spk-logo-white-text-short2
0%
1-888-310-4540 (main) / 1-888-707-6150 (support) info@spkaa.com
Select Page

PDM/PLM-Product Data and Lifecycle Management

A Foundation for PLM Best Practices eBook

A Foundation for PLM Best Practices eBook

Ready to supercharge your organization's success in the competitive manufacturing landscape? Our free eBook is the ultimate guide to building a solid foundation for Product Lifecycle Management (PLM) best practices.  PLM Best Practices eBook Effectively implementing...

Outsourcing of Vital IT Tasks to Grow in 2013

Outsourcing of Vital IT Tasks to Grow in 2013

In 2013, roughly one third of businesses will increase their IT outsourcing budgets. Chief Information Officers and CEOs, from small businesses to large enterprises, are planning to up their spending on the outsourcing of web/e-commerce platforms, application...

Keep Your Developers Developing!

Keep Your Developers Developing!

Software companies often choose to rollout new products by having their developers work directly with beta test customers.  But is this really a good idea? Not really, but let's understand why not, and then consider a couple of best practices if you just have to do it...

Understanding Continuous Integration

Understanding Continuous Integration

Continuous Integration (CI) is a software development methodology that uses small and frequent incremental changes to the code base, which are incorporated into a rapid build and test environment. Each change integrated into the source repository is verified by the...

Macs in a Corporate IT Environment

Macs in a Corporate IT Environment

­Macs running OS X have been around for quite some time, but only recently have they gained enough traction with our customers at SPK to be used as their day to day desktop environment.  Historically, IT organizations have been reluctant to embrace this change.  This...

A Brief History of Automated Builds

A Brief History of Automated Builds

Almost every programming book starts with an example of a small program which can be compiled from the command line using a simple call to the compiler with maybe a few flags. Known as “Hello World”, the few lines of code needed to output the text is almost universal....

Deploying IPv6 on a Cisco IOS router with a Tunnel Broker

Deploying IPv6 on a Cisco IOS router with a Tunnel Broker

The time has finally come! Just a few days ago, major internet companies participated in IPv6 Launch Day – meaning from this point forward, they will be running their production systems and making their services available to you via the IPv6 in addition to IPv4....

LinkedIn Password Database Leaked!

LinkedIn Password Database Leaked!

LinkedIn, the social network for professionals, has reported that its user database has been hacked and the encrypted passwords of 6+ million users have been stolen. Even though the password database was encrypted, users with weak passwords could be exposed with...