fbpx
1-888-310-4540 (main) / 1-888-707-6150 (support) info@spkaa.com
Select Page

Infrastructure

How to Authenticate Linux Users using Active Directory

How to Authenticate Linux Users using Active Directory

In my previous post regarding wireless security, I mentioned that a single source of authentication for users is the most ideal in a corporate environment. The advantages of using one source for authentication are vast. One of the biggest advantages is that users only...

Network Storage – Getting the most from your filesystem

Network Storage – Getting the most from your filesystem

In my last blog entry, I mentioned that I would discuss how to roll your own network attached storage device. At first, this might sound trivial. Take any commodity PC hardware, throw a large disk in there, install linux, configure NFS, done. Not so fast, there are...

3 Options for Network Installation and Application Management

3 Options for Network Installation and Application Management

It seems like every week there’s another article about “Network Installation Services” – even if we don’t realize it. I believe Apple really hit the nail on the head with their iPhone App Store, as evidenced by the copy-cat implementations in the WebOS App Catalog,...

Security layers on a modern website

Security layers on a modern website

Last time, we looked at a basic website design.   Now it’s time to start digging into the details around what’s really being used behind the scenes.   This time, we’ll focus on security aspects.  When a user starts their browser and connects...

Leveraging Group Policy to Setup Wireless Access

Leveraging Group Policy to Setup Wireless Access

In my last post, I introduced Clonezilla as an easy way to deploy Windows-based workstations into a corporate environment. But once a workstation enters the corporate network, what sort of policy applies to it? What sort of actions can a user take on their...

Enterprise Storage – Do you really get what you pay for?

Enterprise Storage – Do you really get what you pay for?

In my last blog post, I touched on my experience with Network Appliance filers and remote server monitoring.  This week, I will be discussing alternative storage solutions, and how they measure up to one of the biggest players in the Network Attached Storage...

Upgrading from ClearCase/ClearQuest 7.0 to 7.1

Upgrading from ClearCase/ClearQuest 7.0 to 7.1

As an IT engineering expert for SPK and associates, a California based IT services company, I write blog posts on topics such as Software Configuration Management and other Engineering Applications. This week I’d like to blog about my experiences in upgrading...

How to Build a Corporate Web Infrastructure

How to Build a Corporate Web Infrastructure

As an IT professional, one question I’ve heard more than once is:   “Why do I need you – I can setup a computer, a web server, a database, etc”.    My answer varies based on the audience but essentially comes down to:  if you are entrusted with a company’s...

10 Step Process for Deploying User Workstations using Clonezilla

10 Step Process for Deploying User Workstations using Clonezilla

One of the most time-consuming tasks as an IT Administrator is setting up a new workstation for a new user. A workstation is typically a laptop these days, but could still be a traditional Windows desktop or possibly a Linux-based workstation. As part of SPK's...

How to Monitor NetApps with Nagios

How to Monitor NetApps with Nagios

I just came to the realization that I've been working with Network Appliance filers for over a decade now. They're great -- rock solid stability, an ever expanding feature set, excellent tech support, and they're certified against many enterprise applications...