spk-logo-white-text-short2
0%
1-888-310-4540 (main) / 1-888-707-6150 (support) info@spkaa.com
Select Page

Remote Engineers

Medical Device Development: First to Market

Medical Device Development: First to Market

In the world of fast competitive marketing, a lot of attention goes to the first company who develops a creative breakthrough and comes out with a cool new device first. New technology in the medical device market has resulted in several new products which include;...

Bringing Your Own Android and Developing a BYOD Policy

Bringing Your Own Android and Developing a BYOD Policy

The concept of letting employees bring their own phones and devices to work has become more and more common. Employees want to use their personal devices in the workplace without having to carry around a second device for personal use. While this helps with cost...

Enterprise Storage – Do you really get what you pay for?

Enterprise Storage – Do you really get what you pay for?

In my last blog post, I touched on my experience with Network Appliance filers and remote server monitoring.  This week, I will be discussing alternative storage solutions, and how they measure up to one of the biggest players in the Network Attached Storage...

5 Reasons You Want Your PLM in the Cloud

5 Reasons You Want Your PLM in the Cloud

Put it in the cloud. You’ve heard this catch phrase over and over again, more so in recent years with the proliferation of online technologies and services. As more and more PLM software vendors choose to move their application to the cloud, should you consider moving...

Configuring PTC Integrity to use a Remote FLEXnet License Service

Configuring PTC Integrity to use a Remote FLEXnet License Service

You may want to add a new PTC Integrity development and/or test server to your existing PTC Integrity production environment -- and rather than have separate license files on each server, you want to access the already plentiful licenses on your PTC Integrity...

How to Authenticate Linux Users using Active Directory

How to Authenticate Linux Users using Active Directory

In my previous post regarding wireless security, I mentioned that a single source of authentication for users is the most ideal in a corporate environment. The advantages of using one source for authentication are vast. One of the biggest advantages is that users only...

Firewall HA setup with Juniper NS50s

Firewall HA setup with Juniper NS50s

One item I’ve done repeatedly while doing network consulting services is configuring high availability (HA) networks. The recommended way is Virtual Router Redundancy Protocol (VRRP). This requires that you have two firewalls for every location and they run in...

How to Keep Your Linux Servers Up to Date

How to Keep Your Linux Servers Up to Date

One of the most important aspects of our Linux server management service is operating system patching. With Windows, Microsoft has made this trivial by means of the Windows Update utility. Microsoft is the single source of the patches, and assuming that the patches...

How to setup basic Windows monitoring with Nagios

How to setup basic Windows monitoring with Nagios

In my previous blog post, I talked about how to setup NSClient++ for Windows which is very solid Nagios NRPE client. In this post, I'll describe how to setup some basic checks for your Windows server within Nagios and hopefully give you some ideas on what you should...

WebInject Scripting to Perform Advanced Monitoring

WebInject Scripting to Perform Advanced Monitoring

Nagios is a wonderful tool. However, there are limits to what you can do with it directly. As my colleague Brad discussed in a recent blog post, using NRPE is a powerful tool for Windows. For complicated web checks that require multi-step operation, we use: WebInject....