fbpx
1-888-310-4540 (main) / 1-888-707-6150 (support) info@spkaa.com
Select Page

Engineering Operations

Why an Automated Development Process Benefits Developers

Why an Automated Development Process Benefits Developers

Automated development, rather than just automated builds, offers a more holistic approach to automating the development process including building, testing and deployment. It is the cornerstone of Continuous Integration (CI). CI uses a model of small incremental...

Seven Attitude Hacks for Better IT Service

Seven Attitude Hacks for Better IT Service

Attitudes are important things -- they are the lens through which we filter everything life throws at us, and they can either be the secret to our success or our undoing. We've all heard the stereotype that says IT professionals have bad attitudes, and maybe your own...

Macs in a Corporate IT Environment

Macs in a Corporate IT Environment

­Macs running OS X have been around for quite some time, but only recently have they gained enough traction with our customers at SPK to be used as their day to day desktop environment.  Historically, IT organizations have been reluctant to embrace this change.  This...

Confluence upgrading to 4.0 from 3.8

Confluence upgrading to 4.0 from 3.8

Recently, we upgraded Confluence to 4.0, the latest revision and was pleasantly surprised by the process. The upgrade was seamless, well documented, and no major issues found. Upgrading confluence would have been really simple if we wanted to retain the same server....

LinkedIn Password Database Leaked!

LinkedIn Password Database Leaked!

LinkedIn, the social network for professionals, has reported that its user database has been hacked and the encrypted passwords of 6+ million users have been stolen. Even though the password database was encrypted, users with weak passwords could be exposed with...

Deploying IPv6 on a Cisco IOS router with a Tunnel Broker

Deploying IPv6 on a Cisco IOS router with a Tunnel Broker

The time has finally come! Just a few days ago, major internet companies participated in IPv6 Launch Day – meaning from this point forward, they will be running their production systems and making their services available to you via the IPv6 in addition to IPv4....

Using SSH to Securely Tunnel a TCP Application

Using SSH to Securely Tunnel a TCP Application

Often times, I'm caught in a situation where an application or service is not directly accessible to me from the network I'm currently on.  For instance, if I'm at a customer site, I may need VNC or RDP access to a collocated server.  Sure, I could open up port 5901...

5 Tools You Can Use to Eliminate Malware From Your Machine

5 Tools You Can Use to Eliminate Malware From Your Machine

One of the more common requests I receive from users is that their computer is running slowly, or even worse, they're getting a popup saying that their machine is infected with a virus and Extreme AntiVirus 2013 can remove that virus for the low low cost of $39.95!...

How does the Windows Phone 8 Kool-Aid Taste?

How does the Windows Phone 8 Kool-Aid Taste?

I’m just going to come out and say it: I drank the Windows Phone 8 Kool-Aid. My coworkers mock me, and I accept this. But darn it, I want to believe! (and it tastes a lot better than what I was drinking before.) And it's certainly better than if I wandered over to the...

To SSD or not to SSD

To SSD or not to SSD

What is an SSD? The term SSD (Solid State Drive), can refer to any drive that uses solid state components to store information, or more to the point - has no moving parts.  When we hear terms like 'Flash Drive' or 'Thumb Drive', we typically don't think SSD, but...