I own and manage JDisc and its network inventory and discovery products. Before I started JDisc, I worked quite a long time for Hewlett-Packard developing software for network assessments and inventory projects.
Feel free to contact me on Linked-In or Xing.
Recently, one of our partners came back from a prospect and asked whether we can discover VMware annotations and custom attributes. On a VMware ESX(i) server, a user can add an annotation for each virtual machine describing its purpose. With VMware vCenter a user can add as many custom attributes to a VM. Custom attributes…
JDisc uses an agile development methodology. Therefore, we release new versions every four to six weeks. This has major advantages for our customers, because they get new features or bugfixes quickly and of course it helps us to get early feedback for new features. And this release is not an exception. