1-888-310-4540 (main) / 1-888-707-6150 (support) info@spkaa.com
Select Page

Remote Engineers

Five Reasons to Use SolidWorks PDM in the Cloud

Tired of dealing with in-house PDM issues, unreliable VPN connections, and struggling with remote file access? Perhaps you're looking for a solution that addresses your company's specific needs. Look no further: SPK and Associates SolidWorks PDM in the Cloud presents...

How to Increase Uptime of Your Engineering Systems

Picture this: all your engineering applications run slow, or worse, continue to shut down. Yet, the IT team reports no alerts within the remote monitoring and management systems despite the problem.  What is the root cause and how do you fix it?  Remote Monitoring and...
Firewall HA setup with Juniper NS50s

Firewall HA setup with Juniper NS50s

One item I’ve done repeatedly while doing network consulting services is configuring high availability (HA) networks. The recommended way is Virtual Router Redundancy Protocol (VRRP). This requires that you have two firewalls for every location and they run in...

How to Authenticate Linux Users using Active Directory

How to Authenticate Linux Users using Active Directory

In my previous post regarding wireless security, I mentioned that a single source of authentication for users is the most ideal in a corporate environment. The advantages of using one source for authentication are vast. One of the biggest advantages is that users only...

3 Options for Network Installation and Application Management

3 Options for Network Installation and Application Management

It seems like every week there’s another article about “Network Installation Services” – even if we don’t realize it. I believe Apple really hit the nail on the head with their iPhone App Store, as evidenced by the copy-cat implementations in the WebOS App Catalog,...

Leveraging Group Policy to Setup Wireless Access

Leveraging Group Policy to Setup Wireless Access

In my last post, I introduced Clonezilla as an easy way to deploy Windows-based workstations into a corporate environment. But once a workstation enters the corporate network, what sort of policy applies to it? What sort of actions can a user take on their...

Enterprise Storage – Do you really get what you pay for?

Enterprise Storage – Do you really get what you pay for?

In my last blog post, I touched on my experience with Network Appliance filers and remote server monitoring.  This week, I will be discussing alternative storage solutions, and how they measure up to one of the biggest players in the Network Attached Storage...

Upgrading from ClearCase/ClearQuest 7.0 to 7.1

Upgrading from ClearCase/ClearQuest 7.0 to 7.1

As an IT engineering expert for SPK and associates, a California based IT services company, I write blog posts on topics such as Software Configuration Management and other Engineering Applications. This week I’d like to blog about my experiences in upgrading...

How to Build a Corporate Web Infrastructure

How to Build a Corporate Web Infrastructure

As an IT professional, one question I’ve heard more than once is:   “Why do I need you – I can setup a computer, a web server, a database, etc”.    My answer varies based on the audience but essentially comes down to:  if you are entrusted with a company’s...

How to Monitor NetApps with Nagios

How to Monitor NetApps with Nagios

I just came to the realization that I've been working with Network Appliance filers for over a decade now. They're great -- rock solid stability, an ever expanding feature set, excellent tech support, and they're certified against many enterprise applications...