Macs running OS X have been around for quite some time, but only recently have they gained enough traction with our customers at SPK to be used as their day to day desktop environment. Historically, IT organizations have been reluctant to embrace this change. This...
Remote Engineers
5 Reasons You Want Your PLM in the Cloud
Put it in the cloud. You’ve heard this catch phrase over and over again, more so in recent years with the proliferation of online technologies and services. As more and more PLM software vendors choose to move their application to the cloud, should you consider moving...
Configuring PTC Integrity to use a Remote FLEXnet License Service
You may want to add a new PTC Integrity development and/or test server to your existing PTC Integrity production environment -- and rather than have separate license files on each server, you want to access the already plentiful licenses on your PTC Integrity...
Deploying Exchange and Outlook 2010 Settings Using MSP, GPO, and ADMX in 15 minutes
Let’s be realistic: Windows users use Microsoft Office and Microsoft Office requires configuration. You’ve probably used the Microsoft Office Customization Tool to create Microsoft Software Patch (MSP) files to automate installation, but you should consider using...
The 12 Principles Behind the Agile Manifesto: Principle Number Six – Promote Face To Face Interaction
Welcome back to our series as we continue to examine the 12 principles underlaying the Agile Manifesto! Our topic for this installment is principle six's guidance on effective communication. This principle states the following: The most efficient and effective method...
Upgrade to HWMonitor Pro and Make Your Computer’s Sensors Work For You!
Some time ago, I wrote an article about CPUID’s wonderful tool, HWMonitor. Today I want to follow up on that and give a few tips on how to make it more useful. Firstly, HWMonitor is a free tool, but CPUID publishes a Professional version of the product, predictably...
How to Authenticate Linux Users using Active Directory
In my previous post regarding wireless security, I mentioned that a single source of authentication for users is the most ideal in a corporate environment. The advantages of using one source for authentication are vast. One of the biggest advantages is that users only...
Firewall HA setup with Juniper NS50s
One item I’ve done repeatedly while doing network consulting services is configuring high availability (HA) networks. The recommended way is Virtual Router Redundancy Protocol (VRRP). This requires that you have two firewalls for every location and they run in...
How to Keep Your Linux Servers Up to Date
One of the most important aspects of our Linux server management service is operating system patching. With Windows, Microsoft has made this trivial by means of the Windows Update utility. Microsoft is the single source of the patches, and assuming that the patches...
How to setup basic Windows monitoring with Nagios
In my previous blog post, I talked about how to setup NSClient++ for Windows which is very solid Nagios NRPE client. In this post, I'll describe how to setup some basic checks for your Windows server within Nagios and hopefully give you some ideas on what you should...
WebInject Scripting to Perform Advanced Monitoring
Nagios is a wonderful tool. However, there are limits to what you can do with it directly. As my colleague Brad discussed in a recent blog post, using NRPE is a powerful tool for Windows. For complicated web checks that require multi-step operation, we use: WebInject....
How to Backup an ESXi Server with GhettoVCB
VMWare is wonderful for getting full utilization of scarce resource. However, if you're on a limited budget, affording ESX clustered hosts for all needs is overkill. Sometimes a free ESXi server is enough. In the latter, we ran into challenges doing backups. ...