Snort is used for performing security checks on network boundaries. This can be done on the outside Untrust network but is sometimes more useful to look at what’s getting through your firewall into the web servers. Follow our step-by-step instructions on how...
Month: July 2012
5 Minutes with Windows 8 and Office 2013
Dell Latitude ST This is the Dell Latitude ST, which can be had from the Dell Outlet store for about $300. It’s a 10-inch tablet slate running an Atom Z670 and 2GB of RAM – like a Netbook without a keyboard. Instead, it has an N-trig digitizer that supports both...
Do you Think an Engineering Employee is Really Cheaper Than a Consultant? … Think Again.
Occasionally I’ll get a comment from a potential client who is particularly price sensitive about the rates for our consultants, and the comment usually goes something like: “I can hire a full-time employee who would cost me a lot less than what you are going to...
Avoid Budget Overruns and Unhappy Customers with Better QA and Testing
Any project can be divided into different parts including requirements gathering, design, implementation, documentation and so on. One key aspect of the project lifecycle is quality assurance (QA), but it's often overlooked. Although almost all project managers...
Blog: Leveraging PTC’s Integrity Platform for IEC 62304 Compliance
SPK and Associates leverage PTC’s Integrity platform to help Medical Device companies develop software efficiently while achieving IEC 62304 compliance.