Welcome!

From the Founder and CEO of 10-Strike Software

Dmitriy Stepanov

Subscribe to Dmitriy Stepanov: eMailAlertsEmail Alerts
Get Dmitriy Stepanov via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories by Dmitriy Stepanov

What's all this in aid of? Computers are the implements in modern business, like lorry or lathe, for instance. As any other machines, all the company's PCs have to be managed. The system administrator has to install and update operating systems, replace the broken or out-of-date hardware with a new one, make decisions on purchasing necessary software and coordinate them with the company's manager and accounts department, audit the license keys availability, and so on. If the system administrator does not pay much attention to all the mentioned problems, this can lead to failures. Imagine a network that consists of hundreds of computers. The head manager decides to purchase the software that is necessary for the company's operation. The company spends a lot of money on licenses, but when all needed documents are signed and license keys are received, a very unpleasant ... (more)

How to Monitor Windows Share Access

Any tiny detail or process on the network are very important and need to be monitored on a regular basis. For instance, the network devices' and services' operation has to be audited; hardware and software must be inventoried. Even shared files and folders have to be under the system administrator's control. Why is it so important to audit access to shares? Sooner or later, any company meets the following problems: files disappear, important documents are modified or replaced by users without notifying anyone. Especially, it often happens in big organizations with a lot of emplo... (more)

Network Inventory Methods

A company's managers have to be aware of what hardware and software is on hand, where it is situated, know its quantity, and what is necessary to increase the employees' effectiveness and the whole network's stability. If the managers or system administrators do not have such information, it can lead to certain problems. First of all, it can be the cause of huge expenses on unnecessary software that is never used. Secondly, without inventory database, the system administrator can miss the date of antivirus software updates or hardware upgrades that can be dangerous for network sa... (more)

Modern Network Inventory Process

Above all, the network inventory allows optimizing the hardware and software expenses that can be rather high. For instance, software licenses can be duplicated by users (this is out of the Copyright Low), some license keys can be expired and the IT manager can forget to renew them. Sometimes, vice versa, expensive software might be never used by employees. Moreover, the information on the antvirus software updates can help to evaluate the network protection. The inventory database analysis allows the system administrator to detect the unlicensed software installation on users' c... (more)

Advantages of Performing Computer Inventory

It is difficult to imagine the modern life without computers. Moreover, it's impossible to think about the offices', companies' and organizations' operation process without these machines. Nowadays, almost any field is connected with computers: the work of accountants, engineers, journalists, designers, estimators, and so on. That is why not only the company's income, but its viability depends on stable operation of the computers. It is not difficult to keep a dozen of computers in a proper condition. But what if there are hundreds of them in the company? In this case, the system... (more)