changes to 74 -- The Words They Are A-Changing -- Was There and Now It's Gone -- Undo -- Search for the missing record -- Backup recovery -- You Run a Query, but the Results Aren't What You Expect -- The Dreaded Parameter Dialog Box -- The Slowest Database in Town -- Your Database File Is as Big as a Whale -- You Get a Mess When Importing Your Spreadsheet -- We're Sorry -- Your Database File Is Corrupt -- Chapter 25 Ten Uncommon Tips -- Document Everything as Though One Day You'll be Questioned by the FBI -- Keep Your Fields as Small as Possible -- Use Number Fields for Real Numbers -- Validate Your Data -- Use Understandable Names to Keep Things Simple -- Delete with Great Caution -- Backup, Backup, Backup -- Think, Think, and Think Again -- Get Organized and Stay Organized -- There's No Shame in Asking for Help -- Appendix A: Getting Help -- Asking Access for Help -- Installed Help files -- Asking the right questions -- Online Help -- Office.com -- Search engines and other sites -- Who's Our Next Caller? -- Voice calls -- TDD/TT calls -- Index -- EULA…”
    Libro electrónico
  3. 163
    por Camarillo, Gonzalo
    Publicado 2008
    Tabla de Contenidos: “…-- 1.4 Relation between IMS and non-IMS Services -- 2 The History of the IMS Standardization -- 2.1 Relations between IMS-related Standardization Bodies -- 2.3 Third Generation Partnership Project -- 2.4 Third Generation Partnership Project 2 -- 2.5 IETF-3GPP/3GPP2 Collaboration -- 2.6 Open Mobile Alliance -- 3 General Principles of the IMS Architecture -- 3.1 From Circuit-switched to Packet-switched -- 3.2 IMS Requirements -- 3.3 Overview of Protocols used in the IMS -- 3.4 Overview of IMS Architecture -- 3.5 Identification in the IMS -- 3.6 SIM, USIM, and ISIM in 3GPP -- 3.7 Next Generation Networks (NGN) -- Part II The Signaling Plane in the IMS -- 4 Session Control on the Internet -- 4.1 SIP Functionality -- 4.2 SIP Entities -- 4.3 Message Format -- 4.4 The Start Line in SIP Responses: the Status Line -- 4.5 The Start Line in SIP Requests: the Request Line -- 4.6 Header Fields -- 4.7 Message Body -- 4.8 SIP Transactions -- 4.9 Message Flow for Session Establishment -- 4.10 SIP Dialogs -- 4.11 Extending SIP -- 4.12 Caller Preferences and User Agent Capabilities -- 4.13 Reliability of Provisional Responses -- 4.14 Preconditions -- 4.15 Event Notification -- 4.16 Signaling Compression -- 4.17 Content Indirection -- 4.18 The REFER Method -- 4.19 Globally Routable User- Agent URIs (GRUU) -- 4.20 NAT Traversal -- 5 Session Control in the IMS -- 5.1 Prerequisites for Operation in the IMS -- 5.2 IPv4 and IPv6 in the IMS -- 5.3 IP Connectivity Access Network -- 5.4 P-CSCF Discovery -- 5.5 IMS-level Registration -- 5.6 Subscription to the reg Event State -- 5.7 Basic Session Setup -- 5.8 Application Servers: Providing Services to Users…”
    Libro electrónico
  4. 164
    Publicado 2021
    Tabla de Contenidos: “…Methods -- 8.1 Controlling Method Scope (Access Modifiers) -- Problem -- Solution -- Discussion -- 8.2 Calling a Method on a Superclass or Trait -- Problem -- Solution -- 8.3 Using Parameter Names When Calling a Method -- Problem -- Solution -- Discussion -- 8.4 Setting Default Values for Method Parameters -- Problem -- Solution -- Discussion -- 8.5 Creating Methods That Take Variable-Argument Fields -- Problem -- Solution -- Discussion -- 8.6 Forcing Callers to Leave Parentheses Off Accessor Methods -- Problem -- Solution -- Discussion -- See Also -- 8.7 Declaring That a Method Can Throw an Exception -- Problem -- Solution -- Discussion -- See Also -- 8.8 Supporting a Fluent Style of Programming -- Problem -- Solution -- Discussion -- See Also -- 8.9 Adding New Methods to Closed Classes with Extension Methods -- Problem -- Solution -- Discussion -- See Also -- Chapter 9. …”
    Libro electrónico
  5. 165
    Publicado 2016
    “…Covering topics from guns to abortion, the morality of drinking alone, hating a sports team, and being rude to cold callers, the essays will make you think again about the judgements we make on a daily basis and the ways in which we choose to conduct our lives…”
    Libro electrónico
  6. 166
    Publicado 2021
