World is running on Beta
World is running on Beta As a player in the technology software services world, we have always prided ourselves on having delivered robust and high-quality software solutions to our customers.…
World is running on Beta As a player in the technology software services world, we have always prided ourselves on having delivered robust and high-quality software solutions to our customers.…
Dedicated Bearer setup in LTE and impact on VoLTE Precondition When a callee has been alerted by the provisional response, the chances of a session establishment failure are minimal assuming…
How an IMS network assigns and maintains an S-CSCF for a user When a user tries to register with an IMS network, it sends a REGISTER request to its P-CSCF.…
Globally Routable User Agent URI (GRUU) Several applications of the Session Initiation Protocol (SIP) require a user agent (UA) to construct and distribute a URI that can be used by…
Scala: Linearization technique to avoid multiple inheritance To support inheritance Scala has introduced a concept called trait, almost similar to Java Interfaces. But unlike Java Interfaces, Scala traits can actually…
Xamarin: Sample Push Notification Application using GCM service Summary Through this blog, I hope to be able to provide you with enough information to build a push chat notification application.…
My Experience with iWatch WatchKit is Apple’s framework for building hybrid apps for the Apple iWatch, and first came bundled with Xcode 6.2. WatchKit app contains 2 distinct parts: Apple…
Google Beacon Platform Google Beacon platform consists of the following three components, Beacon device. Eddystone format. Proximity beacon API. Beacon device Beacon devices send one-way Bluetooth low energy(BLE) signals.…
How to extract MCC and MNC from IMSI stored in USIM As per 3GPP 24.003 section 2.2 & 2.3, the IMSI (International Mobile Subscriber Identity) is a unique number, assigned…
Scala: Tail Recursion Optimization and Comparison to Java Tail Recursion is supposed to be a better method than normal recursion methods, but does that help in the actual execution of…