fbpx
1-888-310-4540 (main) / 1-888-707-6150 (support) info@spkaa.com
Select Page

Software Development & Release Management

Exploring Modern Software Deployment Strategies

Exploring Modern Software Deployment Strategies

Deploying software can feel like a gamble due to all the strategies and solutions on the market, but it doesn’t have to be. Discovering which software deployment strategy works best for your organization is a great place to start. This strategy, combined with a modern...

Automatically Visualizing Dependencies in Codebeamer

Automatically Visualizing Dependencies in Codebeamer

If you work in the software and systems engineering space, you likely understand that managing dependencies across multiple components and requirements is critical for project success. Unfortunately, specifications can be difficult to track, and dependencies hard to...

A 3-Phase Approach to Automated Software Delivery

A 3-Phase Approach to Automated Software Delivery

Is your software delivery process outdated? Modernizing your software delivery workflows does not have to be difficult. Explore this eBook to discover how GitLab can help you modernize your software delivery pipelines. What You...

Forrester Report: Vendors Move to Dominate IT Management Software

Forrester Report: Vendors Move to Dominate IT Management Software

Discover why Atlassian is one of two vendors to achieve a dominant position in IT management software. With an abundance of choices, actually navigating the IT management software space can be overwhelming. Fortunately, the recent Forrester Trends Report, “Vendors...

Outsource Your System Administration to Set Your Engineers Free

Outsource Your System Administration to Set Your Engineers Free

The inquisitive nature of engineers, which makes them so good at designing, developing and building products, can also lead them to become distracted by other “interesting things” like managing the very systems and tools that allow them to do their engineering....

Creating a Custom Nagios Plugin

Creating a Custom Nagios Plugin

Nagios is an invaluable tool to help monitor a customer's infrastructure.  Last year, I explained how easy it was to be able to integrate Network Appliance health checks.  In fact, Nagios provides a plethora of out of the box plugins.  Additional plugins are available...

How to Obtain Electric Commander Metrics for Use in a GWT Plugin

How to Obtain Electric Commander Metrics for Use in a GWT Plugin

Developed by Electric Cloud, Electric Commander is an extremely versatile tool for enhancing and automating your organization’s software development build-test-deploy cycle. Commander makes it possible to eliminate unnecessary lag time between phases of the...

Service Excellence: Jira Service Management Best Practices

Service Excellence: Jira Service Management Best Practices

Jira Service Management is a powerful tool from Atlassian, designed to streamline service desk operations. It helps IT and software teams deliver efficient support and manage incidents. When using JSM, following a set of best practices can increase successful outcomes...

Get Insight Into Your Misbehaving Laptop With Three Free Tools

Get Insight Into Your Misbehaving Laptop With Three Free Tools

Get insight into your laptop’s status and taking some precautions with CPUID’s Hardware Monitor and CPU-Z and Belarc Advisor It happens to most laptops eventually.  After two or more years of heavy (ab)use, most of our laptops are not in the condition they were...

How to Setup License Statistics Free Version

How to Setup License Statistics Free Version

Software asset management tools, particularly license usage and monitoring software are gaining more and more interest among large corporations. It should come as no surprise since by utilizing such tools they stand to gain upwards to 10% in cost reductions and that...

Security basics with IPTables

Security basics with IPTables

When on the internet, there's always concerns of security.   If you're listening on some services but not others, you need to modify the Linux firewall to allow this. Also, if there's undesirable clients accessing ports and hacking, IPTables is an effective...