Macs running OS X have been around for quite some time, but only recently have they gained enough traction with our customers at SPK to be used as their day to day desktop environment. Historically, IT organizations have been reluctant to embrace this change. This...
Software Development & Release Management
To SSD or not to SSD
What is an SSD? The term SSD (Solid State Drive), can refer to any drive that uses solid state components to store information, or more to the point - has no moving parts. When we hear terms like 'Flash Drive' or 'Thumb Drive', we typically don't think SSD, but...
Seven Attitude Hacks for Better IT Service
Attitudes are important things -- they are the lens through which we filter everything life throws at us, and they can either be the secret to our success or our undoing. We've all heard the stereotype that says IT professionals have bad attitudes, and maybe your own...
Upgrade to HWMonitor Pro and Make Your Computer’s Sensors Work For You!
Some time ago, I wrote an article about CPUID’s wonderful tool, HWMonitor. Today I want to follow up on that and give a few tips on how to make it more useful. Firstly, HWMonitor is a free tool, but CPUID publishes a Professional version of the product, predictably...
Why an Automated Development Process Benefits Developers
Automated development, rather than just automated builds, offers a more holistic approach to automating the development process including building, testing and deployment. It is the cornerstone of Continuous Integration (CI). CI uses a model of small incremental...
A Brief History of Automated Builds
Almost every programming book starts with an example of a small program which can be compiled from the command line using a simple call to the compiler with maybe a few flags. Known as “Hello World”, the few lines of code needed to output the text is almost universal....
How to Install Snort on a Redhat 6 Box
Snort is used for performing security checks on network boundaries. This can be done on the outside Untrust network but is sometimes more useful to look at what’s getting through your firewall into the web servers. Follow our step-by-step instructions on how...
How to Create a Silent Installer for ANSYS 14
I'm a huge fan of automation, especially when it comes to installing software. With a simple one-click solution, you can setup software on a user's workstation with little or no impact on your work load. In fact, you don't even need to do the installation -- users can...
Blog: Leveraging PTC’s Integrity Platform for IEC 62304 Compliance
SPK and Associates leverage PTC’s Integrity platform to help Medical Device companies develop software efficiently while achieving IEC 62304 compliance.
Do you Think an Engineering Employee is Really Cheaper Than a Consultant? … Think Again.
Occasionally I’ll get a comment from a potential client who is particularly price sensitive about the rates for our consultants, and the comment usually goes something like: “I can hire a full-time employee who would cost me a lot less than what you are going to...
Deploying IPv6 on a Cisco IOS router with a Tunnel Broker
The time has finally come! Just a few days ago, major internet companies participated in IPv6 Launch Day – meaning from this point forward, they will be running their production systems and making their services available to you via the IPv6 in addition to IPv4....
LinkedIn Password Database Leaked!
LinkedIn, the social network for professionals, has reported that its user database has been hacked and the encrypted passwords of 6+ million users have been stolen. Even though the password database was encrypted, users with weak passwords could be exposed with...