Resources to Help Accelerate Your Product Development
Explore our content! Our goal is to help you learn, implement and succeed. See our blog, white papers, webinars, and other content. All content is freely downloadable.
![spk-resources-header](https://www.spkaa.com/wp-content/uploads/2021/11/spk-resources-header.png)
Refine by Resource Topic or Type
9 Things You Need To Know About Cybersecurity and Protected Health Information (PHI) breaches
In the past 18 months, there have been breaches of security related to protected health information (PHI) at Broward Health, Florida Healthy Kids, and the Accellion FTA Hack. In turn, these breaches resulted in 11 more healthcare organizations getting exploited. ...
How To Use Power BI To Display Employee Profitability In A Services Company
How To Use Power BI for KPIs in a Service Enterprise There are many important Key Performance Indicators to consider when running your business. Measuring your sales growth and the profitability of your projects help you continue to scale and expand. But how do you...
How To Fix Broken References in SolidWorks PDM
https://www.youtube.com/watch?v=tAZ2CEqerNM How To Update References This is a tricky task that sometimes occurs when you're adding files to the vault from another location, maybe files from a vendor, maybe an assembly from a vendor, maybe collaborating with other...
What Is The Self Service Catalog In CloudBees CD?
Let's Define It Self service catalog is a powerful tool that allows non-technical people to run reports, and technical people to accelerate setup and configuration. Why Should I Use The Self Service Catalog? The self service catalog creates an easy to use UI for...
Using Credentials In Code In CloudBees SDA
Credentials Are Tough By Design Credentials in Cloudbees SDA are admittedly a little tricky to get to. This is by design. If it were any easier, it could be a potential security risk. There is really just one way to use credentials in code, and it’s a multi-step...
5 Best Practices That Could Have Protected You From Log4J
Log4j: What Is It? On December 9, 2021, a critical exploit named "Log4j" was disclosed to the world. This exploit was particularly harrowing due to the fact that the software library which it targeted is so widely utilized. “Log4Shell” (CVE-2021-44228,...
Creating Dashboards To Reveal The Real Info
SPK comes to the aid of a major medical device maker to solve the mystery of why project-management and employee-utilization metrics couldn’t be trusted—and then fixed the problems, and created powerful dashboards for the CFO and other execs The Client In The...
What Is A Digital Twin And Why Is It Important?
Manufacturing companies, even the ones that are not highly regulated, have no shortage of complexity these days as they build, scale and manage multiple interdependent pieces of equipment, software bundles and networks. All this, while under time and cost pressures....
Extending CloudBees SDA Analytics
CloudBees SDA Analytics has more power than you think One of the main features of CloudBees SDA is CloudBees Analytics, powered by ElasticSearch. It’s a powerful tool for displaying continuous integration data and there are loads of useful metrics available from...
Is The IT Department Really “Dead?”
“It’s Time to Get Rid of the IT Department.” That was the title of an opinion piece recently published in the Wall Street Journal. Provocative? Sure. My answer to this is not “yes,” but many of the author’s points are valid. The Same Old IT Department? No, the IT...
Latest White Papers
Atlassian Cloud: Understanding Zero Trust Security
Where to start & why it matters What is the Atlassian Cloud Zero Trust Security model? Well, for decades, enterprise security controls were built to protect a large, single perimeter around a corporation. Often described as castle-and-moat security, This approach...