search for: cisc

Displaying 20 results from an estimated 55 matches for "cisc".

Did you mean: cisco
2010 Mar 16
0
Asterisk to be used with Ciscs media gateways
...om: asterisk-users-bounces at lists.digium.com > [mailto:asterisk-users-bounces at lists.digium.com] On Behalf Of Peder > Sent: Monday, March 15, 2010 6:54 PM > To: 'Asterisk Users Mailing List - Non-Commercial Discussion' > Subject: Re: [asterisk-users] Asterisk to be used with Ciscs media > gateways > > exten=07028XXXXXX,1,Dial(SIP/${EXTEN}@PCCW-KPN) > > You aren't sending an outbound DID with just SIP/PCCW-KPN. > > -----Original Message----- > From: asterisk-users-bounces at lists.digium.com > [mailto:asterisk-users-bounces at lists.digium.c...
2005 Oct 12
2
Canadian Association of VoIP Providers
...ail carefully otherwise please disregard. ----- As you are most likely aware, the CRTC has undertaken the roll of regulating VoIP services in Canada and is currently conducting hearings with the goal of putting in place regulatory requirements for all VoIP providers. Specifically, the CRTC's CISC VoIP 911 working group ( http://www.crtc.gc.ca/cisc/eng/cisf3e4_20.htm ) is very actively looking at what regulations to put in place in order to implement E911 services for VoIP. The recommendations of this committee will have direct impact on your business. Currently this working group is is lar...
2003 Apr 02
2
AW: Login from win2k client to samba PDC
...---- IPC$ nobody nobody 4654 win2k1 ..... ------------8<--------------- Do you have an other idea? Thank you Markus "John H Terpstra" <jht@samba.org> schrieb im Newsbeitrag news:<20030402162023$4954@gated-at.bofh.it>... > On Wed, 2 Apr 2003, Markus PISTAUER (CISC) wrote: > > > Dear Eric, > > > > thanks for your answer. I have non of the items you defined in the global > > section. There is also no error in the log file. So I'm realy at the end of > > my "know-how" (if any ...) > > > > My global sec...
2003 Apr 02
2
Login from win2k client to samba PDC
...ettings: ------------------------- I'm using Samba 2.2.5 (release 160), win2k prof with SP3 or no SP, classic authentication on the PDC. Linux Kernel is 2.4.19 (Build 174). I have also tried 2.2.8 with same failure. Any help would be VERY appreciated. Thanks Markus Pistauer mailto:m.pistauer@cisc.at
2009 Apr 24
1
[LLVMdev] Question from a passer-by
Hi all, Was wondering what is the real benefit of say translating from LLVM's RISC-type instruction set to the x86 which is a more CISC type of design? Especially after emitting said RISC stream from a much higher-level language like say C or C++? I always thought that to efficiently translate logic, as much as possible information has to be retained down the translation chain? Would that not make the opposite case when first human...
2006 Apr 05
0
E-911 Canada Info - Hot Off the Press
...ervices networks to IP-based emergency networks (so called next generation 9-1-1 networks) in Canada no sooner than 36 months after the deployment of i2. ESWG further recommends that the Commission order eight specific tasks with sequential milestones to assist with the orderly deployment of i2: 1. CISC should be ordered to deliver within 6 months a preferred PSAP funding model for VoIP E9-1-1 addressing regional/provincial variances and practices to produce a common national standard. 2. CISC should be ordered to deliver a comprehensive architecture for the implementation of VoIP E9-1-1 to delive...
2006 Apr 07
0
Canada Nomadic 911 - From the Yes it will Screw Your Biz Dept
...ervices networks to IP-based emergency networks (so called next generation 9-1-1 networks) in Canada no sooner than 36 months after the deployment of i2. ESWG further recommends that the Commission order eight specific tasks with sequential milestones to assist with the orderly deployment of i2: 1. CISC should be ordered to deliver within 6 months a preferred PSAP funding model for VoIP E9-1-1 addressing regional/provincial variances and practices to produce a common national standard. 2. CISC should be ordered to deliver a comprehensive architecture for the implementation of VoIP E9-1-1 to delive...
2018 Jul 12
5
OpenSSH slow on OSX High Sierra (maybe due to libcrypto)?
...17.6.0: Tue May 8 15:22:16 PDT 2018; root:xnu-4570.61.1~1/RELEASE_X86_64 x86_64 $ sysctl machdep.cpu.brand_string machdep.cpu.brand_string: Intel(R) Core(TM) i5-2415M CPU @ 2.30GHz $ /usr/bin/openssl speed rsa [...] LibreSSL 2.2.7 built on: date not available options:bn(64,64) rc4(ptr,int) des(idx,cisc,16,int) aes(partial) blowfish(idx) compiler: information not available rsa 512 bits 0.000964s 0.000059s 1037.3 16987.1 rsa 1024 bits 0.006052s 0.000271s 165.2 3687.3 rsa 2048 bits 0.040528s 0.001145s 24.7 873.6 rsa 4096 bits 0.278889s 0.004272s 3.6 234.1 $ libressl-2.2.7/ap...
2006 Apr 13
0
CANADA 911 Update
...ervices networks to IP-based emergency networks (so called next generation 9-1-1 networks) in Canada no sooner than 36 months after the deployment of i2. ESWG further recommends that the Commission order eight specific tasks with sequential milestones to assist with the orderly deployment of i2: 1. CISC should be ordered to deliver within 6 months a preferred PSAP funding model for VoIP E9-1-1 addressing regional/provincial variances and practices to produce a common national standard. 2. CISC should be ordered to deliver a comprehensive architecture for the implementation of VoIP E9-1-1 to delive...
