SEP Blog
We’re curious people by nature. And we love to teach others what we’ve learned. So explore our blog to gain fresh insights from our expertise in areas ranging from culture to AI.
SEP Wins TechPoint’s 2024 Innovation Service Partner of the Year Mira Award
SEP Recognized as Indiana’s Top Innovation Service Partner, Winning TechPoint’s Prestigious Mira Award Westfield, Indiana – SEP has been named the Innovation Service Partner of the Year by TechPoint at the 25th annual Mira Awards. The Mira Awards, Indiana’s largest…
Read Full Post
Part III: Getting the Message Through In Part II, we explored some of the physical aspects of 802.15.4 networks. Way back in Part I, we saw why the ISM Band is so popular. In this post, we’ll explore ways that 802.15.4 networks can reliably operate in this crowded band. It’s a Jungle Out There By […]
Read Full Post
The Most Popular Wireless Standard You’ve Never Heard Of (Part II)
Part II: The Self-Organizing Network In part I, we started exploring the features of 802.15.4 networks. In this post, we’ll explore the ways these devices organize themselves into networks. The 802.15.4 standard describes three node types. Nodes are the Things that make up the Internet of Things. Nodes can arrange themselves into free-form mesh networks, […]
Read Full Post
Round Tripping Your Assumptions
This is an ignite talk I did at one of our Estimation Guild Meetings. Round tripping your assumptions from Bob Nowadly
Read Full Post
The Most Popular Wireless Standard You’ve Never Heard Of (Part I)
Part I: Life on the Edge As the Internet of Things (IoT) gained popularity, the industry needed radios that could provide a reasonable data rate at a low cost using battery power. IoT edge devices needed wireless connectivity that was simple to implement, inexpensive to manufacture, and cheap to operate. Batteries needed to last months, […]
Read Full Post
A Review of Three Checksum Verifier Tools
What is a CheckSum? A checksum is a unique string that identifies a file. You can think of it as a file’s fingerprint. Why do I need a Checksum Verifier? I have been writing scripts that automatically download programs and install them on computers. It is not secure to just download the file and blindly […]
Read Full Post
SEP DevOps Ignite Talks – Packer
For the fifth installment of the SEP DevOps Ignite Talks I gave an overview on Packer. Packer can create base images with built in configurations. Click through the slides below to see more. [slideshare id=73077428&doc=packer-170313014037]
Read Full Post
Installing FoodCritic on Windows
FoodCritiic is a linter for Chef Cookbooks. It does an automated code review on your Chef Cookbook and reports violations. See the FoodCritiic home page for a list of violations and how to fix them. Here are steps I used to install it on Windows. Install Ruby Install Ruby DevKit. I put in C:\Ruby-DevKit cd […]
Read Full Post
SEP DevOps Ignite Talks – Docker
This is the next in the series of DevOps Ignite talks that were given at SEP in January to present the different tools available for software configuration and deployment. It was a talk about Docker and its capabilities. Below are the slides from the talk. Docker slides from Jyotsna Raghuraman
Read Full Post
Load Balancing with Nginx and Docker
The previous post showed how to use Nginx as a reverse proxy to an ASP.NET Core application running in a separate Docker container. This time, I’ll show how to use a similar configuration to spin up multiple application containers and use Nginx as a load balancer to spread traffic over them. Desired architecture The architecture […]
Read Full Post