Asterisk™: The Definitive Guidehttp://www.asteriskdocs.org/en/3rd_Edition/asterisk-book-html/asterisk-book.html
Project The Business Case Conclusion 2. Asterisk Architecture Modules Applications Bridging Modules Call Detail Recording Modules Channel Event Logging Modules Channel Drivers Cod
W3C Public mailing list archiveshttps://lists.w3.org/Archives/Public/
emerging Community and Business Group efforts, including with chairs and other community representatives. View latest messages public-crdt4rdf Subscribe Unsubscribe This is the pu
Security Now! Transcript of Episode #387https://www.grc.com/sn/sn-387.htm
bought IBM's Diskstore business. Steve: Right, the Travelstore line. Leo: Yeah, Travelstore, Diskstore. And then Western Digital bought Hitachi. I think it's shaking out to really
Security Now! Weekly Internet Security Podcast: Steve and Leo discuss the week's major security events and discuss questions and comments from listeners of previous episodes. The
Xanalogical Structure, Needed Now More than Everhttps://cs.brown.edu/memex/ACM_HypertextTestbed/papers/60.html
a literary, legal and business arrangement -- for frictionless, non-negotiated quotation at any time and in any amount. The Web trivialized this original Xanadu model, vastly but
The compositor is evil | Raph Levien’s bloghttps://raphlinus.github.io/ui/graphics/2020/09/13/compositor-is-evil.html
From its roots as a “business” computer, its CPU performance and RAM grew dramatically, but video output was generally a framebuffer with almost none of the capabilities listed ab
First, I want to make it clear that I’m not accusing the compositor of true evil, which I define roughly as deliberately causing suffering. There’s unfortunately too much of th
Find more...