search for: ciscs

Displaying 20 results from an estimated 55 matches for "ciscs".

Did you mean: cisco
2010 Mar 16
0
Asterisk to be used with Ciscs media gateways
...om: asterisk-users-bounces at lists.digium.com > [mailto:asterisk-users-bounces at lists.digium.com] On Behalf Of Peder > Sent: Monday, March 15, 2010 6:54 PM > To: 'Asterisk Users Mailing List - Non-Commercial Discussion' > Subject: Re: [asterisk-users] Asterisk to be used with Ciscs media > gateways > > exten=07028XXXXXX,1,Dial(SIP/${EXTEN}@PCCW-KPN) > > You aren't sending an outbound DID with just SIP/PCCW-KPN. > > -----Original Message----- > From: asterisk-users-bounces at lists.digium.com > [mailto:asterisk-users-bounces at lists.digium.co...
2005 Oct 12
2
Canadian Association of VoIP Providers
My apologies for the cross-posting. If you are a business or individual providing Voice over IP services in Canada then we encourage you to read this email carefully otherwise please disregard. ----- As you are most likely aware, the CRTC has undertaken the roll of regulating VoIP services in Canada and is currently conducting hearings with the goal of putting in place regulatory requirements
2003 Apr 02
2
AW: Login from win2k client to samba PDC
John, thanks for that hint. It did not kill the server by you are perfectly right. I changed this and restarted the "smb" and "nmb" deamons - unfortunately with the same result. When I watch e.g. the status with "swat" I see as follows after trying with: smbclient -U <user> -L win2k1 (what is strange since I connect as different user and not
2003 Apr 02
2
Login from win2k client to samba PDC
I have joined my win2k client machines (win2k professional or win2k professional server) to my PDC. This worked fine and I did all recommended as e.g. in the HOWTO http://hr.uoregon.edu/davidrl/samba/samba-pdc.html#joining. So far I can also login localy to the win2k client machines using a local account and connect a network drive from the PDC using a valid account on the PDC (as given in the
2009 Apr 24
1
[LLVMdev] Question from a passer-by
Hi all, Was wondering what is the real benefit of say translating from LLVM's RISC-type instruction set to the x86 which is a more CISC type of design? Especially after emitting said RISC stream from a much higher-level language like say C or C++? I always thought that to efficiently translate logic, as much as possible information has to be retained down the translation chain? Would that not
2006 Apr 05
0
E-911 Canada Info - Hot Off the Press
This was given to me by a Telco guy in Canada. Talk about a great view of things to come. ESWG Consensus 12-month Report on Nomadic VoIP Technical and Operating Impediments to 9-1-1/E9-1-1 Service Delivery in Canada. PREPARE FOR 911 Executive Summary Emergency Services Working Group (ESWG) recommends on a consensus basis the Commission order the deployment of NENA Interim-2 (i2) compliant
2006 Apr 07
0
Canada Nomadic 911 - From the Yes it will Screw Your Biz Dept
ESWG Consensus 12-month Report on Nomadic VoIP Technical and Operating Impediments to 9-1-1/E9-1-1 Service Delivery in Canada Executive Summary Emergency Services Working Group (ESWG) recommends on a consensus basis the Commission order the deployment of NENA Interim-2 (i2) compliant emergency services components, systems and upgrades to result in the operation within 18 months of enhanced
2018 Jul 12
5
OpenSSH slow on OSX High Sierra (maybe due to libcrypto)?
Hi all. Is anyone else seeing issues with OpenSSH being slow on OSX High Sierra? In the interests of better test coverage I set one up, however the OpenSSH tests take much longer on it than on much older machines with much slower CPUs. It seems to be due to the vendor-supplied libcrypto being about 20x slower at bignum operations than nominally the same version of LibreSSL compiled locally. If
2006 Apr 13
0
CANADA 911 Update
ESWG Consensus 12-month Report on Nomadic VoIP Technical and Operating Impediments to 9-1-1/E9-1-1 Service Delivery in Canada DRAFT Executive Summary Emergency Services Working Group (ESWG) recommends on a consensus basis the Commission order the deployment of NENA Internet-2 (i2) compliant emergency services components, systems and upgrades to result in the operation within 18 months of
2004 Dec 29
9
IP Phone recommendations?