    Tabla de Contenidos: “…-- 4.4 How ownership moves -- 4.5 Resolving ownership issues -- 4.5.1 Use references where full ownership is not required -- 4.5.2 Use fewer long-lived values -- 4.5.3 Duplicate the value -- 4.5.4 Wrap data within specialty types -- Summary -- Part 2 Demystifying systems programming -- 5 Data in depth -- 5.1 Bit patterns and types -- 5.2 Life of an integer -- 5.2.1 Understanding endianness -- 5.3 Representing decimal numbers -- 5.4 Floating-point numbers -- 5.4.1 Looking inside an f32 -- 5.4.2 Isolating the sign bit -- 5.4.3 Isolating the exponent -- 5.4.4 Isolate the mantissa -- 5.4.5 Dissecting a floating-point number -- 5.5 Fixed-point number formats -- 5.6 Generating random probabilities from random bytes -- 5.7 Implementing a CPU to establish that functions are also data -- 5.7.1 CPU RIA/1: The Adder -- 5.7.2 Full code listing for CPU RIA/1: The Adder -- 5.7.3 CPU RIA/2: The Multiplier -- 5.7.4 CPU RIA/3: The Caller -- 5.7.5 CPU 4: Adding the rest -- Summary -- 6 Memory -- 6.1 Pointers -- 6.2 Exploring Rust's reference and pointer types -- 6.2.1 Raw pointers in Rust -- 6.2.2 Rust's pointer ecosystem -- 6.2.3 Smart pointer building blocks -- 6.3 Providing programs with memory for their data -- 6.3.1 The stack -- 6.3.2 The heap -- 6.3.3 What is dynamic memory allocation? …”
    Libro electrónico
  7. 167
    por Kotelly, Blade
    Publicado 2003
    “…Instead of prompting callers to choose an option by entering numbers, the system asks questions and understands spoken responses. …”
    Libro electrónico
  8. 168
    Publicado 2010
    “…You will learn how to use Google Voice's tons of cool features that go beyond mere voicemail and call forwarding, including: " Connecting phones using one number, and manage which phone rings when-by time, by caller, and more. " Find out who's calling so you can answer or route the call to voicemail. " Get transcribed voicemail messages delivered to an email inbox. " Record personalized voicemail greetings for specific callers. " Record calls and save the recordings online Google Voice is a revolutionary new free service, which lets you manage all your phone numbers through a single number, among many other cool features Organized into lessons that distill the most crucial information on each Google Voice topic Tips and cautions point out shortcuts, solutions, and help you avoid common pitfalls…”
    Libro electrónico
  9. 169
    Publicado 2009
    “…* What is the basis of the communicative asymmetries between hosts and callers?* How are their arguments constructed, and in what ways does the setting enable and constrain the production of conflict talk?…”
    Libro
  10. 170
    Publicado 2017
    “…You will learn: The ease with which you can scale an application’s services up and down How Reactive systems provide process resilience during service interruptions Techniques for performing a rolling upgrade of an application’s key services How the Lightbend Enterprise Suite enables callers to locate the correct service addresses A solution for collecting and consolidating logs generated by the application Out-of-the-box defenses against network partitions that occur when parts of the network become unreachable…”
    Libro electrónico
  11. 171
    Publicado 2005
    “…Asterisk: The Future of Telephony outlines all the options, and shows you how to set up voicemail services, call conferencing, interactive voice response, call waiting, caller ID, and more. You'll also learn how Asterisk merges voice and data traffic seamlessly across disparate networks. …”
    Libro electrónico
  12. 172
    Publicado 2016
    “…In the final project, we combine Flask with more modern technologies, such as Twitter's Bootstrap and the NoSQL database MongoDB, to create a Waiter Caller application that allows restaurant patrons to easily call a waiter to their table. …”
    Libro electrónico
  13. 173
    Publicado 2018
    “…Includes Lucy Wyman's (Puppet) primer on blockchain technology and Mack Hendricks's (CEO, Flyball) session on using blockchain technology to stop fraudulent calls on telephone caller ID systems. Cloud strategies and implementation: Discover how cloud strategies and implementations impact business. …”
    Video
  14. 174
    Publicado 2016
    “…Run through new forms of type declarations and assignments, source code callers, static using syntax, auto-property initializers, dictionary initializers, null conditional operators, and many others. …”
    Libro electrónico