Profile cover photo
Profile photo
MengMeng Zhao
24 followers -
Autrunk Technology Blog (www.autrunk.com)
Autrunk Technology Blog (www.autrunk.com)

24 followers
About
Posts

Post has attachment
Cisco UC Architect | Engineer Design and hands-on skills in Cisco UC and collaboration We are in search of a Cisco UC Architect | Engineer for our federal government clients in Canberra. About the Role Proven experience in the design and delivery of key…
Add a comment...

Post has attachment
Several friends mentioned recently that they wanted to learn Linux and asked whether any books and/or videos I’d recommend. I don’t really read well. I don’t really watch videos much either due to it is a bit time-consuming. My learning approach includes…
Add a comment...

Post has attachment
Introduction We will cover some basic IP Telephony concepts in this article and also demonstrate how to access Cisco Unified Communications Manager (CUCM) free lab from Cisco Devnet. Hardware and Components Call processing/call control: Cisco Unified…
Add a comment...

Post has attachment
Introduction This lab lays the foundation of learning CCNA Collaboration. It introduces the basic concepts in the Voice over IP (VoIP) world, and integrates a Cisco Packet Tracer lab for hands-on practice. The combination of theory, methodology and…
Add a comment...

Post has attachment
What is Digital Signage? Digital Signage uses technologies such as LCD, LED, TV and projector to display digital content such as images, video, streaming media, web pages, text and etc. How Can Digital Signage Help Me? Here are some typical use cases of…
Add a comment...

Post has attachment
Hi all AUTRUNK subscribers, I am migrating AUTRUNK to self-hosted site. The domain name remains same as http://www.autrunk.com. Your subscription has been migrated; therefore, you should be able to receive subscription as before. Another news is…I am…
Add a comment...

Post has attachment
Introduction In the previous article Build Secure File Transfer Solution Using AWS S3 (1), I introduced the solution design, security considerations and hardening in particular, when using AWS S3 for secure file transfer. S3 bucket policy and IAM user…
Add a comment...

Post has attachment
Introduction In the previous article Build Secure File Transfer Solution Using AWS S3 (1), I introduced the solution design, security considerations and hardening in particular, when using AWS S3 for secure file transfer. S3 bucket policy and IAM user…
Add a comment...

Post has attachment
We All Need Secure File Transfer It is not unusual for companies to protect their commercial and client information. It is not unusual for government agencies to protect national security and personal information. However, during job application or other…
Add a comment...

Post has attachment
Services of Cryptography System Cryptography is more than encryption. The services provided by cryptography system may include the following: Confidentiality: renders the information unintelligible except by authorised entities Integrity: data has not…
Add a comment...
Wait while more posts are being loaded