2004 Dec 29
9
IP Phone recommendations?
Hey gang, I'm looking at escaping from a Nortel Meridian CISC system to Asterisk/Digium/SIP phones. I'm currently in the testing and proof of concept phase. I'm going to need a SIP phone and don't want to re-purchase and have "orphans" around. We currently run Nortel 7310 phones and they work great. I'm sort of overwhelmed by all...
2003 Sep 12
1
Re: Asterisk-Users digest, Vol 1 #1273 - 10 msgs
...s the features you need (is this possible?), and .......... you get the idea... > POTS FXO/FXS? Nope. Kinda like saying - I need a 7206VXR to support 3 home internet users..... would be very cool... (I bet there is someone on this list that comes close...) (JT - speak up...) > What other Cisco routers can act as SIP gateways today? Are Cisco's green? Anything with an FXO port and a suitable IOS load... (The correct answer to this question cannot be reasonable expressed on a mail list, it is more like a SQL query, except Cisco does not make a Sales SQL database, preferring instead t...
2015 Jul 09
3
[LLVMdev] New backend help request.
I'm trying to figure out how to map more complex CISC instructions now. For example on the 68000, you have things like -- add.w (a0)+,(a1)+ So that equates to: temp1 = load a0 add 2, a0 temp2 = load a1 temp1 = add temp1, temp2 store temp1, a1 add 2, a1 How do I express that in a form for LLVM? I see things like pre_store and post_store, but I can...
2015 Jul 09
3
[LLVMdev] New backend help request.
Hmm, I'm getting nowhere pretty fast. It seems 68000 with its CISC nature is quite complex to implement for a novice. I can see how to implement simple stuff, like -- move dn, dn move dn, (an) As that just turns into stores, sets, etc. But how would you represent things like indexed access? move dn, (an,dn) move dn, offset(an) Can I only really define very si...
2011 May 17
1
[LLVMdev] TargetRegisterInfo and "infinite" register files
...tores directly into the instructions that reference them? When a register is spilled, the register allocator first tries foldMemoryOperand on all instructions using the register. If successful, the target creates an instruction that accesses the stack slot directly (as is possible on x86 and other CISC architectures). If it fails, the register allocator creates a new tiny live range around the existing instruction, and uses storeRegToStackSlot and readRegFromStackSlot to spill and reload that new register around the instruction. /jakob
2011 Jun 10
1
[LLVMdev] Advice on architecture research project?
...-accurate" simulator or the real hardware. Due to the poor performance of cycle-accurate simulators in terms of accuracy, I am not considering currently. Among the real hardware, X86 is a favorable choice due to wide availability for me to experiment with different configurations. However, its CISCity scares me too. Is it possible to choose a small subset of X86 ISA, without scary addressing modes and emitting only those instructions from LLVM. Will generally available hardware profiling tools work fine in such a case. Is there any info available for any such subset has been defined and used...
2009 Apr 02
2
[LLVMdev] GSoC 2009: An LLVM Backend for TPA
...essor architecture as part of 2009's Google Summer of Code program. TPA processor is a new architecture that offers the possibility of high instruction-level parallelism with energy efficiency. TPA architecture partitions the work between the compiler and the hardware differently from RISC and CISC architectures. TPA architecture has three different features that require new complier support. First, the compiler is responsible for partitioning the program into a sequence of structured blocks, which logically execute atomically. Secondly, the compiler should encode instruction dependences expl...
2012 Dec 02
2
[LLVMdev] Splitting a load with 2 consumers into 2 loads.
...e treated as (addmm address, address). Here is an alternative you can take into consideration: defining new node (like addmm, similiar with movmm) to specify matching patterns for isel. Regards. 2012/12/2 Joseph Pusdesris <joe at pusdesris.com>: > I am writing a target for an odd cisc-like architecture which has no support > for keeping most values in registers. As such, memory-memory operations are > needed, but for isel to generate a memory-memory the pattern must be of the > form (store (op (load) (load))). > > Let's use a simple example to show how this c...
2013 Sep 14
4
Elliptic curves in tinc
In the past 24 hours multiple persons have contacted me regarding the use of elliptic curve cryptography in tinc 1.1 in light of the suspicion that the NSA might have weakened algorithms and/or elliptic curves published by NIST. The new protocol in tinc 1.1 (SPTPS) uses ECDH and ECDSA to do session key exchange and authentication, in such a way that it has the perfect forward secrecy (PFS)
2013 Sep 14
4
Elliptic curves in tinc
In the past 24 hours multiple persons have contacted me regarding the use of elliptic curve cryptography in tinc 1.1 in light of the suspicion that the NSA might have weakened algorithms and/or elliptic curves published by NIST. The new protocol in tinc 1.1 (SPTPS) uses ECDH and ECDSA to do session key exchange and authentication, in such a way that it has the perfect forward secrecy (PFS)
2012 Dec 02
0
[LLVMdev] Splitting a load with 2 consumers into 2 loads.
I am writing a target for an odd cisc-like architecture which has no support for keeping most values in registers. As such, memory-memory operations are needed, but for isel to generate a memory-memory the pattern must be of the form (store (op (load) (load))). Let's use a simple example to show how this can be problematic: %0...