From the Founder and CEO of 10-Strike Software

Dmitriy Stepanov

Subscribe to Dmitriy Stepanov: eMailAlertsEmail Alerts
Get Dmitriy Stepanov: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories by Dmitriy Stepanov

The necessary condition of a company successful operation is a good state of computer assets. That is why all the company’s software and hardware should be inventoried on a regular basis. A system administrator has to audit the operation of computer hardware, check whether all the computer parts are in their places and operate normally. The administrator has to control and audit software licenses and installed programs on the computers. If the PCs are connected to a local network, you can solve the inventory problem easily by using a network inventory software. With a network inventory program, you can generate a network inventory database effortlessly. Install it on a system administrator’s PC only and add computers to be managed and inventoried into the program inventory database. After that, you will be able to get nearly any information about the computers’ ha... (more)

How to Maintain Your Network Operable with Network Monitor

Network equipment failures can cause grave consequences, such as material and data looses, bad relations with your customers, etc. System administrators should detect all the failures that can occur on all network devices (local computers, servers, switches, network printers and others) in time and recover them as fast as possible. That is why the network monitoring is vital in modern IT infrastructure. With the program 10-Strike Network Monitor, an administrator can solve this problem effortlessly. The program is to be installed on the administrator computer only and does not r... (more)

Network Monitoring Helps Improve LAN Reliability

Most network monitoring programs are based on periodic automatic testing of the efficiency of particular services, ports, and protocols. The most widespread method is sending particular ICMP packets to a remote host and waiting for a reply from it (ping). One of the most important device parameter considered from the network monitoring point of view is the device's response time. It allows you to analyze the device operation on the network and detect possible bottlenecks and failures in the data transfer process. There are a lot of network monitoring methods, and the choice dep... (more)

What Is License Audit?

This article is about the license audit process in organizations of any size. It does not matter how many computers are there in your office or in the entire company - 5 or 500. Software plays a very important role in the whole organization's work, and it demands the careful attention as well as hardware. Besides, using the unlicensed or cracked software is against the law. We will not bring up the topic about, who is responsible for using unlicensed software in the organization: employer, IT manager, or employee - that's a separate theme. However, it is the system administrator... (more)

Advantages of Performing Computer Inventory

It is difficult to imagine the modern life without computers. Moreover, it's impossible to think about the offices', companies' and organizations' operation process without these machines. Nowadays, almost any field is connected with computers: the work of accountants, engineers, journalists, designers, estimators, and so on. That is why not only the company's income, but its viability depends on stable operation of the computers. It is not difficult to keep a dozen of computers in a proper condition. But what if there are hundreds of them in the company? In this case, the system... (more)