|By Dmitriy Stepanov||
|June 8, 2014 11:23 AM EDT||
A company's managers have to be aware of what hardware and software is on hand, where it is situated, know its quantity, and what is necessary to increase the employees' effectiveness and the whole network's stability. If the managers or system administrators do not have such information, it can lead to certain problems. First of all, it can be the cause of huge expenses on unnecessary software that is never used. Secondly, without inventory database, the system administrator can miss the date of antivirus software updates or hardware upgrades that can be dangerous for network safety. Thirdly, cracked programs or duplicated licenses can be installed by users, which is out of the Copyright Law. To prevent all these and many other problems, the system administrators have to manage the constant network inventory process.
For this purpose, the specialized software can be used. The program collects all the inventory data on the remote computers, keeps it, updates, notifies the system administrator on the network hardware and software changes, and allows him to generate a lot of various reports on the collected information.
All the inventory programs use approximately one scheme: the main program's module is to be installed on the administrator's computer, then the network scanning process starts. When all the network hosts are found, the program starts polling the remote PCs, collecting the necessary data, and creating the inventory database. But different network inventory programs can use different polling methods:
1. Using WMI technology (Windows Management Instrumentation). WMI is the computer system management tool that has a lot of advantages. This method does not require additional software or settings on remote computers. Besides, WMI does not create any additional load on monitoring PCs, and users without administrative rights cannot prevent the computers' polling. The main disadvantage of using the WMI is that the system administrator has to have the administrative rights on the remote machines to configure the security politics.
2. Using agents. This method is used if the security politics do not allow the system administrator to use WMI or if he does not have the administrative rights on the remote computers. In this situation the IT manager has to install agents on each computer on the network. However, the network inventory programs allow doing it remotely without distracting the employees.
3. Using clients. This method has the same disadvantage as the previous one - the system administrator needs to install clients on all the network PCs. But clients are used to poll the computers that are not on the network. Clients collect data automatically when users switch on their machines. The system administrator just exports the inventory database to a USB flash drive and then imports it in the main program's database.
Ideally, the network inventory program should give an opportunity to use all these three methods. It increases its reliability and widens its usability.
There is one fundamental fact: the network inventory process and its constant audit allows the system administrator and company's managers to make effective decisions on purchasing software and upgrading hardware. So in general, it helps to keep the network in actual and operable state.
Today air travel is a minefield of delays, hassles and customer disappointment. Airlines struggle to revitalize the experience. GE and M2Mi will demonstrate practical examples of how IoT solutions are helping airlines bring back personalization, reduce trip time and improve reliability. In their session at @ThingsExpo, Shyam Varan Nath, Principal Architect with GE, and Dr. Sarah Cooper, M2Mi’s VP Business Development and Engineering, will explore the IoT cloud-based platform technologies drivi...
Jul. 2, 2015 02:00 PM EDT Reads: 988
Containers have changed the mind of IT in DevOps. They enable developers to work with dev, test, stage and production environments identically. Containers provide the right abstraction for microservices and many cloud platforms have integrated them into deployment pipelines. DevOps and Containers together help companies to achieve their business goals faster and more effectively. In his session at DevOps Summit, Ruslan Synytsky, CEO and Co-founder of Jelastic, reviewed the current landscape of...
Jul. 2, 2015 01:45 PM EDT Reads: 2,265
Live Webinar with 451 Research Analyst Peter Christy. Join us on Wednesday July 22, 2015, at 10 am PT / 1 pm ET In a world where users are on the Internet and the applications are in the cloud, how do you maintain your historic SLA with your users? Peter Christy, Research Director, Networks at 451 Research, will discuss this new network paradigm, one in which there is no LAN and no WAN, and discuss what users and network administrators gain and give up when migrating to the agile world of clo...
Jul. 2, 2015 01:36 PM EDT Reads: 242
Manufacturing has widely adopted standardized and automated processes to create designs, build them, and maintain them through their life cycle. However, many modern manufacturing systems go beyond mechanized workflows to introduce empowered workers, flexible collaboration, and rapid iteration. Such behaviors also characterize open source software development and are at the heart of DevOps culture, processes, and tooling.
Jul. 2, 2015 01:15 PM EDT Reads: 679
SYS-CON Events announced today that JFrog, maker of Artifactory, the popular Binary Repository Manager, will exhibit at SYS-CON's @DevOpsSummit Silicon Valley, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. Based in California, Israel and France, founded by longtime field-experts, JFrog, creator of Artifactory and Bintray, has provided the market with the first Binary Repository solution and a software distribution social platform.
