SEP Blog

We’re curious people by nature. And we love to teach others what we’ve learned. So explore our blog to gain fresh insights from our expertise in areas ranging from culture to AI.

SEP Wins TechPoint’s 2024 Innovation Service Partner of the Year Mira Award

SEP Recognized as Indiana’s Top Innovation Service Partner, Winning TechPoint’s Prestigious Mira Award Westfield, Indiana – SEP has been named the Innovation Service Partner of the Year by TechPoint at the 25th annual Mira Awards. The Mira Awards, Indiana’s largest…
Read Full Post

The Most Popular Wireless Standard You’ve Never Heard Of (Part III)

Part III: Getting the Message Through In Part II, we explored some of the physical aspects of 802.15.4 networks. Way back in Part I, we saw why the ISM Band is so popular. In this post, we’ll explore ways that 802.15.4 networks can reliably operate in this crowded band. It’s a Jungle Out There By […]
Read Full Post

The Most Popular Wireless Standard You’ve Never Heard Of (Part II)

Part II: The Self-Organizing Network In part I, we started exploring the features of 802.15.4 networks. In this post, we’ll explore the ways these devices organize themselves into networks. The 802.15.4 standard describes three node types. Nodes are the Things that make up the Internet of Things. Nodes can arrange themselves into free-form mesh networks, […]
Read Full Post

Round Tripping Your Assumptions

This is an ignite talk I did at one of our Estimation Guild Meetings. Round tripping your assumptions from Bob Nowadly
Read Full Post

The Most Popular Wireless Standard You’ve Never Heard Of (Part I)

Part I: Life on the Edge As the Internet of Things (IoT) gained popularity, the industry needed radios that could provide a reasonable data rate at a low cost using battery power. IoT edge devices needed wireless connectivity that was simple to implement, inexpensive to manufacture, and cheap to operate. Batteries needed to last months, […]
Read Full Post

A Review of Three Checksum Verifier Tools

What is a CheckSum? A checksum is a unique string that identifies a file. You can think of it as a file’s fingerprint. Why do I need a Checksum Verifier? I have been writing scripts that automatically download programs and install them on computers. It is not secure to just download the file and blindly […]
Read Full Post

SEP DevOps Ignite Talks – Packer

​For the fifth installment of the SEP DevOps Ignite Talks I gave an overview on Packer. Packer can create base images with built in configurations. Click through the slides below to see more. [slideshare id=73077428&doc=packer-170313014037]
Read Full Post

Installing FoodCritic on Windows

FoodCritiic is a linter for Chef Cookbooks. It does an automated code review on your Chef Cookbook and reports violations. See the FoodCritiic home page for a list of violations and how to fix them. Here are steps I used to install it on Windows. Install Ruby Install Ruby DevKit. I put in C:\Ruby-DevKit cd […]
Read Full Post

SEP DevOps Ignite Talks – Docker

This is the next in the series of DevOps Ignite talks that were given at SEP in January to present the different tools available for software configuration and deployment.  It was a talk about Docker and its capabilities.  Below are the slides from the talk. Docker slides from Jyotsna Raghuraman
Read Full Post

Load Balancing with Nginx and Docker

The previous post showed how to use Nginx as a reverse proxy to an ASP.NET Core application running in a separate Docker container. This time, I’ll show how to use a similar configuration to spin up multiple application containers and use Nginx as a load balancer to spread traffic over them. Desired architecture The architecture […]
Read Full Post