spk-logo-white-text-short2
0%
1-888-310-4540 (main) / 1-888-707-6150 (support) info@spkaa.com
Select Page

Engineering Operations

Reverse Proxy Configurations

Reverse Proxy Configurations

Now it's time to look at some of the server side configurations. The first step is to configure reverse proxy for the HTTP services. These services live on hosts that sit in the DMZ. A proxy is very simple to configure and allows a lot of flexibility to grow over time...

Five Reasons to Outsource Compute Farm and Server Management

Five Reasons to Outsource Compute Farm and Server Management

The paradigm of computing resource configurations have changed several times of the last 40 years. From mainframes to mini computers, through desktops and file servers to server farms, software as a service and the cloud. Any company that uses server farms or...

How Docker Helps Your DevOps Infrastructure

How Docker Helps Your DevOps Infrastructure

These days, everything is moving to virtual. Virtual reality, virtual machines, and with Docker, virtual filesystems. Actually, Docker is not virtual, it's very real and is a very convenient way to package an entire filesystem and run it on any supported system. Why...

Migration of Your ClearQuest User Database in 7 Steps

Migration of Your ClearQuest User Database in 7 Steps

Many customers of SPK & Associates utilize the IBM/Rational suite of products.  As IBM partners we are often asked to define, configure and deploy IBM tools and processes. SPK has provided Engineering Technology Services to Medical Device companies for over 12...

Using the New ClearQuest Eclipse Client

Using the New ClearQuest Eclipse Client

Have you noticed that Rational ClearQuest 7.0 now comes with a new default Eclipse client? Wonder what is happening to the old Windows client and what the difference between the two is? Then this post is for you! Download the attached PDF file below to get the...

Using Unix and Windows Groups with ClearCase

Using Unix and Windows Groups with ClearCase

In this week’s blog entry, we want to have a look at how Unix and Windows groups work together in a mixed Unix/Windows environment. This topic can sometimes be a bit confusing, and here we hope to contribute to clarifying the subject. Many companies and development...

How To Use ClearCase clearfsimport and Avoid Pitfalls

How To Use ClearCase clearfsimport and Avoid Pitfalls

This week we will change things up a bit and have a look at an IBM/Rational ClearCase utility used for importing files into ClearCase source control. The utility command, clearfsimport, can be used to import any sort of file from a variety of other source control...

How To Add More Disk Space To Your Redhat Server Without Reformatting

How To Add More Disk Space To Your Redhat Server Without Reformatting

(Originally published in 2012, updated January 2022.) One of the common tasks for any system administrator is managing disk space on a server. A common question is how to increase disk space on a linux system. I won't go into a boring lecture on why managing disk...

Incorporating Accessibility Into Your Software Engineering Projects

Incorporating Accessibility Into Your Software Engineering Projects

Are you missing out on reaching 25% of the US population with your current software engineering project? Maybe the elderly, at 13% of the population, aren't part of your target market, or maybe it's the 12% of the US population who are disabled that you aren't...

Metrics, Metrics, Metrics in PTC Integrity: Part 4

Metrics, Metrics, Metrics in PTC Integrity: Part 4

In the three previous rounds of this Metrics, Metrics, Metrics series,  I discussed gathering metrics, and building Reports and Charts in PTC Integrity Lifecycle Manager. In this article, we will discuss how you can take various charts, reports and queries and...

Leveraging Group Policy to Setup Wireless Access

Leveraging Group Policy to Setup Wireless Access

In my last post, I introduced Clonezilla as an easy way to deploy Windows-based workstations into a corporate environment. But once a workstation enters the corporate network, what sort of policy applies to it? What sort of actions can a user take on their...