Jul. 2, 2015 01:00 PM EDT Reads: 1,195
"We got started as search consultants. On the services side of the business we have help organizations save time and save money when they hit issues that everyone more or less hits when their data grows," noted Otis Gospodnetić, Founder of Sematext, in this SYS-CON.tv interview at @DevOpsSummit, held June 9-11, 2015, at the Javits Center in New York City.
Jul. 2, 2015 01:00 PM EDT Reads: 1,023
Internet of Things (IoT) will be a hybrid ecosystem of diverse devices and sensors collaborating with operational and enterprise systems to create the next big application. In their session at @ThingsExpo, Bramh Gupta, founder and CEO of robomq.io, and Fred Yatzeck, principal architect leading product development at robomq.io, discussed how choosing the right middleware and integration strategy from the get-go will enable IoT solution developers to adapt and grow with the industry, while at th...
Jul. 2, 2015 12:00 PM EDT Reads: 2,003
Containers are revolutionizing the way we deploy and maintain our infrastructures, but monitoring and troubleshooting in a containerized environment can still be painful and impractical. Understanding even basic resource usage is difficult – let alone tracking network connections or malicious activity. In his session at DevOps Summit, Gianluca Borello, Sr. Software Engineer at Sysdig, will cover the current state of the art for container monitoring and visibility, including pros / cons and liv...
Jul. 2, 2015 11:50 AM EDT Reads: 371
The last decade was about virtual machines, but the next one is about containers. Containers enable a service to run on any host at any time. Traditional tools are starting to show cracks because they were not designed for this level of application portability. Now is the time to look at new ways to deploy and manage applications at scale. In his session at @DevOpsSummit, Brian “Redbeard” Harrington, a principal architect at CoreOS, will examine how CoreOS helps teams run in production. Attende...
Jul. 2, 2015 11:17 AM EDT Reads: 387
"We have a tagline - "Power in the API Economy." What that means is everything that is built in applications and connected applications is done through APIs," explained Roberto Medrano, Executive Vice President at Akana, in this SYS-CON.tv interview at 16th Cloud Expo, held June 9-11, 2015, at the Javits Center in New York City.
Jul. 2, 2015 11:15 AM EDT Reads: 1,025
Malicious agents are moving faster than the speed of business. Even more worrisome, most companies are relying on legacy approaches to security that are no longer capable of meeting current threats. In the modern cloud, threat diversity is rapidly expanding, necessitating more sophisticated security protocols than those used in the past or in desktop environments. Yet companies are falling for cloud security myths that were truths at one time but have evolved out of existence.
Jul. 2, 2015 11:00 AM EDT Reads: 2,186
The cloud has transformed how we think about software quality. Instead of preventing failures, we must focus on automatic recovery from failure. In other words, resilience trumps traditional quality measures. Continuous delivery models further squeeze traditional notions of quality. Remember the venerable project management Iron Triangle? Among time, scope, and cost, you can only fix two or quality will suffer. Only in today's DevOps world, continuous testing, integration, and deployment upend...
Jul. 2, 2015 11:00 AM EDT Reads: 2,103
IT data is typically silo'd by the various tools in place. Unifying all the log, metric and event data in one analytics platform stops finger pointing and provides the end-to-end correlation. Logs, metrics and custom event data can be joined to tell the holistic story of your software and operations. For example, users can correlate code deploys to system performance to application error codes. In his session at DevOps Summit, Michael Demmer, VP of Engineering at Jut, will discuss how this can...
Jul. 2, 2015 10:46 AM EDT Reads: 345
"A lot of the enterprises that have been using our systems for many years are reaching out to the cloud - the public cloud, the private cloud and hybrid," stated Reuven Harrison, CTO and Co-Founder of Tufin, in this SYS-CON.tv interview at 16th Cloud Expo, held June 9-11, 2015, at the Javits Center in New York City.
Jul. 2, 2015 10:45 AM EDT Reads: 717
"Plutora provides release and testing environment capabilities to the enterprise," explained Dalibor Siroky, Director and Co-founder of Plutora, in this SYS-CON.tv interview at @DevOpsSummit, held June 9-11, 2015, at the Javits Center in New York City.
Jul. 2, 2015 10:00 AM EDT Reads: 1,111