Let’s be realistic: Windows users use Microsoft Office and Microsoft Office requires configuration. You’ve probably used the Microsoft Office Customization Tool to create Microsoft Software Patch (MSP) files to automate installation, but you should consider using...
Engineering Operations
Firewall HA setup with Juniper NS50s
One item I’ve done repeatedly while doing network consulting services is configuring high availability (HA) networks. The recommended way is Virtual Router Redundancy Protocol (VRRP). This requires that you have two firewalls for every location and they run in...
How to Authenticate Linux Users using Active Directory
In my previous post regarding wireless security, I mentioned that a single source of authentication for users is the most ideal in a corporate environment. The advantages of using one source for authentication are vast. One of the biggest advantages is that users only...
Computer System Validation: A Closer Look at 21 C.F.R. §820.70(i) and FDA Warning Letters
Avoiding 21 C.F.R. §820.70(i) FDA Warning Letters
Using the New ClearQuest Eclipse Client
Have you noticed that Rational ClearQuest 7.0 now comes with a new default Eclipse client? Wonder what is happening to the old Windows client and what the difference between the two is? Then this post is for you! Download the attached PDF file below to get the...
Network Storage – Getting the most from your filesystem
In my last blog entry, I mentioned that I would discuss how to roll your own network attached storage device. At first, this might sound trivial. Take any commodity PC hardware, throw a large disk in there, install linux, configure NFS, done. Not so fast, there are...
3 Options for Network Installation and Application Management
It seems like every week there’s another article about “Network Installation Services” – even if we don’t realize it. I believe Apple really hit the nail on the head with their iPhone App Store, as evidenced by the copy-cat implementations in the WebOS App Catalog,...
Security layers on a modern website
Last time, we looked at a basic website design. Now it’s time to start digging into the details around what’s really being used behind the scenes. This time, we’ll focus on security aspects. When a user starts their browser and connects...
Migration of Your ClearQuest User Database in 7 Steps
Many customers of SPK & Associates utilize the IBM/Rational suite of products. As IBM partners we are often asked to define, configure and deploy IBM tools and processes. SPK has provided Engineering Technology Services to Medical Device companies for over 12...
Leveraging Group Policy to Setup Wireless Access
In my last post, I introduced Clonezilla as an easy way to deploy Windows-based workstations into a corporate environment. But once a workstation enters the corporate network, what sort of policy applies to it? What sort of actions can a user take on their...
Enterprise Storage – Do you really get what you pay for?
In my last blog post, I touched on my experience with Network Appliance filers and remote server monitoring. This week, I will be discussing alternative storage solutions, and how they measure up to one of the biggest players in the Network Attached Storage...
Upgrading from ClearCase/ClearQuest 7.0 to 7.1
As an IT engineering expert for SPK and associates, a California based IT services company, I write blog posts on topics such as Software Configuration Management and other Engineering Applications. This week I’d like to blog about my experiences in upgrading...