Welcome!

From the Founder and CEO of 10-Strike Software

Dmitriy Stepanov

Subscribe to Dmitriy Stepanov: eMailAlertsEmail Alerts
Get Dmitriy Stepanov via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories by Dmitriy Stepanov

Network equipment failures can cause grave consequences, such as material and data looses, bad relations with your customers, etc. System administrators should detect all the failures that can occur on all network devices (local computers, servers, switches, network printers and others) in time and recover them as fast as possible. That is why the network monitoring is vital in modern IT infrastructure. With the program 10-Strike Network Monitor, an administrator can solve this problem effortlessly. The program is to be installed on the administrator computer only and does not require installing any other software on remote computers. 10-Strike Network Monitor will scan your network, detect all devices, and create a list in the tree-like form. You can edit this list, for example, and organize hosts in folders. The monitoring process runs remotely via a network. Th... (more)

Network Monitoring Program: Pay or not to Pay?

Today you can find a lot of programs that help system administrators to perform the company's local network monitoring process. There are both commercial (all of them have different functionality and therefore different price) and free software among them. Some managers ask: why do they need to buy the software if a company can save money and use the free one? What is the difference between the commercial and free network monitoring programs? Does using the free software really help to cut down the company's expenses? 1. The functionality of commercial network monitoring programs ... (more)

Discover the Network Topology and Create Its Map

Network's stability depends on its architecture and the elements that the network consists of. That is why the system administrator needs to know its topology. The network map in front of his eyes helps the IT manager to view where all the network devices are located. In this case, he gets an opportunity to react on occurred failures more quickly. There are three solutions for the problem: 1. Drawing the network map manually. This process includes the wire tracking in order to discover the topology, and the map drawing on paper or using the computer. This method is free, but very... (more)

Modern Network Inventory Process

Above all, the network inventory allows optimizing the hardware and software expenses that can be rather high. For instance, software licenses can be duplicated by users (this is out of the Copyright Low), some license keys can be expired and the IT manager can forget to renew them. Sometimes, vice versa, expensive software might be never used by employees. Moreover, the information on the antvirus software updates can help to evaluate the network protection. The inventory database analysis allows the system administrator to detect the unlicensed software installation on users' c... (more)

Network Inventory Methods

A company's managers have to be aware of what hardware and software is on hand, where it is situated, know its quantity, and what is necessary to increase the employees' effectiveness and the whole network's stability. If the managers or system administrators do not have such information, it can lead to certain problems. First of all, it can be the cause of huge expenses on unnecessary software that is never used. Secondly, without inventory database, the system administrator can miss the date of antivirus software updates or hardware upgrades that can be dangerous for network sa... (more)