Welcome!

From the Founder and CEO of 10-Strike Software

Dmitriy Stepanov

Subscribe to Dmitriy Stepanov: eMailAlertsEmail Alerts
Get Dmitriy Stepanov via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories by Dmitriy Stepanov

The program should collect the inbound and outbound network traffic data on computers. With such a program you can easily find out which computer in your network uses up the available bandwidth. What other benefits will we get when we use a bandwidth monitoring program? We can identify a guilty employee, who uses the company resources for personal affairs, or find computers infected by a virus which generates a lot of network traffic. When the bandwidth monitor constantly collects the statistics about the inbound and outbound traffic which passes through each networked computer, it can display the dynamic of speed transfer changes in the real-time on graphs and tables. When the program monitors your network traffic usage 24 hours a day, it will be able to detect network failures and network bandwidth problems. The program can notify you in time about the bandwidth p... (more)

Server Monitoring Process

Network monitoring is the most important part of the system administrator's or IT manager's work. The larger the company is, the more employees work there, the more clients are served by this organization, the more vital the server monitoring process is. It is worth mentioning that nowadays there are a lot of companies with rather small and simple networks where servers are also used and need to be monitored. The server equipment is to operate round the clock 7 days in a week all the year. It is not recommended to stop the server operation because this can lead to a company's wo... (more)

Network Bandwidth Monitoring Software for Evaluating Employees Effectiveness

Any modern company needs systematization, detailed analysis, and control of the network traffic that is transmitted through the company's computers, servers, and other devices. This process is called the traffic and bandwidth monitoring. The importance of the constant traffic monitoring is determined by a lot of reasons. First of all, it is essential for companies which have to limit the traffic volume utilized by users per day, week, month if, for instance, the connection to the Internet is limited. A bandwidth monitoring program allows the system administrator not only to cont... (more)

Discover the Network Topology and Create Its Map

Network's stability depends on its architecture and the elements that the network consists of. That is why the system administrator needs to know its topology. The network map in front of his eyes helps the IT manager to view where all the network devices are located. In this case, he gets an opportunity to react on occurred failures more quickly. There are three solutions for the problem: 1. Drawing the network map manually. This process includes the wire tracking in order to discover the topology, and the map drawing on paper or using the computer. This method is free, but very... (more)

Modern Network Inventory Process

Above all, the network inventory allows optimizing the hardware and software expenses that can be rather high. For instance, software licenses can be duplicated by users (this is out of the Copyright Low), some license keys can be expired and the IT manager can forget to renew them. Sometimes, vice versa, expensive software might be never used by employees. Moreover, the information on the antvirus software updates can help to evaluate the network protection. The inventory database analysis allows the system administrator to detect the unlicensed software installation on users' c... (more)