spk-logo-white-text-short2
0%
1-888-310-4540 (main) / 1-888-707-6150 (support) info@spkaa.com
Select Page

Engineering Operations

How to Create ViewSets in PTC Integrity

How to Create ViewSets in PTC Integrity

Within PTC Integrity, a viewSet is a collection of views that persist each time the user opens and closes the PTC Integrity Client. Integrity offers the ability for administrators to pre-configure viewSets for distribution throughout their local user communities....

How to Set-up and Perform Impersonation on PTC Integrity

How to Set-up and Perform Impersonation on PTC Integrity

From time to time, if you are administering a PTC Integrity Lifecycle Manager you’ll need to be able to log into PTC Integrity as one of the users you support. If you want to avoid requesting their password (if your company uses LDAP to synchronize everyone’s PTC...

How to Count Days in State Within a PTC Integrity Report

How to Count Days in State Within a PTC Integrity Report

In the second of a group of supplemental articles on Metrics, Metrics, Metrics I am going to examine how you can report on days in state within your PTC Integrity Lifecycle Manager application. Of course your very first questions are likely going to be is “What the...

How To: Move Git Commits From One Branch to Another

How To: Move Git Commits From One Branch to Another

Git encourages developers to use branches during their development process as a means of coordinating and managing changes to the master branch. Git does not force any particular strategy for doing so and consequently, several popular branching strategies have...

Network Monitoring with Cacti

Network Monitoring with Cacti

In my initial blog post, I explained a little bit about Nagios, and how it can be configured to monitor any networking device or server.  Nagios' basic operation is this: Define a check Execute the check at a specified interval Take the result of the check and...

One-click Installer for PADS Flow 9.3 and Update1

One-click Installer for PADS Flow 9.3 and Update1

Everyone loves a one-click installer, but setting this up can be a headache, especially when a company changes the way this is done. You can setup your installation script to install both PADS9.3 and PADS9.3_update1 with a double-click of the mouse! Here are the first...

How to Install Software Packages Using Ninite

How to Install Software Packages Using Ninite

This week we want to have a look at a useful website that enables us to quickly and accurately install any of a large number of useful software packages. The website, www.ninite.com, presents a large number of current freeware packages, along with trial versions of a...

Using Speccy to Understand What’s Inside Your Computer

Using Speccy to Understand What’s Inside Your Computer

This week we’d like to cover a tool that assists with understanding what is actually in that desktop or laptop you work with. Most of us know in lesser or greater detail that there is a CPU, some random access memory (RAM) a hard disk drive (HDD), various peripherals...

Automatic Processing of Content on SolidWorks Workgroup PDM Server

Automatic Processing of Content on SolidWorks Workgroup PDM Server

One of the powerful features of a full enterprise product lifecycle management (PLM) system is being able to post process content uploaded to it. For example, adding a watermark, or changing a revision of a document automatically. The idea behind Solidworks Workgroup...

How to Create Your Own Custom Queries with PTC Integrity

How to Create Your Own Custom Queries with PTC Integrity

Often times when I am using PTC Integrity (now PTC Windchill RV&S), I am performing the same or similar tasks over and over again. By default, PTC Integrity offers you something called your Quick Query where you can save a query and run it over and over again. But...

Top 5 IT Infrastructure Posts of 2011 from SPK’s Blog

Top 5 IT Infrastructure Posts of 2011 from SPK’s Blog

Today, we're bringing you a rewind of the most popular IT Infrastructure posts of 2011. Enjoy these favorites from our blog as this year winds down. Number 5 - Solve 100 Problems with a Bootable USB Flash Drive What everyday device can be used for troubleshooting 100...

How to Authenticate Linux Users using Active Directory

How to Authenticate Linux Users using Active Directory

In my previous post regarding wireless security, I mentioned that a single source of authentication for users is the most ideal in a corporate environment. The advantages of using one source for authentication are vast. One of the biggest advantages is that users only...