spk-logo-white-text-short
0%
1-888-310-4540 (main) / 1-888-707-6150 (support) info@spkaa.com
Select Page

Engineering Operations

How Model-Based Definition (MBD) Cuts ECOs by 41% and Scrap by 47%

How Model-Based Definition (MBD) Cuts ECOs by 41% and Scrap by 47%

Organizations are increasingly turning to Model-Based Definition (MBD) to revolutionize their engineering and manufacturing processes. By embedding rich, digital annotations directly into 3D models, MBD provides a single source of truth for product definitions. This...

5 Minutes with Windows 8 and Office 2013

5 Minutes with Windows 8 and Office 2013

Dell Latitude ST This is the Dell Latitude ST, which can be had from the Dell Outlet store for about $300. It’s a 10-inch tablet slate running an Atom Z670 and 2GB of RAM – like a Netbook without a keyboard. Instead, it has an N-trig digitizer that supports both...

How to Create a Silent Installer for ANSYS 14

How to Create a Silent Installer for ANSYS 14

I'm a huge fan of automation, especially when it comes to installing software. With a simple one-click solution, you can setup software on a user's workstation with little or no impact on your work load. In fact, you don't even need to do the installation -- users can...

Using SSH to Securely Tunnel a TCP Application

Using SSH to Securely Tunnel a TCP Application

Often times, I'm caught in a situation where an application or service is not directly accessible to me from the network I'm currently on.  For instance, if I'm at a customer site, I may need VNC or RDP access to a collocated server.  Sure, I could open up port 5901...

Deploying IPv6 on a Cisco IOS router with a Tunnel Broker

Deploying IPv6 on a Cisco IOS router with a Tunnel Broker

The time has finally come! Just a few days ago, major internet companies participated in IPv6 Launch Day – meaning from this point forward, they will be running their production systems and making their services available to you via the IPv6 in addition to IPv4....

LinkedIn Password Database Leaked!

LinkedIn Password Database Leaked!

LinkedIn, the social network for professionals, has reported that its user database has been hacked and the encrypted passwords of 6+ million users have been stolen. Even though the password database was encrypted, users with weak passwords could be exposed with...

How a Disaster Turned out to be an Opportunity

How a Disaster Turned out to be an Opportunity

This post started out as a discussion of how Clonezilla made my life easy and Acronis made my life hard, but it quickly morphed into something different and more personal. Hopefully someone can take away from this that disasters can be quite bad when they happen, but they can also set you on a path you didn’t expect that may end up being wonderful.

Avoid Fatal Product Design Flaws with QA

Avoid Fatal Product Design Flaws with QA

The difference between quality assurance (QA) and testing is often misunderstood. In fact, the terms are frequently used interchangeably. However, testing is actually just one part of QA. Quality assurance, on the other hand, covers a larger, more holistic part of the...

Top Data Center Power Planning Considerations

Top Data Center Power Planning Considerations

Our Infrastructure Management Services include data center migration planning and deployment. Recently, I moved two different companies to new facilities. Both had drastically different IT needs. One was heavier on infrastructure and server room. The other was not...