Connected medical devices offer enormous opportunity for manufacturers and consumers alike. They also carry the burden of increased risk due to cybersecurity flaws. Think about the dangers of having your email or bank account hacked. Now consider the damage hacking a...
Data Engineering
Multi-Cloud Is the Future of Infrastructure… For Now
Does this sound familiar? Your organization has settled into its cloud migration. You’re enjoying the increased security and resiliency. You feel like you’ve just climbed a mountain and you want to spend some time gazing out from the summit. Then you read about...
Solving CAD File Data Corruption By Looking Beyond the Obvious
One SPK client’s design engineering team was required to email CAD files to a technician to perform 3D printing. However, the CAD files were too large for regular email transmission. The designers manually converted each CAD file into a ZIP format for sending in one...
How to Best Recover your Infrastructure Systems in Case of Disaster
Every system administrator's worst nightmare is having a total disaster of their infrastructure systems. Disaster could take many forms, such as a natural disaster or even doing a physical move of a server and dropping the server, destroying it. The goal when disaster...
A Quick Start Guide to Installing Ceph
This seems to be the age of “Big Data”. Every sector seems to have a need for it -- from biotechs doing genome sequencing, to financial providers mining market data. For many, the ability to store massive amounts of structured or unstructured data is the key to...
Automatic Processing of Content on SolidWorks Workgroup PDM Server
One of the powerful features of a full enterprise product lifecycle management (PLM) system is being able to post process content uploaded to it. For example, adding a watermark, or changing a revision of a document automatically. The idea behind Solidworks Workgroup...
How to Obtain Electric Commander Metrics for Use in a GWT Plugin
Developed by Electric Cloud, Electric Commander is an extremely versatile tool for enhancing and automating your organization’s software development build-test-deploy cycle. Commander makes it possible to eliminate unnecessary lag time between phases of the...
Automatically Scraping Webpages using Python 2.7
In today’s Internet, it takes specific skills to efficiently find the “Data You Want” inside of the “Data You’re Given”. I was reminded of this the other day watching a colleague struggle through data collection, clicking buttons and getting diverted by advertisements...
Hybrid Cloud Implementation Pitfalls Your Small Business Needs to Avoid
If you’re like many SMBs, IT infrastructure is not your favorite topic. You think about it when you have to, which means that it often becomes neglected, lagging behind other capital investments. What’s more, there’s a good chance your current IT solutions are...
5 Unix Commands You Might Not Be Using (But Should Be!)
Pretty much every day I do some system administration on one of our many Linux servers that we support as part of our managed IT services. It occurred to me that I use a bunch of utilities and tools within Linux to make my job easier and wanted to share my top 5 Unix...
Today’s Growing IoT Problem: Embedded Software Security – An Interview with Cambashi’s Peter Thorne
When it comes to the Internet of Things (IoT) and connectivity, embedded software security is a top concern for a growing number of manufacturing companies and their software engineers. The worldwide market for embedded security software is forecasted to rise to $2.95...