Welcome!

From the Founder and CEO of 10-Strike Software

Dmitriy Stepanov

Subscribe to Dmitriy Stepanov: eMailAlertsEmail Alerts
Get Dmitriy Stepanov via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories by Dmitriy Stepanov

Above all, the network inventory allows optimizing the hardware and software expenses that can be rather high. For instance, software licenses can be duplicated by users (this is out of the Copyright Low), some license keys can be expired and the IT manager can forget to renew them. Sometimes, vice versa, expensive software might be never used by employees. Moreover, the information on the antvirus software updates can help to evaluate the network protection. The inventory database analysis allows the system administrator to detect the unlicensed software installation on users' computers. All the mentioned aspects must be under the constant administrator's control. The inventory process The level of detail in the inventory database depends on the company size and the aim of inventory process. Here are the main items that should be constantly audited: - All installe... (more)

How to Monitor Windows Share Access

Any tiny detail or process on the network are very important and need to be monitored on a regular basis. For instance, the network devices' and services' operation has to be audited; hardware and software must be inventoried. Even shared files and folders have to be under the system administrator's control. Why is it so important to audit access to shares? Sooner or later, any company meets the following problems: files disappear, important documents are modified or replaced by users without notifying anyone. Especially, it often happens in big organizations with a lot of emplo... (more)

Modern Computer Inventory Process

What's all this in aid of? Computers are the implements in modern business, like lorry or lathe, for instance. As any other machines, all the company's PCs have to be managed. The system administrator has to install and update operating systems, replace the broken or out-of-date hardware with a new one, make decisions on purchasing necessary software and coordinate them with the company's manager and accounts department, audit the license keys availability, and so on. If the system administrator does not pay much attention to all the mentioned problems, this can lead to failures.... (more)

Network Inventory Methods

A company's managers have to be aware of what hardware and software is on hand, where it is situated, know its quantity, and what is necessary to increase the employees' effectiveness and the whole network's stability. If the managers or system administrators do not have such information, it can lead to certain problems. First of all, it can be the cause of huge expenses on unnecessary software that is never used. Secondly, without inventory database, the system administrator can miss the date of antivirus software updates or hardware upgrades that can be dangerous for network sa... (more)

Network Server Monitoring

Server is a piece of hardware that should perform particular tasks without the human agency. In very small organizations, a workstation can be used as server. It provides the connection between PCs on the network and their cooperative operation. In big companies, servers are much more difficult, more massive, and, therefore, much more expensive. Sometimes they can occupy a whole room or even a few rooms. The server equipment is to operate round the clock 7 days a week all the year. The operation of all the organization's departments depends on the servers' stability. There are a... (more)