spk-logo-white-text-short2
0%
1-888-310-4540 (main) / 1-888-707-6150 (support) info@spkaa.com
Select Page

Infrastructure

How to Set-up and Perform Impersonation on PTC Integrity

How to Set-up and Perform Impersonation on PTC Integrity

From time to time, if you are administering a PTC Integrity Lifecycle Manager you’ll need to be able to log into PTC Integrity as one of the users you support. If you want to avoid requesting their password (if your company uses LDAP to synchronize everyone’s PTC...

How to Count Days in State Within a PTC Integrity Report

How to Count Days in State Within a PTC Integrity Report

In the second of a group of supplemental articles on Metrics, Metrics, Metrics I am going to examine how you can report on days in state within your PTC Integrity Lifecycle Manager application. Of course your very first questions are likely going to be is “What the...

Network Monitoring with Cacti

Network Monitoring with Cacti

In my initial blog post, I explained a little bit about Nagios, and how it can be configured to monitor any networking device or server.  Nagios' basic operation is this: Define a check Execute the check at a specified interval Take the result of the check and...

One-click Installer for PADS Flow 9.3 and Update1

One-click Installer for PADS Flow 9.3 and Update1

Everyone loves a one-click installer, but setting this up can be a headache, especially when a company changes the way this is done. You can setup your installation script to install both PADS9.3 and PADS9.3_update1 with a double-click of the mouse! Here are the first...

How to Install Software Packages Using Ninite

How to Install Software Packages Using Ninite

This week we want to have a look at a useful website that enables us to quickly and accurately install any of a large number of useful software packages. The website, www.ninite.com, presents a large number of current freeware packages, along with trial versions of a...

Using Speccy to Understand What’s Inside Your Computer

Using Speccy to Understand What’s Inside Your Computer

This week we’d like to cover a tool that assists with understanding what is actually in that desktop or laptop you work with. Most of us know in lesser or greater detail that there is a CPU, some random access memory (RAM) a hard disk drive (HDD), various peripherals...

A Quick Start Guide to Installing Ceph

A Quick Start Guide to Installing Ceph

This seems to be the age of “Big Data”. Every sector seems to have a need for it -- from biotechs doing genome sequencing, to financial providers mining market data. For many, the ability to store massive amounts of structured or unstructured data is the key to...

Automatic Processing of Content on SolidWorks Workgroup PDM Server

Automatic Processing of Content on SolidWorks Workgroup PDM Server

One of the powerful features of a full enterprise product lifecycle management (PLM) system is being able to post process content uploaded to it. For example, adding a watermark, or changing a revision of a document automatically. The idea behind Solidworks Workgroup...

WinDirStat and Windows File Management

WinDirStat and Windows File Management

This week we want to cover a utility that allows users to manage the buildup of files that eat up space on your storage device. We are speaking about WinDirStat, which is a tool that presents a graphical view of your entire storage drive (or from a folder level)....

How to Create Your Own Custom Queries with PTC Integrity

How to Create Your Own Custom Queries with PTC Integrity

Often times when I am using PTC Integrity (now PTC Windchill RV&S), I am performing the same or similar tasks over and over again. By default, PTC Integrity offers you something called your Quick Query where you can save a query and run it over and over again. But...

Top 5 IT Infrastructure Posts of 2011 from SPK’s Blog

Top 5 IT Infrastructure Posts of 2011 from SPK’s Blog

Today, we're bringing you a rewind of the most popular IT Infrastructure posts of 2011. Enjoy these favorites from our blog as this year winds down. Number 5 - Solve 100 Problems with a Bootable USB Flash Drive What everyday device can be used for troubleshooting 100...

How to Authenticate Linux Users using Active Directory

How to Authenticate Linux Users using Active Directory

In my previous post regarding wireless security, I mentioned that a single source of authentication for users is the most ideal in a corporate environment. The advantages of using one source for authentication are vast. One of the biggest advantages is that users only...