fbpx
1-888-310-4540 (main) / 1-888-707-6150 (support) info@spkaa.com
Select Page

Engineering Operations

How to Create Google Charts with Python

How to Create Google Charts with Python

The goal of a typical system administrator is to get a job or task done as quickly as possible, without worrying about how elegant a solution might be.  Reusing any existing scripts, tools, or utilities are always the first line in tackling the job.  Often times, the...

Reverse Proxy Configurations

Reverse Proxy Configurations

Now it's time to look at some of the server side configurations. The first step is to configure reverse proxy for the HTTP services. These services live on hosts that sit in the DMZ. A proxy is very simple to configure and allows a lot of flexibility to grow over time...

CAPA:  A Review of 21 C.F.R. §820.100 and FDA Warning Letter Trends

CAPA: A Review of 21 C.F.R. §820.100 and FDA Warning Letter Trends

SPK and Associates routinely review warning letters to help our clients stay in step with FDA trends.   One of the problem areas most often cited in company audits continue to be the CAPA system/program.   This month we will take a look at some of the latest FDA...

Enterprise Backup – Using Bacula to save time and money!

Enterprise Backup – Using Bacula to save time and money!

One of the main areas SPK focuses on for our clients is backups. I won’t go into a long lecture about why backups are mission-critical for your business because you already know they are. Even the standard backup schemes, such as Grandfather-Father-Son, have been...

How to Keep Your Linux Servers Up to Date

How to Keep Your Linux Servers Up to Date

One of the most important aspects of our Linux server management service is operating system patching. With Windows, Microsoft has made this trivial by means of the Windows Update utility. Microsoft is the single source of the patches, and assuming that the patches...

Firewall HA setup with Juniper NS50s

Firewall HA setup with Juniper NS50s

One item I’ve done repeatedly while doing network consulting services is configuring high availability (HA) networks. The recommended way is Virtual Router Redundancy Protocol (VRRP). This requires that you have two firewalls for every location and they run in...

How to Authenticate Linux Users using Active Directory

How to Authenticate Linux Users using Active Directory

In my previous post regarding wireless security, I mentioned that a single source of authentication for users is the most ideal in a corporate environment. The advantages of using one source for authentication are vast. One of the biggest advantages is that users only...

Using the New ClearQuest Eclipse Client

Using the New ClearQuest Eclipse Client

Have you noticed that Rational ClearQuest 7.0 now comes with a new default Eclipse client? Wonder what is happening to the old Windows client and what the difference between the two is? Then this post is for you! Download the attached PDF file below to get the...

Network Storage – Getting the most from your filesystem

Network Storage – Getting the most from your filesystem

In my last blog entry, I mentioned that I would discuss how to roll your own network attached storage device. At first, this might sound trivial. Take any commodity PC hardware, throw a large disk in there, install linux, configure NFS, done. Not so fast, there are...

3 Options for Network Installation and Application Management

3 Options for Network Installation and Application Management

It seems like every week there’s another article about “Network Installation Services” – even if we don’t realize it. I believe Apple really hit the nail on the head with their iPhone App Store, as evidenced by the copy-cat implementations in the WebOS App Catalog,...