β
The first RFC went out on April 7, 1969, mailed in old-fashioned envelopes through the postal system. (There was no such thing as email, since they hadnβt invented the network yet.)
β
β
Walter Isaacson (The Innovators: How a Group of Hackers, Geniuses, and Geeks Created the Digital Revolution)
β
The people who received RFC 1 felt that they were being included in a fun process rather than being dictated to by a bunch of protocol czars. It was a network they were talking about, so it made sense to try to loop everyone in.
β
β
Walter Isaacson (The Innovators: How a Group of Hackers, Geniuses, and Geeks Created the Digital Revolution)
β
The interest rate on RFC and FCNR deposits for corresponding currency and maturity are usually the same. While the minimum term of an FCNR deposit is 1 year, there is no such limitation for RFC deposits. An account holder can open an RFC deposit for one month or even less.
β
β
Jigar Patel (NRI Investments and Taxation: A Small Guide for Big Gains)
β
While RFC deposits can be withdrawn pre-maturely, banks are allowed to levy any penalty.
β
β
Jigar Patel (NRI Investments and Taxation: A Small Guide for Big Gains)
β
She was a two-seater and I fired five rounds into her. She burst into flames and fell upside down. Although she dropped like a stone, I saw her observer climb out of his seat and jump clear of the flames. He must have preferred that kind of death to the chance of being roasted.3 Captain Albert Ball, 60 Squadron, RFC
β
β
Peter Hart (Somme Success: The Royal Flying Corps and the Battle of The Somme 1916)
β
The five major sources of income which are exempt for NRIs are: Proceeds from Life Insurance Policy - provided the policy complies with the exemption criteria/conditions Dividend from a domestic company or mutual fund scheme - provided the company or mutual fund scheme has paid the Dividend Distribution Tax (DDT), if applicable Interest on an NRE account β provided the NRE account is maintained as per the FEMA rules Interest on FCNR or RFC accounts β provided the account owner is a non-resident or RBNOR under the Income Tax Act Long Term Capital Gain on equity and equity based mutual fund β provided the Security Transaction Tax (STT) has been paid
β
β
Jigar Patel (NRI Investments and Taxation: A Small Guide for Big Gains)
β
data for transmission. One is described in RFC 1042, and the other
β
β
Matthew S. Gast (802.11 Wireless Networks: The Definitive Guide)
β
We specifically assume that fragments are transmitted from Host to Host through means of a PACKET SWITCHING NETWORK [PSN] [ROWE70, POUZ73]. This assumption is probably unnecessary, since a circuit switched network could also be used, but for concreteness, we explicitly assume that the hosts are connected to one or more PACKET SWITCHES [PS] of a PSN [HEKA7O, POUZ74, SCWI71].
β
β
Vint Cerf (SPECIFICATION OF INTERNET TRANSMISSION CONTROL PROGRAM (Illustrated): RFC 675)
β
Storing Log Messages for Later Review With logging to the console and to terminals, an event happens, IOS sends the messages to the console and terminal sessions, and then IOS can discard the message. However, clearly, it would be useful to keep a copy of the log messages for later review, so IOS provides two primary means to keep a copy. IOS can store copies of the log messages in RAM by virtue of the logging buffered global configuration command. Then any user can come back later and see the old log messages by using the show logging EXEC command. As a second optionβan option used frequently in production networksβall devices store their log messages centrally to a syslog server. RFC 5424 defines the Syslog protocol, which provides the means by which a device like a switch or router can use a UDP protocol to send messages to a syslog server for storage. All devices can send their log messages to the server. Later, a user can connect to the server (typically with a graphical user
β
β
Wendell Odom (CCENT/CCNA ICND1 100-105 Official Cert Guide)
β
Storing Log Messages for Later Review With logging to the console and to terminals, an event happens, IOS sends the messages to the console and terminal sessions, and then IOS can discard the message. However, clearly, it would be useful to keep a copy of the log messages for later review, so IOS provides two primary means to keep a copy. IOS can store copies of the log messages in RAM by virtue of the logging buffered global configuration command. Then any user can come back later and see the old log messages by using the show logging EXEC command. As a second optionβan option used frequently in production networksβall devices store their log messages centrally to a syslog server. RFC 5424 defines the Syslog protocol, which provides the means by which a device like a switch or router can use a UDP protocol to send messages to a syslog server for storage. All devices can send their log messages to the server. Later, a user can connect to the server (typically with a graphical user interface) and browse the log messages from various devices. To configure a router or switch to send log messages to a syslog server, add the logging {address|hostname} global command, referencing the IP address or hostname of the syslog server. Figure 33-2 shows the ideas behind the buffered logging and syslog logging.
β
β
Wendell Odom (CCENT/CCNA ICND1 100-105 Official Cert Guide)
β
Language tags are a system defined in RFC 3066, which is used in various Internet protocols and formats,
β
β
Sean M. Burke (Perl & LWP: Fetching Web Pages, Parsing HTML, Writing Spiders & More)
β
I know the landmarks in the education of my soul are all periods of suffering - Lanoe Hawker 4.5.16
β
β
Tyrrel Hawker MC (Hawker VC - RFC Ace: The Life of Major Lanoe Hawker VC DSO 1890-1916)
β
Task Force in the RFC 4180 specification document [5]. Summarized briefly, RFC 4180 specifies that: files may optionally begin with a header row, with each field separated by a comma; Records should be
β
β
Mit Critical Data (Secondary Analysis of Electronic Health Records)
β
In OAuth 1.0, RFC 5849, the user (delegator) is known as the resource owner , the consumer (delegate) is known as the client, and the service provider is known as the server.
β
β
Prabath Siriwardena (Advanced API Security: OAuth 2.0 and Beyond)
β
In their open front cockpit the crew were completely unprotected from the bitter lash of the wind. And the same westerly winds also proved an additional threat when at last, mission accomplished, they tried to fly back to safety: The prevailing wind was against us when returning from any flight over the lines and when it was strong, as it often was, our ground speed was much reduced thereby presenting us as βsitting birdsβ for the anti-aircraft guns. When landing back at the aerodrome I have known the wind speed to be greater than my landing speed, so that I had to use my engine to get down after finding that my aeroplane was flying backwards relative to the ground.7 Second Lieutenant Geoffrey Hopkins, 22 Squadron, RFC
β
β
Peter Hart (Bloody April: Slaughter in the Skies over Arras, 1917 (Cassell Military Paperbacks))