Snort is used for performing security checks on network boundaries. This can be done on the outside Untrust network but is sometimes more useful to look at what’s getting through your firewall into the web servers. Follow our step-by-step instructions on how...
Software Development & Release Management
How to Create a Silent Installer for ANSYS 14
I'm a huge fan of automation, especially when it comes to installing software. With a simple one-click solution, you can setup software on a user's workstation with little or no impact on your work load. In fact, you don't even need to do the installation -- users can...
Blog: Leveraging PTC’s Integrity Platform for IEC 62304 Compliance
SPK and Associates leverage PTC’s Integrity platform to help Medical Device companies develop software efficiently while achieving IEC 62304 compliance.
Do you Think an Engineering Employee is Really Cheaper Than a Consultant? … Think Again.
Occasionally I’ll get a comment from a potential client who is particularly price sensitive about the rates for our consultants, and the comment usually goes something like: “I can hire a full-time employee who would cost me a lot less than what you are going to...
Deploying IPv6 on a Cisco IOS router with a Tunnel Broker
The time has finally come! Just a few days ago, major internet companies participated in IPv6 Launch Day – meaning from this point forward, they will be running their production systems and making their services available to you via the IPv6 in addition to IPv4....
LinkedIn Password Database Leaked!
LinkedIn, the social network for professionals, has reported that its user database has been hacked and the encrypted passwords of 6+ million users have been stolen. Even though the password database was encrypted, users with weak passwords could be exposed with...
Seamlessly Transition from AWS CodeCommit to GitLab
In July of 2024, AWS announced that AWS CodeCommit would no longer be sold to new customers. And thus begins the journey of winding down a product for AWS. As AWS CodeCommit approaches its end-of-life, many organizations face a tough decision. Choosing where to...
GitLab Duo Vulnerability Resolution Transforming Security for Modern Development
As new threats emerge, it is becoming vital for security to be integrated into code development processes. Vulnerabilities in code often lead to delays as teams try to balance addressing security concerns with delivering new features. Fortunately, GitLab Duo, GitLab’s...
How a Disaster Turned out to be an Opportunity
This post started out as a discussion of how Clonezilla made my life easy and Acronis made my life hard, but it quickly morphed into something different and more personal. Hopefully someone can take away from this that disasters can be quite bad when they happen, but they can also set you on a path you didn’t expect that may end up being wonderful.
Gain Greater Control Over Windows Disk Defragmentation with Defraggler
This week we have a look at an alternative to Windows Disk Defragmenter. Piriform has a number of Windows utility offerings, among which is Defraggler. Defraggler has the following capabilities, a number of which are not available with the Windows default utility. 1....
Avoid Fatal Product Design Flaws with QA
The difference between quality assurance (QA) and testing is often misunderstood. In fact, the terms are frequently used interchangeably. However, testing is actually just one part of QA. Quality assurance, on the other hand, covers a larger, more holistic part of the...
A 3-Phase Approach to Automated Software Delivery
Is your software delivery process outdated? Modernizing your software delivery workflows does not have to be difficult. Explore this eBook to discover how GitLab can help you modernize your software delivery pipelines. What You...