Welcome!

Microservices Expo Authors: Pat Romanski, Elizabeth White, Liz McMillan, Karthick Viswanathan, Andy Thurai

Article

Modern Network Inventory Process

The network inventory allows optimizing the hardware and software expenses that can be rather high

Above all, the network inventory allows optimizing the hardware and software expenses that can be rather high. For instance, software licenses can be duplicated by users (this is out of the Copyright Low), some license keys can be expired and the IT manager can forget to renew them. Sometimes, vice versa, expensive software might be never used by employees. Moreover, the information on the antvirus software updates can help to evaluate the network protection. The inventory database analysis allows the system administrator to detect the unlicensed software installation on users' computers. All the mentioned aspects must be under the constant administrator's control.

The inventory process

The level of detail in the inventory database depends on the company size and the aim of inventory process. Here are the main items that should be constantly audited:

- All installed applications on remote computers, their versions and update dates.

- License information (license keys availability).

- Operation Systems that are installed on remote PCs.

- Installed antiviruses and update date.

- Hardware (for instance, memory size, monitors' models, HDD capacity, and so on).

Manual network inventory

After you have decided what kind of information you need to have in your inventory database, you need to choose a method of performing the network inventory. There are two of them. The first one is manual. It suits best for collecting data in small companies with a dozen of PCs. Usually, it is easier to inventory couple of dozen computers manually than to install and configure specialized inventory software. If you manage the manual data collecting it is recommended to write down all the information in MS Excel or Access files. It can help to sort the information more easily, generate reports, and compare gathered information with the already existing one.

Automated inventory

In big companies, it is more preferable to use the software for automated network inventory. There are dozens of programs that help to automate the software and hardware inventory process. If you have never used such programs, there are a few pieces of advice, which will help you to choose the most suitable for your company and network variant:

1. The program has to inventory all the items you need.

2. The inventory program has to detect the availability or absence of license keys of software that is used on remote computers.

3. The inventory program has to give the system administrator an opportunity to view the inventory information about each single PC.

4. Before making the decision about the program purchasing, check online comments and reviews on the software you are going to buy. This measure will help you to keep out the faulty or unfinished program.

5. Pay attention on types and amount of reports that the inventory software allows to generate. The more reports the system administrator can create, the wider his opportunities in managing the network in the operable and up-to-date state.

Conclusion

Network inventory is not just a creation the software and hardware database but it is the constant and complex network audit process. It includes the keeping in order of all the purchased documents and repairs' notices.

In general, it does not matter what kind of inventory process you prefer: automated or manual. All that is worth to keep in mind is that this process is not easy and you should not take it lightly. In any case, it is very important to identify the scope on the first step.

More Stories By Dmitriy Stepanov

Dmitriy Stepanov is a CEO at 10-Strike Software, Network Inventory, Network Monitoring, Bandwidth Monitoring Software developer. 10-Strike Software is a software developing company. They offer their high quality networking products since 1999. 10-Strike Software specializes in producing Windows network software for corporate users.

Microservices Articles
DevOps is often described as a combination of technology and culture. Without both, DevOps isn't complete. However, applying the culture to outdated technology is a recipe for disaster; as response times grow and connections between teams are delayed by technology, the culture will die. A Nutanix Enterprise Cloud has many benefits that provide the needed base for a true DevOps paradigm. In their Day 3 Keynote at 20th Cloud Expo, Chris Brown, a Solutions Marketing Manager at Nutanix, and Mark Lav...
The Software Defined Data Center (SDDC), which enables organizations to seamlessly run in a hybrid cloud model (public + private cloud), is here to stay. IDC estimates that the software-defined networking market will be valued at $3.7 billion by 2016. Security is a key component and benefit of the SDDC, and offers an opportunity to build security 'from the ground up' and weave it into the environment from day one. In his session at 16th Cloud Expo, Reuven Harrison, CTO and Co-Founder of Tufin, ...
"NetApp's vision is how we help organizations manage data - delivering the right data in the right place, in the right time, to the people who need it, and doing it agnostic to what the platform is," explained Josh Atwell, Developer Advocate for NetApp, in this SYS-CON.tv interview at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
Gone are the days when application development was the daunting task of the highly skilled developers backed with strong IT skills, low code application development has democratized app development and empowered a new generation of citizen developers. There was a time when app development was in the domain of people with complex coding and technical skills. We called these people by various names like programmers, coders, techies, and they usually worked in a world oblivious of the everyday pri...
Your homes and cars can be automated and self-serviced. Why can't your storage? From simply asking questions to analyze and troubleshoot your infrastructure, to provisioning storage with snapshots, recovery and replication, your wildest sci-fi dream has come true. In his session at @DevOpsSummit at 20th Cloud Expo, Dan Florea, Director of Product Management at Tintri, provided a ChatOps demo where you can talk to your storage and manage it from anywhere, through Slack and similar services with...
Kin Lane recently wrote a couple of blogs about why copyrighting an API is not common. I couldn’t agree more that copyrighting APIs is uncommon. First of all, the API definition is just an interface (It is the implementation detail … Continue reading →
The Jevons Paradox suggests that when technological advances increase efficiency of a resource, it results in an overall increase in consumption. Writing on the increased use of coal as a result of technological improvements, 19th-century economist William Stanley Jevons found that these improvements led to the development of new ways to utilize coal. In his session at 19th Cloud Expo, Mark Thiele, Chief Strategy Officer for Apcera, compared the Jevons Paradox to modern-day enterprise IT, examin...
DevOps tends to focus on the relationship between Dev and Ops, putting an emphasis on the ops and application infrastructure. But that’s changing with microservices architectures. In her session at DevOps Summit, Lori MacVittie, Evangelist for F5 Networks, will focus on how microservices are changing the underlying architectures needed to scale, secure and deliver applications based on highly distributed (micro) services and why that means an expansion into “the network” for DevOps.
Many organizations are now looking to DevOps maturity models to gauge their DevOps adoption and compare their maturity to their peers. However, as enterprise organizations rush to adopt DevOps, moving past experimentation to embrace it at scale, they are in danger of falling into the trap that they have fallen into time and time again. Unfortunately, we've seen this movie before, and we know how it ends: badly.
Kubernetes is a new and revolutionary open-sourced system for managing containers across multiple hosts in a cluster. Ansible is a simple IT automation tool for just about any requirement for reproducible environments. In his session at @DevOpsSummit at 18th Cloud Expo, Patrick Galbraith, a principal engineer at HPE, discussed how to build a fully functional Kubernetes cluster on a number of virtual machines or bare-metal hosts. Also included will be a brief demonstration of running a Galera MyS...