n jargon lexicon and shipping us a
copy.
It is a particular pleasure to acknowledge the major contributions o... requently in the {email} style of UNIX hackers
in particular is a tendency for some things that are normally
a... numbers more freely than in mainstream
usage. In particular, it is good hackish style to write a digit
sequen... the primary.
Where a term can be attributed to a particular subculture or is known
to have originated there,
TO WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A
PARTICULAR PURPOSE. Some states do not allow disclaimers of... for upload and
download; if there's a section of particular relevance to you and
your colleagues, feel free t... people who already know.
In 1989 and 1990, one particular RBOC, BellSouth, which
felt particularly troubled... itself, can happen, and
can be nobody's fault in particular. It was easier to believe,
maybe even in some od
commitment
mechanisms used to overcome them in a particular virtual community, the
WELL. Drawing upon ethnog... into and transformed by virtual spaces
that is of particular interest.
Method
This paper offers a structured ... he length of most topics, it is
necessary to lift particular posts out of their series and highlight
them. In... iews with participants of various
interactions of particular interest. Interviews were carried out
"on-line",
rage feedback from users of this
handbook. In particular, those who utilize this document to craft
thei... dents. In order to do this, aspects of
the particular organization must be considered.
First, th... ority in on the policy decisions. Though a
particular group (such as a campus information services grou... non-secure machines to more secure machines. In particular, allowing
trusted access (e.g., the BSD Unix r
and resource
management. Network resources of particular interest include link
bandwidth, buffer space,... us about which network resources
are used by a particular flow. This determination may be made at a
ver... ing of a flow (i.e., flow
classification) to a particular set of allocated resources. The
method of flo... fic goals for the delivery
of traffic for a particular service according to the parameters
specifi
d as coming from a member of the group in a
particular epoch, but not encrypted.
PrivateMessage: An... d as coming from a member of the group in a
particular epoch, and encrypted so that it is confidential t... ate in the context described in [MLS-ARCH].
In particular, we assume that the following services are provid... t that leaf is one provided by the member.
In particular, MLS maintains the members' views of the tree in
they're too provincial. By designing data for one particular
use (e.g. a screen snapshot), they preclude futu... y; the latter to optimize
the manipulations of a particular program. The same filed data will
be read into d... f conversion during I/O by "foreign"
programs. A particular data chunk may be specified with a different
for... eaning
of these characters within FTXT forms. In particular, character values
hex 7F through hex 9F are cont
party can make an informed decision whether a
particular certificate is trustworthy and relevant for its i... ic processing is necessary to determine whether a particular
certificate meets the predefined prerequisites... ments are
intended to identify the holder as a particular person or as a member
of the community. The c... ndicate whether the subject is entitled to any
particular information or whether the subject ought to be tr
th a broader usage profile and focus primarily on particular
network connectivity aspects. Other systems, ... es.
The customer expresses requirements for a particular IETF Network
Slice Service by specifying what ... on used to specify network-related conditions for particular
traffic flows in response to an actual or logi... e receivers on any connectivity construct. In
particular, the network may be expected to handle the traffi
checking for bounds on
the buffer involved. In particular, the gets call takes input to
a buffer without d... low testers to verify that mail is
arriving at a particular site without the need to activate the
address re... function attempted to attack a remote host via a particular
user. It first checked to make sure that the hos... appears that the
author\(s\) meant to execute a particular function but used the
wrong invocation. The use
the desired communications standard setting
at a particular modem line speed. Because options can select betw... t. The options for this command are useful when a particular speed
and communication standard are required. B... d in one of several
techniques, depending on the particular modem. See the Installation Guide for
informatio...
options and register values stored depend on the particular modem. These are
indicated on the AT Command Set
hen dial in the numbers he wants forwarded to the particular
number. After each number, a tone will sound ind... SS takes over. Now, whenever some
one calls this particular customer, the customer's switch will compare
the... e will
ring at the original destination. This in particular could make it very
difficult on system hackers, ... nd other sensitive operations can screen calls to particular
numbers by using this service.
This is a se
ods description)
with his own. Note that this particular attack is known as a CUT-
AND-PASTE attack sin...
resolution [DNSSEC] is being used. This is a particular problem when
the hostname is presented at the ... the
mechanisms that are appropriate for their particular threat model.
If a framework is necessary, des... authenticated party has permission to access a particular resource or
service. Although tightly bound,
not wish to provide the information to the
particular requester, or a name server may not wish to perform a
particular operation (e.g., zone transfer) for particular data."
in Section 4.1.1 of [RFC1035].
NODATA: "A ps... ative response: A response that indicates that a particular RRset
does not exist or whose RCODE indicat
e Tetrys protocol in realistic
conditions. In particular, several research issues are discussed in
Sect... g;
* decoding;
* signaling, to carry in particular the symbol IDs in the encoding
window and t... identifies a session among all sessions from a particular Tetrys
encoder. The TSI is scoped by the I... and discussed by
[RFC9265], are adapted to the particular deployment cases of Tetrys
(i.e., above, withi