Category: Technology

1 2 3 5 10 / 42 POSTS
Step By Step Cisco IM&P and Microsoft Lync Intradomain Federation Lab (4)

Step By Step Cisco IM&P and Microsoft Lync Intradomain Federation Lab (4)

This is the final post in the Cisco IM&P and MS Lync Intradomain Federation series. We will cover two super important topics - certificates and tr
Step By Step Cisco IM&P and Microsoft Lync Intradomain Federation Lab (3)

Step By Step Cisco IM&P and Microsoft Lync Intradomain Federation Lab (3)

This is the 3rd post in the Cisco IM&P and MS Lync Intradomain Federation series. We will focus on the MS Lync side of configuration in this blog.
Step By Step Cisco IM&P and Microsoft Lync Intradomain Federation Lab (2)

Step By Step Cisco IM&P and Microsoft Lync Intradomain Federation Lab (2)

The previous blog provides the lab overview on integrating Cisco Jabber and Microsoft Lync so that Jabber and Lync users can communicate with each oth
Step By Step Cisco IM&P and Microsoft Lync Intradomain Federation Lab (1)

Step By Step Cisco IM&P and Microsoft Lync Intradomain Federation Lab (1)

When organisations migrate to Jabber, the Cisco instant messaging and presence (IM&P) solution, more often than not, they already have Microsoft Offic
Learn Linux via Shell Scripting: Ping Sweep

Learn Linux via Shell Scripting: Ping Sweep

Several friends mentioned recently that they wanted to learn Linux and asked whether any books and/or videos I'd recommend. I don't really read well.
Digital Signage Using Raspberry Pi

Digital Signage Using Raspberry Pi

What is Digital Signage? Digital Signage uses technologies such as LCD, LED, TV and projector to display digital content such as images, video, strea
Build Secure File Transfer Solution Using AWS S3 (2)

Build Secure File Transfer Solution Using AWS S3 (2)

Introduction In the previous article Build Secure File Transfer Solution Using AWS S3 (1), I introduced the solution design, security considerations
Build Secure File Transfer Solution Using AWS S3 (1)

Build Secure File Transfer Solution Using AWS S3 (1)

We All Need Secure File Transfer It is not unusual for companies to protect their commercial and client information. It is not unusual for government
Cryptography – How are RSA, AES and SHA different?

Cryptography – How are RSA, AES and SHA different?

Services of Cryptography System Cryptography is more than encryption. The services provided by cryptography system may include the following: Confide
Avoid Asymmetric Routing in Load Balancing (pfSense example)

Avoid Asymmetric Routing in Load Balancing (pfSense example)

Introduction My previous blogs Use pfSense to Load Balance Web Servers (1) and Use pfSense to Load Balance Web Servers (2) introduced the deployment o
1 2 3 5 10 / 42 POSTS