fbpx
spk-logo-tm-2023
0%
1-888-310-4540 (main) / 1-888-707-6150 (support) info@spkaa.com
Select Page

Configuration Management

Keep Track of Passwords with Pleasant Solutions

Keep Track of Passwords with Pleasant Solutions

When involved in IT strategy consulting services, you need a way to keep track of passwords in a safe and accessible manner. There are a number of different options out there ranging from single machine managers to cloud-based services. The one I found to be a great...

Five Reasons to Outsource Compute Farm and Server Management

Five Reasons to Outsource Compute Farm and Server Management

The paradigm of computing resource configurations have changed several times of the last 40 years. From mainframes to mini computers, through desktops and file servers to server farms, software as a service and the cloud. Any company that uses server farms or...

How to Monitor Your APC UPS Units – Part 1

How to Monitor Your APC UPS Units – Part 1

Picture your ideal company technological infrastructure. Servers to handle day to day tasks, servers to do engineering simulations, network equipment to handle communication, network-attached storage for your company critical data, and last but not least,...

How to monitor Windows servers using Nagios and NSClient

How to monitor Windows servers using Nagios and NSClient

One of the best monitoring software packages available for system administrators is Nagios. It's free, open source, has a large community of developers and users for support and can be relied upon to provide outstanding monitoring for mission critical devices. As part...

Reverse Proxy Configurations

Reverse Proxy Configurations

Now it's time to look at some of the server side configurations. The first step is to configure reverse proxy for the HTTP services. These services live on hosts that sit in the DMZ. A proxy is very simple to configure and allows a lot of flexibility to grow over time...

Security layers on a modern website

Security layers on a modern website

Last time, we looked at a basic website design.   Now it’s time to start digging into the details around what’s really being used behind the scenes.   This time, we’ll focus on security aspects.  When a user starts their browser and connects...

Leveraging Group Policy to Setup Wireless Access

Leveraging Group Policy to Setup Wireless Access

In my last post, I introduced Clonezilla as an easy way to deploy Windows-based workstations into a corporate environment. But once a workstation enters the corporate network, what sort of policy applies to it? What sort of actions can a user take on their...

SRAM PTC Windchill PLM ROI Case Study

SRAM PTC Windchill PLM ROI Case Study

SRAM deployed PTC Windchill PLM to integrate and unify the engineering processes for all its brands. The company’s rapid growth through acquisition resulted in engineering and development groups that were not able to communicate and share information across...