Re: [meta-intel] [PATCH 0/1 daisy/dizzy]: meta-crystalforest:Initial Intel QAT-core Implementation

2015-03-14 Thread Paul Eggleton
On Friday 13 March 2015 15:25:03 Darren Hart wrote: > On 2/26/15 11:26 PM, sundara.rajax.p.manoha...@intel.com wrote: > > From: sundararaja perumal > > > > Intel's QuickAssist Technology is designed to optimize the use and > > deployment of algorithm accelerators in networking and security > > ap

Re: [meta-intel] [PATCH 0/1 daisy/dizzy]: meta-crystalforest:Initial Intel QAT-core Implementation

2015-03-13 Thread Darren Hart
On 2/26/15 11:26 PM, sundara.rajax.p.manoha...@intel.com wrote: > From: sundararaja perumal > > Intel's QuickAssist Technology is designed to optimize the use and deployment > of > algorithm accelerators in networking and security applications. > As the complexity of networking and security ap

Re: [meta-intel] [PATCH 0/1 daisy/dizzy]: meta-crystalforest:Initial Intel QAT-core Implementation

2015-02-27 Thread Ong, Boon Leong
.@yoctoproject.org [mailto:meta-intel- >boun...@yoctoproject.org] On Behalf Of >sundara.rajax.p.manoha...@intel.com >Sent: Friday, February 27, 2015 3:26 PM >To: meta-intel@yoctoproject.org >Subject: [meta-intel] [PATCH 0/1 daisy/dizzy]: meta-crystalforest:Initial Intel >QAT-core Impleme

[meta-intel] [PATCH 0/1 daisy/dizzy]: meta-crystalforest:Initial Intel QAT-core Implementation

2015-02-27 Thread sundara . rajax . p . manoharan
From: sundararaja perumal Intel's QuickAssist Technology is designed to optimize the use and deployment of algorithm accelerators in networking and security applications. As the complexity of networking and security applications continues to grow, systems need more and more computational resource

[meta-intel] [PATCH 0/1 daisy/dizzy]: meta-crystalforest:Initial Intel QAT-core Implementation

2015-02-26 Thread sundara . rajax . p . manoharan
From: sundararaja perumal Intel's QuickAssist Technology is designed to optimize the use and deployment of algorithm accelerators in networking and security applications. As the complexity of networking and security applications continues to grow, systems need more and more computational resource