fbpx
1-888-310-4540 (main) / 1-888-707-6150 (support) info@spkaa.com
Select Page

How to Avoid Workarounds and Tackle the Larger Problem

windchill features best plm software
Written by SPK Blog Post
Published on June 21, 2013

One of the benefits of being an employee at a small IT and engineering consulting firm is that I get the benefits of a small organization combined with the resources of a the large organization I am assigned to. I don’t have to deal with much bureaucracy to get things done (and our clients benefit from this), and I still have the large IT budgets I need to get the tools required for my work. It is important, however, to remember not to think of these resources as magic pools of … magic… that will include whatever I want, or worse, what I think I already have.

A few weeks ago, a user asked me to spin up a Windows 8 Professional VM for him to do some development work on. This was an intriguing request, so I asked him why. He told me that he wanted to see if his program would interface with a Microsoft Surface Pro tablet as a client, but he wasn’t able to get funding for the actual tablet. Virtualization was the answer.

The user in question sits on the other side of a WAN from me, but our development network has a site-to-site VPN , so this was not a problem. There is a VMware cluster on each side, each managed by a vCenter Server. (At one time the two clusters were managed by the same vCenter Server instance, which would have made this request simpler to deliver, but for our unique situation, separating the clusters between two vCenter Server instances was a net benefit.) The user requested that the VM be on his cluster for networking reasons on his end, as the VM would have to communicate with a network that only existed in his building in addition to the multi-site development network.

I set off enthusiastically, and informed the user I could have it done in an hour. I assumed this would be no problem, as it would easily have been the case for a Windows 7 VM. This is where my problems began.

Download my PDF to learn the importance of performing the right task the first time.

Latest White Papers

A Field Guide to Threat Vectors in the Software Supply Chain

A Field Guide to Threat Vectors in the Software Supply Chain

The software supply chain is made up of many integrated parts, people, and processes. The components range from tools and configurations to code libraries and systems. These components’ goals are developing and delivering software. Unfortunately, risks are high due to...

Related Resources

The Future of CAD with PTC Creo and Artificial Intelligence

The Future of CAD with PTC Creo and Artificial Intelligence

The seemingly endless debate of Artificial Intelligence's benefits and drawbacks has permeated all technological media. Why is this such a hot topic? The public wants to understand what AI can do, the technologies it can benefit, and what the future holds for AI....

Bill of Materials Strategies for PTC Windchill PLM Success

Bill of Materials Strategies for PTC Windchill PLM Success

PLM solutions like PTC Windchill help organizations manage every facet of the product lifecycle. One of the best features for organizing these components is a Bill of Materials (BOM). Many PLM solutions integrate BOM management because it facilitates collaboration...

4 Advantages of SolidWorks Cloud PDM (Updated 2023)

4 Advantages of SolidWorks Cloud PDM (Updated 2023)

Considering the leap to cloud-based CAD and PDM solutions? A move to platforms like SolidWorks 3D CAD in the cloud paves the way for unmatched flexibility. Imagine accessing intricate engineering data from anywhere at any time. And, the benefits don’t end there. In...