fbpx
spk-logo-tm-2023
0%
1-888-310-4540 (main) / 1-888-707-6150 (support) info@spkaa.com
Select Page

Infrastructure

Web Proxy Server Uses

Web Proxy Server Uses

With websites, it's important to have a consistent method to gate keep incoming connections. This is primarily to maintain security and ensure a common access point for all traffic. Web proxy servers allow channeling of traffic and proxy content from internal servers...

5 Reasons to Use ntop for Network Management

5 Reasons to Use ntop for Network Management

One of the most critical aspects of your network infrastructure is how well it's performing. The question that I often get asked as a provider of infrastructure services is, "Am I getting the most out of my local network and my internet bandwidth?" This is the one...

Confluence upgrading to 4.0 from 3.8

Confluence upgrading to 4.0 from 3.8

Recently, we upgraded Confluence to 4.0, the latest revision and was pleasantly surprised by the process. The upgrade was seamless, well documented, and no major issues found. Upgrading confluence would have been really simple if we wanted to retain the same server....

Improve your build, test and deployment with ElectricCommander

Improve your build, test and deployment with ElectricCommander

Repeatability is a intuitive aspect of daily life. If you throw a ball up, it must come down. If you throw it twenty times, the same thing will happen, up and then down. When repeatability doesn't occur we get anxious. Repeatability is equally an essential quality in...

Outsourcing is the Best Way to Stay Flexible, Even Elastic!

Outsourcing is the Best Way to Stay Flexible, Even Elastic!

The technology industry loves buzzwords. The decade of the '80s was all about synergy and paradigm shifts. In the '90s, it was the web and the Internet. The turn of the century brought talk about virtualization and social media. Today it's all about the cloud. Of...

Macs in a Corporate IT Environment

Macs in a Corporate IT Environment

­Macs running OS X have been around for quite some time, but only recently have they gained enough traction with our customers at SPK to be used as their day to day desktop environment.  Historically, IT organizations have been reluctant to embrace this change.  This...

To SSD or not to SSD

To SSD or not to SSD

What is an SSD? The term SSD (Solid State Drive), can refer to any drive that uses solid state components to store information, or more to the point - has no moving parts.  When we hear terms like 'Flash Drive' or 'Thumb Drive', we typically don't think SSD, but...

5 Minutes with Windows 8 and Office 2013

5 Minutes with Windows 8 and Office 2013

Dell Latitude ST This is the Dell Latitude ST, which can be had from the Dell Outlet store for about $300. It’s a 10-inch tablet slate running an Atom Z670 and 2GB of RAM – like a Netbook without a keyboard. Instead, it has an N-trig digitizer that supports both...

How to Install Snort on a Redhat 6 Box

How to Install Snort on a Redhat 6 Box

Snort is used for performing security checks on network boundaries. This can be done on the outside Untrust network but is sometimes more useful to look at what’s getting through your firewall into the web servers. Follow our step-by-step instructions on how...

How to Create a Silent Installer for ANSYS 14

How to Create a Silent Installer for ANSYS 14

I'm a huge fan of automation, especially when it comes to installing software. With a simple one-click solution, you can setup software on a user's workstation with little or no impact on your work load. In fact, you don't even need to do the installation -- users can...