Today, modern security tools including Bitdefender antivirus are known as EDR solutions (Endpoint Detection and Response). They are the next evolution of anti-virus software. Anti-virus software has always operated based on a “database” of malicious software...
Mike Solinap
Six Advantages Of Using SentinelOne
SentinelOne is an endpoint security tool. It offers cybersecurity protection for platforms including laptops, PC, phones, cloud servers and identity server protection. And it is the next generation in vulnerability endpoint protection platform (EPP). SentinelOne is...
(vCAD) Virtual CAD Update August 2022
vCAD, or virtual CAD, is our solution to your 2D and 3D designing capabilities. It's revolutionising design teams globally. Check out the latest August 2022 virtual CAD update and release information below. Virtual CAD Update: Tips & Tricks So many customers...
Protecting Device Storage Using Windows UWF
In this blog we'll explore how the Windows UWF, Unified Write Filter can help protect device storage against product cybersecurity. The Unified Write Filter (UWF) is a Windows native feature that ensures a system’s data remains as an unmodified, secure baseline. Data...
How To Start Your Manufacturing Hybrid Cloud Migration
How Hybrid Cloud solutions boost manufacturing businesses Hybrid cloud migration is becoming more and more prominent. Why? Well, the cloud has been proving its worth for years now. In particular, it showed exceptional value, capability and adoption at the peak of the...
User Notice for vCAD April 2022 Update for 2FA
vCAD Users, We're happy to announce that on 19-APR at 1700 PST, we will be releasing changes to the portal that will allow for 2-Factor Authentication. This means that you will be provisioned -new passwords- as we are leveraging a separate, more secure system for...
9 Things You Need To Know About Cybersecurity and Protected Health Information (PHI) breaches
In the past 18 months, there have been breaches of security related to protected health information (PHI) at Broward Health, Florida Healthy Kids, and the Accellion FTA Hack. In turn, these breaches resulted in 11 more healthcare organizations getting exploited. ...
5 Best Practices That Could Have Protected You From Log4J
Log4j: What Is It? On December 9, 2021, a critical exploit named "Log4j" was disclosed to the world. This exploit was particularly harrowing due to the fact that the software library which it targeted is so widely utilized. “Log4Shell” (CVE-2021-44228,...
How To Add More Disk Space To Your Redhat Server Without Reformatting
(Originally published in 2012, updated January 2022.) One of the common tasks for any system administrator is managing disk space on a server. A common question is how to increase disk space on a linux system. I won't go into a boring lecture on why managing disk...
January 2022 vCAD feature updates
Happy New Year vCAD Users! It was a busy 2021 in terms of vCAD development and feature enhancements. We've been receiving lots of feedback regarding the platform, and we're assembling a roadmap for 2022 based on our users' needs. Here's what to expect in 2022:...
SPK Releases vCAD™
SCOTTS VALLEY, Calif., Jan. 4, 2022 /PRNewswire/ -- SPK and Associates, LLC (SPK) is excited to announce the release of their new Virtual Engineering Platform – vCAD™. vCAD is an easy-to-use product that allows engineers to quickly set up and manage cloud workstations...
How to Create Easy Engineering Design Automation Fixes
In one of our recent articles, we highlighted opportunities for automation, specifically for MCAD (mechanical computer-aided design) and PDM (product data management) activities in your organization. In this next installment, we hope to provide you with other examples...