search for: withhold

Displaying 20 results from an estimated 50 matches for "withhold".

Did you mean: withheld
2018 Jul 13
2
Withholding Answer Supervision
Hi, Is there any way of telling Asteirsk to withhold answer subversion on a call till I call Answer. My DP looks like this: [incoming] Exten => 18005551212,1,Noop() same => n,Answer same => n,Mset(__uid=${SIPCALLID}) same => n,MixMonitor(/tmp/FROM_CALLER_${uid}-${START}.WAV) same => n,Dial(Local/1 at dial_call_center/n&Local/...
2013 Mar 19
1
Lars package
Hi,   I'm using lars package to run some regression analysis and my doubt now is how can I predict my model to another dataset? Let me explain a little better: I have a dataset from which I withhold some data. With the data that wasn't withheld, I create the model. Now, what I'm not being able to do is apply the model back to the data that I withheld. Any suggestions?   Here it goes the code: require(lars) x <- as.matrix(lars.input[c(1:152)]) y <- lars.input[,c(149)] larsdata &...
2012 Jan 13
1
2.1.rc3 (1a722c7676bb): doveadm mailbox list withholds child mailboxes
Probably I've overlooked something. But a quick search in `hg log -k doveadm` didn't show appropriate information. doveadm mailbox list -u user at example.com doesn't show child mailboxes. mailbox = N/A || \*: Sent Trash INBOX Drafts Junk-E-Mail Supplier mailbox = Supplier*: Supplier mailbox = Supplier/*: Supplier/Dell Supplier/VMware Supplier/? The same problem exists in
2008 Mar 13
1
CallerID setting issue with withheld numbers and mISDN ...
...on the name - this is set in the DDI handling and is dependent on the number called and allows phone users to see which number was called (company trading under different names with different phone numbers type of thing). Again, no issues there - it's working nicely. Until someone calls in withholding their number. Then no amount of Set(CALLERID(name)=somethin) will work. Even if I explicitly do a Set before the dial, it seems to get ignored. Extract from console output: -- Executing NoOp("mISDN/3-1", "CallerID is still "DDI+Joby" <123>") in new st...
2007 Aug 03
3
Sourcing commands but delaying their execution
...NDS does not work because MORE COMMANDS requires the information from the File1 portion of FileMerged. I am looking for a means to source FileMerged but not execute some of the commands immediately. Functionally this would look like: SERIES OF COMMANDS source("FileMerged") # but withhold execution of some of the commands MORE COMMANDS COMMAND TO EXECUTE THE WITHHELD COMMANDS Does R offer some option to accomplish this? Dennis Dennis Fisher MD P < (The "P Less Than" Company) Phone: 1-866-PLessThan (1-866-753-7784) Fax: 1-415-564-2220 www.PLessThan.com
2011 Oct 11
2
BT line: unavailable vs withheld numbers?
...erely unavailable (e.g. because it originated from overseas or passed through some ancient switching equipment) ? In the first case, I want the caller to be played a message to the effect that we are not at home to anonymous cowards but if their business is important, they may redial without withholding their number. In the second case, the call needs to be treated as legitimate since it is not really the caller's fault that their number is not available. Software is Asterisk 1.8.5.0 with DAHDI 2.4.1.2. Hardware is TDM410P with two each FXO and FXS modules. -- AJS Answers come *aft...
2009 Oct 18
2
[LLVMdev] [cfe-dev] Developer meeting videos up
...ons clearly reveal no confidential Apple information; in fact, they were presented in front of a large number of external participants. While we appreciate Apple's continued support of LLVM and of the Developers' Meeting, the goodwill generated is being undermined by this policy to withhold important technical information from other LLVM users, and for little benefit to Apple. --Vikram Adve ---------------------------------------------------------------------- VIKRAM S. ADVE Associate Professor, Computer Science E-MAIL: vadve at cs.uiuc.edu Siebel Center for Computer S...
2004 Dec 07
1
Inoming caller id withheld, move to new context, possible?
...caller id working on my BT line in the UK, I'd like to play a different message to those pesky sort who with hold their outgoing number. How can I do this in my extensions.conf for my [incoming-analog] context? I realise some people may call who are unable to change the way that their system withholds the outbound number, so I'll give them chance to leave a voice mail. Thanks Mike
2005 May 20
12
send patchs
Hi all, I''m working on a patch for shorewall to make it run with a Crossbeam X40 machine (www.crossbeamsystems.com) and I would like to know where to send it, is this list the correct location?. The patch is necesary because of Crossbeam X series running mode: when you make a shorewall start, restart or clear, there are a packet dropping until shorewall is Started or cleaned. At
2012 Mar 14
1
list factoring
Hi Guys, this is actually a thread of emails, but for some reason, even though i am a member, it's withholding my email so i said i would try it this route instead!... I appreciate the reading Thank you. If i have: matrix: > var1 var2 var3 > cell1 x x x > cell2 x x x > cell3 x x x > > cell4 > > . > . > . &gt...
