spk-logo-tm-2023
0%
1-888-310-4540 (main) / 1-888-707-6150 (support) info@spkaa.com
Select Page

PDM/PLM-Product Data and Lifecycle Management

How To Leverage Jira as a Service Desk

How To Leverage Jira as a Service Desk

Many of you are undoubtedly familiar with using Jira as an issue tracker. But for those of you who have been juggling issue tracking and meeting SLA requirements -- and for those of you who had the recently acquired VertygoSLA addon -- this article may be useful...

Keep Track of Passwords with Pleasant Solutions

Keep Track of Passwords with Pleasant Solutions

When involved in IT strategy consulting services, you need a way to keep track of passwords in a safe and accessible manner. There are a number of different options out there ranging from single machine managers to cloud-based services. The one I found to be a great...

How To Use ClearCase clearfsimport and Avoid Pitfalls

How To Use ClearCase clearfsimport and Avoid Pitfalls

This week we will change things up a bit and have a look at an IBM/Rational ClearCase utility used for importing files into ClearCase source control. The utility command, clearfsimport, can be used to import any sort of file from a variety of other source control...

Declutter your multi-computer desktop with ‘Mouse without Borders’

Declutter your multi-computer desktop with ‘Mouse without Borders’

For the everyday user with a laptop or desktop, this article may not apply. And for those of you who have no need to have more than one PC on your desk -- kudos! But from time to time, its necessary to have several PC's on your desk at the same time -- especially...

Macs in a Corporate IT Environment

Macs in a Corporate IT Environment

­Macs running OS X have been around for quite some time, but only recently have they gained enough traction with our customers at SPK to be used as their day to day desktop environment.  Historically, IT organizations have been reluctant to embrace this change.  This...

A Brief History of Automated Builds

A Brief History of Automated Builds

Almost every programming book starts with an example of a small program which can be compiled from the command line using a simple call to the compiler with maybe a few flags. Known as “Hello World”, the few lines of code needed to output the text is almost universal....

Deploying IPv6 on a Cisco IOS router with a Tunnel Broker

Deploying IPv6 on a Cisco IOS router with a Tunnel Broker

The time has finally come! Just a few days ago, major internet companies participated in IPv6 Launch Day – meaning from this point forward, they will be running their production systems and making their services available to you via the IPv6 in addition to IPv4....

LinkedIn Password Database Leaked!

LinkedIn Password Database Leaked!

LinkedIn, the social network for professionals, has reported that its user database has been hacked and the encrypted passwords of 6+ million users have been stolen. Even though the password database was encrypted, users with weak passwords could be exposed with...

The Project Management Skills Gap

The Project Management Skills Gap

When it comes to product innovation and project development, the role of the project manager cannot be underestimated. That's why it's important to take an objective look at the skills and resources available in your organization and determine if a skills gap exists...