Hey gang, I'm looking at escaping from a Nortel Meridian CISC system to Asterisk/Digium/SIP phones. I'm currently in the testing and proof of concept phase. I'm going to need a SIP phone and don't want to re-purchase and have "orphans" around. We currently run Nortel 7310 phones and they work great. I'm sort of overwhelmed by all of the different IP phones. I
2003 Sep 12
1
Re: Asterisk-Users digest, Vol 1 #1273 - 10 msgs
> Message: 5 > Date: Fri, 12 Sep 2003 13:24:13 -0400 (EDT) > From: "David C. Troy" <dave@toad.net> > To: asterisk-users@lists.digium.com > Subject: [Asterisk-Users] 7206 as SIP->PSTN Gateway? > All, > > I know you can use, say, a 2620 w/2 port FXO card as > a SIP gateway. Clearly you can use the 5300, 5800, and > MGX8850 too. > >
2015 Jul 09
3
[LLVMdev] New backend help request.
I'm trying to figure out how to map more complex CISC instructions now. For example on the 68000, you have things like -- add.w (a0)+,(a1)+ So that equates to: temp1 = load a0 add 2, a0 temp2 = load a1 temp1 = add temp1, temp2 store temp1, a1 add 2, a1 How do I express that in a form for LLVM? I see things like pre_store and post_store, but I cant find anything in the way of documentation
2015 Jul 09
3
[LLVMdev] New backend help request.
Hmm, I'm getting nowhere pretty fast. It seems 68000 with its CISC nature is quite complex to implement for a novice. I can see how to implement simple stuff, like -- move dn, dn move dn, (an) As that just turns into stores, sets, etc. But how would you represent things like indexed access? move dn, (an,dn) move dn, offset(an) Can I only really define very simple operations for the main
2011 May 17
1
[LLVMdev] TargetRegisterInfo and "infinite" register files
On May 17, 2011, at 2:10 PM, Justin Holewinski wrote: > I plan on eventually implementing both and seeing which works best for different types of input. > > If virtual registers are used, how do you disable final register allocation in the back-end? If post-RA passes have trouble with virtual registers, you probably need to implement your own addCommonCodeGenPasses() method.
2011 Jun 10
1
[LLVMdev] Advice on architecture research project?
> I am interested in working on a little architecture project that > involves modifying an ISA in some non-trivial ways and seeing what > impact it has on instruction frequencies (and other such metrics). > Clearly I'll need to hack on a compiler backend, and I thought that > LLVM might be a good choice since among mature compiler > infrastructures it's fairly young and
2009 Apr 02
2
[LLVMdev] GSoC 2009: An LLVM Backend for TPA
Hi all, I'd like to write an LLVM backend for TPA processor architecture as part of 2009's Google Summer of Code program. TPA processor is a new architecture that offers the possibility of high instruction-level parallelism with energy efficiency. TPA architecture partitions the work between the compiler and the hardware differently from RISC and CISC architectures. TPA architecture has
2012 Dec 02
2
[LLVMdev] Splitting a load with 2 consumers into 2 loads.
OK, I get it. The essence of this problem is that a node can be covered exactly and just once but its result can be referred multiple times for a tree pattern matching isel. So to duplicate a load node (only if we can!) is convenient to conquer that case. The truth is, in pattern (add (load) (load)), source operands are memory addresses, and thus it can be treated as (addmm address,
2013 Sep 14
4
Elliptic curves in tinc
In the past 24 hours multiple persons have contacted me regarding the use of elliptic curve cryptography in tinc 1.1 in light of the suspicion that the NSA might have weakened algorithms and/or elliptic curves published by NIST. The new protocol in tinc 1.1 (SPTPS) uses ECDH and ECDSA to do session key exchange and authentication, in such a way that it has the perfect forward secrecy (PFS)
2013 Sep 14
4
Elliptic curves in tinc
In the past 24 hours multiple persons have contacted me regarding the use of elliptic curve cryptography in tinc 1.1 in light of the suspicion that the NSA might have weakened algorithms and/or elliptic curves published by NIST. The new protocol in tinc 1.1 (SPTPS) uses ECDH and ECDSA to do session key exchange and authentication, in such a way that it has the perfect forward secrecy (PFS)
2012 Dec 02
0
[LLVMdev] Splitting a load with 2 consumers into 2 loads.
I am writing a target for an odd cisc-like architecture which has no support for keeping most values in registers. As such, memory-memory operations are needed, but for isel to generate a memory-memory the pattern must be of the form (store (op (load) (load))). Let's use a simple example to show how this can be problematic: %0 = load i32* %a.addr, align 4 store i32 %0, i32* %other, align