By now you have probably seen literally dozens of articles I’ve written on PTC Integrity Lifecycle Manager, talking about the ins and outs of various pieces of functionality. Today I thought it was time to go into greater detail on documents and how they are...
High Tech
The Difference Between Continuous Delivery and Continuous Deployment
In my previous article, I define and compare the two software development practices of Continuous Integration and Continuous Delivery. The two practices are complementary and potentially overlapping, but at least their names give us the hint that they are distinct. If...
Our Top Technology Stories in 2017 and 2018 Industry Predictions
SPK wants to wish our growing subscriber community a Happy New Year! We’re honored to be welcomed onto your desktops and smartphones to share stories on how to make your engineering team and company work more efficiently. Perhaps more importantly, we hope any...
Software Development Best Practices: Code Reviews – Part 3
In this third and final installment of my three-part software engineering best practices series on code reviews, we will look at the various tools available to facilitate the code review process. We've already looked at the benefits of code reviews and why conducting...
What Are The Key Agile and Lean Software Development Practices?
Agile and Lean Software Development approaches came into favor in the late nineties and beginning of the 21st Century in reaction to the many issues with traditional plan-driven, heavyweight software development processes. However, many of the practices embodied in...
Agile Development in Regulated Environments – Part 1: Yes, it can work
The value system and practices that embody Agile Software Development have been around for well over a decade, and have been touted as having "crossed the chasm" by organizations such as the Agile Alliance, Gartner, and Forrester Research. Numerous studies indicate...
Security and Compliance – What Your Company Needs to Know Part 1: Whitelisting
Security in the 21st century is a complicated game. The good guys are always playing catch up with the bad guys. Security is particularly important for medtech companies due to their specific compliance needs. Banking and fintech likewise have a high bar for security...
How to Account for Complex Risk with Jama in Medical Device Manufacturing
Requirements management isn’t optional in many fields. Medical technology and finance are just two fields where regulatory compliance necessitates requirements management. You and other stakeholders simply must be in total agreement about the requirements of a given...
Engineering Inefficiency is the Enemy of Innovation
I was intrigued by the information and conclusions presented in OnShape’s recent report, “The State of Product Development and Hardware Design 2019.” However, I was not as surprised as they were to hear that the biggest problem in R&D is still complex processes,...
How Cyber Security Requirements Can Throw your Medical Device Off Track
In our last article we talked about the four steps your organization must go through when designing secure connected medical devices. With the increasing attention paid to product security in this era of connected medical devices, many companies are scrambling to keep...
Solving CAD File Data Corruption By Looking Beyond the Obvious
One SPK client’s design engineering team was required to email CAD files to a technician to perform 3D printing. However, the CAD files were too large for regular email transmission. The designers manually converted each CAD file into a ZIP format for sending in one...
How To Leverage Jira as a Service Desk
Many of you are undoubtedly familiar with using Jira as an issue tracker. But for those of you who have been juggling issue tracking and meeting SLA requirements -- and for those of you who had the recently acquired VertygoSLA addon -- this article may be useful...