fbpx
spk-logo-tm-2023
0%
1-888-310-4540 (main) / 1-888-707-6150 (support) info@spkaa.com
Select Page

Infrastructure

Improve your build, test and deployment with ElectricCommander

Improve your build, test and deployment with ElectricCommander

Repeatability is a intuitive aspect of daily life. If you throw a ball up, it must come down. If you throw it twenty times, the same thing will happen, up and then down. When repeatability doesn't occur we get anxious. Repeatability is equally an essential quality in...

Outsourcing is the Best Way to Stay Flexible, Even Elastic!

Outsourcing is the Best Way to Stay Flexible, Even Elastic!

The technology industry loves buzzwords. The decade of the '80s was all about synergy and paradigm shifts. In the '90s, it was the web and the Internet. The turn of the century brought talk about virtualization and social media. Today it's all about the cloud. Of...

Macs in a Corporate IT Environment

Macs in a Corporate IT Environment

­Macs running OS X have been around for quite some time, but only recently have they gained enough traction with our customers at SPK to be used as their day to day desktop environment.  Historically, IT organizations have been reluctant to embrace this change.  This...

To SSD or not to SSD

To SSD or not to SSD

What is an SSD? The term SSD (Solid State Drive), can refer to any drive that uses solid state components to store information, or more to the point - has no moving parts.  When we hear terms like 'Flash Drive' or 'Thumb Drive', we typically don't think SSD, but...

5 Minutes with Windows 8 and Office 2013

5 Minutes with Windows 8 and Office 2013

Dell Latitude ST This is the Dell Latitude ST, which can be had from the Dell Outlet store for about $300. It’s a 10-inch tablet slate running an Atom Z670 and 2GB of RAM – like a Netbook without a keyboard. Instead, it has an N-trig digitizer that supports both...

How to Install Snort on a Redhat 6 Box

How to Install Snort on a Redhat 6 Box

Snort is used for performing security checks on network boundaries. This can be done on the outside Untrust network but is sometimes more useful to look at what’s getting through your firewall into the web servers. Follow our step-by-step instructions on how...

How to Create a Silent Installer for ANSYS 14

How to Create a Silent Installer for ANSYS 14

I'm a huge fan of automation, especially when it comes to installing software. With a simple one-click solution, you can setup software on a user's workstation with little or no impact on your work load. In fact, you don't even need to do the installation -- users can...

Deploying IPv6 on a Cisco IOS router with a Tunnel Broker

Deploying IPv6 on a Cisco IOS router with a Tunnel Broker

The time has finally come! Just a few days ago, major internet companies participated in IPv6 Launch Day – meaning from this point forward, they will be running their production systems and making their services available to you via the IPv6 in addition to IPv4....

Gain Greater Control Over Windows Disk Defragmentation with Defraggler

Gain Greater Control Over Windows Disk Defragmentation with Defraggler

This week we have a look at an alternative to Windows Disk Defragmenter. Piriform has a number of Windows utility offerings, among which is Defraggler. Defraggler has the following capabilities, a number of which are not available with the Windows default utility. 1....

Setting up Web metrics with Webalizer

Setting up Web metrics with Webalizer

When managing websites, it's important to have metrics on the site for both admin and content owners. One of the easiest ways to do this is Webalizer. It is a free tool that uses the Apache access log to provide a graphical presentation of usage. Attached is a quick...