Welcome!

Microservices Expo Authors: Zakia Bouachraoui, Pat Romanski, Elizabeth White, Liz McMillan, Yeshim Deniz

Article

Modern Network Inventory Process

The network inventory allows optimizing the hardware and software expenses that can be rather high

Above all, the network inventory allows optimizing the hardware and software expenses that can be rather high. For instance, software licenses can be duplicated by users (this is out of the Copyright Low), some license keys can be expired and the IT manager can forget to renew them. Sometimes, vice versa, expensive software might be never used by employees. Moreover, the information on the antvirus software updates can help to evaluate the network protection. The inventory database analysis allows the system administrator to detect the unlicensed software installation on users' computers. All the mentioned aspects must be under the constant administrator's control.

The inventory process

The level of detail in the inventory database depends on the company size and the aim of inventory process. Here are the main items that should be constantly audited:

- All installed applications on remote computers, their versions and update dates.

- License information (license keys availability).

- Operation Systems that are installed on remote PCs.

- Installed antiviruses and update date.

- Hardware (for instance, memory size, monitors' models, HDD capacity, and so on).

Manual network inventory

After you have decided what kind of information you need to have in your inventory database, you need to choose a method of performing the network inventory. There are two of them. The first one is manual. It suits best for collecting data in small companies with a dozen of PCs. Usually, it is easier to inventory couple of dozen computers manually than to install and configure specialized inventory software. If you manage the manual data collecting it is recommended to write down all the information in MS Excel or Access files. It can help to sort the information more easily, generate reports, and compare gathered information with the already existing one.

Automated inventory

In big companies, it is more preferable to use the software for automated network inventory. There are dozens of programs that help to automate the software and hardware inventory process. If you have never used such programs, there are a few pieces of advice, which will help you to choose the most suitable for your company and network variant:

1. The program has to inventory all the items you need.

2. The inventory program has to detect the availability or absence of license keys of software that is used on remote computers.

3. The inventory program has to give the system administrator an opportunity to view the inventory information about each single PC.

4. Before making the decision about the program purchasing, check online comments and reviews on the software you are going to buy. This measure will help you to keep out the faulty or unfinished program.

5. Pay attention on types and amount of reports that the inventory software allows to generate. The more reports the system administrator can create, the wider his opportunities in managing the network in the operable and up-to-date state.

Conclusion

Network inventory is not just a creation the software and hardware database but it is the constant and complex network audit process. It includes the keeping in order of all the purchased documents and repairs' notices.

In general, it does not matter what kind of inventory process you prefer: automated or manual. All that is worth to keep in mind is that this process is not easy and you should not take it lightly. In any case, it is very important to identify the scope on the first step.

More Stories By Dmitriy Stepanov

Dmitriy Stepanov is a CEO at 10-Strike Software, Network Inventory, Network Monitoring, Bandwidth Monitoring Software developer. 10-Strike Software is a software developing company. They offer their high quality networking products since 1999. 10-Strike Software specializes in producing Windows network software for corporate users.

Microservices Articles
Lori MacVittie is a subject matter expert on emerging technology responsible for outbound evangelism across F5's entire product suite. MacVittie has extensive development and technical architecture experience in both high-tech and enterprise organizations, in addition to network and systems administration expertise. Prior to joining F5, MacVittie was an award-winning technology editor at Network Computing Magazine where she evaluated and tested application-focused technologies including app secu...
In his general session at 19th Cloud Expo, Manish Dixit, VP of Product and Engineering at Dice, discussed how Dice leverages data insights and tools to help both tech professionals and recruiters better understand how skills relate to each other and which skills are in high demand using interactive visualizations and salary indicator tools to maximize earning potential. Manish Dixit is VP of Product and Engineering at Dice. As the leader of the Product, Engineering and Data Sciences team at D...
When building large, cloud-based applications that operate at a high scale, it’s important to maintain a high availability and resilience to failures. In order to do that, you must be tolerant of failures, even in light of failures in other areas of your application. “Fly two mistakes high” is an old adage in the radio control airplane hobby. It means, fly high enough so that if you make a mistake, you can continue flying with room to still make mistakes. In his session at 18th Cloud Expo, Lee A...
Containers and Kubernetes allow for code portability across on-premise VMs, bare metal, or multiple cloud provider environments. Yet, despite this portability promise, developers may include configuration and application definitions that constrain or even eliminate application portability. In this session we'll describe best practices for "configuration as code" in a Kubernetes environment. We will demonstrate how a properly constructed containerized app can be deployed to both Amazon and Azure ...
Modern software design has fundamentally changed how we manage applications, causing many to turn to containers as the new virtual machine for resource management. As container adoption grows beyond stateless applications to stateful workloads, the need for persistent storage is foundational - something customers routinely cite as a top pain point. In his session at @DevOpsSummit at 21st Cloud Expo, Bill Borsari, Head of Systems Engineering at Datera, explored how organizations can reap the bene...
Using new techniques of information modeling, indexing, and processing, new cloud-based systems can support cloud-based workloads previously not possible for high-throughput insurance, banking, and case-based applications. In his session at 18th Cloud Expo, John Newton, CTO, Founder and Chairman of Alfresco, described how to scale cloud-based content management repositories to store, manage, and retrieve billions of documents and related information with fast and linear scalability. He addresse...
The now mainstream platform changes stemming from the first Internet boom brought many changes but didn’t really change the basic relationship between servers and the applications running on them. In fact, that was sort of the point. In his session at 18th Cloud Expo, Gordon Haff, senior cloud strategy marketing and evangelism manager at Red Hat, will discuss how today’s workloads require a new model and a new platform for development and execution. The platform must handle a wide range of rec...
SYS-CON Events announced today that DatacenterDynamics has been named “Media Sponsor” of SYS-CON's 18th International Cloud Expo, which will take place on June 7–9, 2016, at the Javits Center in New York City, NY. DatacenterDynamics is a brand of DCD Group, a global B2B media and publishing company that develops products to help senior professionals in the world's most ICT dependent organizations make risk-based infrastructure and capacity decisions.
Discussions of cloud computing have evolved in recent years from a focus on specific types of cloud, to a world of hybrid cloud, and to a world dominated by the APIs that make today's multi-cloud environments and hybrid clouds possible. In this Power Panel at 17th Cloud Expo, moderated by Conference Chair Roger Strukhoff, panelists addressed the importance of customers being able to use the specific technologies they need, through environments and ecosystems that expose their APIs to make true ...
In his keynote at 19th Cloud Expo, Sheng Liang, co-founder and CEO of Rancher Labs, discussed the technological advances and new business opportunities created by the rapid adoption of containers. With the success of Amazon Web Services (AWS) and various open source technologies used to build private clouds, cloud computing has become an essential component of IT strategy. However, users continue to face challenges in implementing clouds, as older technologies evolve and newer ones like Docker c...