2009 Oct 19
0
[LLVMdev] [cfe-dev] Developer meeting videos up
...reveal no confidential Apple information; in > fact, they were presented in front of a large number of external > participants. While we appreciate Apple's continued support of LLVM > and of the Developers' Meeting, the goodwill generated is being > undermined by this policy to withhold important technical information > from other LLVM users, and for little benefit to Apple. > > --Vikram Adve > > ---------------------------------------------------------------------- > VIKRAM S. ADVE > Associate Professor, Computer Science E-MAIL: vadve at cs.uiuc.edu...
2008 Oct 15
1
investigating interaction term for a model of Gross Primary Productivity
...gate the interaction term in the below. The paradigm in aquatic systems is that algal production is either nitrogen (TIN) or Phosphorus limited, and I am trying to investigate this- what is the best way to go about investigating the interaction term. I have some thoughts on the above, but I will withhold them to see what others think. Thanks for your help. d <- (structure(list(d.GPP = c(1.213695235, 3.817313822, 1.267930498, 10.45692825, 3.268295623, 3.505286001, 4.468225245, 0.915653726, 1.635617261, 3.726133898, 1.363453706, 13.99650967, 0.417618143, 0.741080504, 0.412440872, 3.515743675, 8....
2015 Feb 05
3
Another Fedora decision
On Thu, February 5, 2015 9:34 am, Always Learning wrote: > > On Thu, 2015-02-05 at 09:51 -0500, Lamar Owen wrote: > >> On 02/04/2015 07:55 PM, Always Learning wrote: >> > Rent ? That costs money. Just crack open some Windoze machines and do >> > it for free. That is what many hackers do. >> >> Those crackers who build these botnets are the ones who
2012 May 30
1
caret() train based on cross validation - split dataset to keep sites together?
...fess that although my R skills are improving, they are not so highly developed. I am using 10 fold cross validation with 3 repeats in the train function of the caret() package to identify an optimal nnet (neural network) model to predict daily river water temperature at unsampled sites. I am also withholding data from 10% of sites to have a better understanding of generalization error.?However, the focus on predictions at other sites is turning out to be not easily facilitated ? as far as I can see. ?My data structure (example at bottom of email) consists of columns identifying the site, the date, t...
2015 Feb 05
0
Another Fedora decision
...air in my estimate!) chance of that to be logged, added into the > database, etc. I almost which to yell: people use your brain ! ;-) Yes never ever, not once, let any person or any search engine etc. know too much about your specific security arrangements. Generalise with principles but always withhold the precise specifics. The nasty people out there are trying to steal your data and wreck your systems. They have no scruples. There is a real cyber war going-on and your systems are their targets. > I know, I know, everybody is reasonable, it is just I didn't have my > coffee yet... Y...
2016 Jan 25
0
Just need to vent
...way of selecting the init methodology > at install-time and afterwards), and with gnome2 (or a clear > choice between 2 and 3). Call it DeCentOS. > Depending on how the systemd drama plays out CentOS-6 may well be our last RH derivative, and perhaps our last Linux. At the moment we are withholding any judgement on the matter for want of clear empirical evidence respecting systemd's benefits and risks. On our test CentOS-7 systems we eventually switched to Mate. That in itself sorted out most of the most visceral negativity to RHEL7. But systemd, rightly or wrongly, remains a controv...
2005 May 16
0
Re: Dual Monitors -- "nv" v. "nvidia"
...e also commended for attempting to build a "clean room" DRI/GLX implementation. But as lack of resources to continue to "fork" mounted along with lagging performance, ATI had to follow in nVidia's footsteps by creating a closed-source, but standards-driven unified driver by withholding specifications as of the R300 series (Radeon 9500+). Just like nVidia, the "clean room" GLX work is still available, and might even work on newer GeForce/Radeon cards, but the newer features of those cards are not documented. Lastly, it should also be noted that Matrox also has closed...
2006 Mar 30
1
Asterisk out of Media Path - Call Park
Hi all, Can i make Asterisk stay out of the media path for call park feature? In the 'sip.conf' i made canreinvite=yes in the general section but it does not seem to take effect. I don't see any reason for Asterisk to withhold sending re-invite. I am testing the call park in the single LAN,both on caller side and reciever side i am using X-Lite phones. Any suggestions?? Thanks, Sharath Chandra -------------- next part -------------- An HTML attachment was scrubbed... URL: http://lists.digium.com/pipermail/asterisk-user...
2009 Jul 12
0
Missing CLI
Hi All, I'm using PrivacyGuard to filter calls from withheld numbers. A few percent of incoming calls from my BT landline where I know the caller does not withhold their number. BT deny that they're not passing CLI from all calls. In /var/log/asterisk/messages, the following three lines preceed every such call so far: [Jul 11 11:52:28] NOTICE[23198] chan_dahdi.c: Got event 18 (Ring Begin)... [Jul 11 11:52:29] NOTICE[23198] chan_dahdi.c: Got event 2 (Rin...
2015 Feb 05
1
Another Fedora decision
...ance of that to be logged, added into the >> database, etc. I almost which to yell: people use your brain ! ;-) > > Yes never ever, not once, let any person or any search engine etc. know > too much about your specific security arrangements. Generalise with > principles but always withhold the precise specifics. > > The nasty people out there are trying to steal your data and wreck your > systems. They have no scruples. There is a real cyber war going-on and > your systems are their targets. > >> I know, I know, everybody is reasonable, it is just I didn't ha...