fbpx
1-888-310-4540 (main) / 1-888-707-6150 (support) info@spkaa.com
Select Page

Configuration Management

Keep Track of Passwords with Pleasant Solutions

Keep Track of Passwords with Pleasant Solutions

When involved in IT strategy consulting services, you need a way to keep track of passwords in a safe and accessible manner. There are a number of different options out there ranging from single machine managers to cloud-based services. The one I found to be a great...

Five Reasons to Outsource Compute Farm and Server Management

Five Reasons to Outsource Compute Farm and Server Management

The paradigm of computing resource configurations have changed several times of the last 40 years. From mainframes to mini computers, through desktops and file servers to server farms, software as a service and the cloud. Any company that uses server farms or...

How to Monitor Your APC UPS Units – Part 1

How to Monitor Your APC UPS Units – Part 1

Picture your ideal company technological infrastructure. Servers to handle day to day tasks, servers to do engineering simulations, network equipment to handle communication, network-attached storage for your company critical data, and last but not least,...

How to monitor Windows servers using Nagios and NSClient

How to monitor Windows servers using Nagios and NSClient

One of the best monitoring software packages available for system administrators is Nagios. It's free, open source, has a large community of developers and users for support and can be relied upon to provide outstanding monitoring for mission critical devices. As part...

Reverse Proxy Configurations

Reverse Proxy Configurations

Now it's time to look at some of the server side configurations. The first step is to configure reverse proxy for the HTTP services. These services live on hosts that sit in the DMZ. A proxy is very simple to configure and allows a lot of flexibility to grow over time...

3 Options for Network Installation and Application Management

3 Options for Network Installation and Application Management

It seems like every week there’s another article about “Network Installation Services” – even if we don’t realize it. I believe Apple really hit the nail on the head with their iPhone App Store, as evidenced by the copy-cat implementations in the WebOS App Catalog,...

Security layers on a modern website

Security layers on a modern website

Last time, we looked at a basic website design.   Now it’s time to start digging into the details around what’s really being used behind the scenes.   This time, we’ll focus on security aspects.  When a user starts their browser and connects...

Leveraging Group Policy to Setup Wireless Access

Leveraging Group Policy to Setup Wireless Access

In my last post, I introduced Clonezilla as an easy way to deploy Windows-based workstations into a corporate environment. But once a workstation enters the corporate network, what sort of policy applies to it? What sort of actions can a user take on their...

How to Build a Corporate Web Infrastructure

How to Build a Corporate Web Infrastructure

As an IT professional, one question I’ve heard more than once is:   “Why do I need you – I can setup a computer, a web server, a database, etc”.    My answer varies based on the audience but essentially comes down to:  if you are entrusted with a company’s...