Welcome!

From the Founder and CEO of 10-Strike Software

Dmitriy Stepanov

Subscribe to Dmitriy Stepanov: eMailAlertsEmail Alerts
Get Dmitriy Stepanov via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories by Dmitriy Stepanov

Automatic Network Monitoring Process Every day and every second, the system administrator gets tons of information on the network operation, network devices’ operation, and messages from users; he sets dozens of challenges, which must help to avoid the existing and possible problems in the future. Often, it is rather difficult to cope with all huge amount of data. In this situation, the natural desire appears: the system administrator needs to systematize the gathered flow of information, in order to make it easier to analyze it and make decisions according to it. If he takes into account only nonthreatening problems, ignoring other data, it can lead to more serious problems. Everyone knows that even minor data loss or one of the company's systems downtime can lead to clients' loyalty loss and then eventually the company can lose the client himself. Register For Dev... (more)

How to Monitor Windows Share Access

Any tiny detail or process on the network are very important and need to be monitored on a regular basis. For instance, the network devices' and services' operation has to be audited; hardware and software must be inventoried. Even shared files and folders have to be under the system administrator's control. Why is it so important to audit access to shares? Sooner or later, any company meets the following problems: files disappear, important documents are modified or replaced by users without notifying anyone. Especially, it often happens in big organizations with a lot of emplo... (more)

Modern Network Inventory Process

Above all, the network inventory allows optimizing the hardware and software expenses that can be rather high. For instance, software licenses can be duplicated by users (this is out of the Copyright Low), some license keys can be expired and the IT manager can forget to renew them. Sometimes, vice versa, expensive software might be never used by employees. Moreover, the information on the antvirus software updates can help to evaluate the network protection. The inventory database analysis allows the system administrator to detect the unlicensed software installation on users' c... (more)

Network Inventory Methods

A company's managers have to be aware of what hardware and software is on hand, where it is situated, know its quantity, and what is necessary to increase the employees' effectiveness and the whole network's stability. If the managers or system administrators do not have such information, it can lead to certain problems. First of all, it can be the cause of huge expenses on unnecessary software that is never used. Secondly, without inventory database, the system administrator can miss the date of antivirus software updates or hardware upgrades that can be dangerous for network sa... (more)

What Is License Audit?

This article is about the license audit process in organizations of any size. It does not matter how many computers are there in your office or in the entire company - 5 or 500. Software plays a very important role in the whole organization's work, and it demands the careful attention as well as hardware. Besides, using the unlicensed or cracked software is against the law. We will not bring up the topic about, who is responsible for using unlicensed software in the organization: employer, IT manager, or employee - that's a separate theme. However, it is the system administrator... (more)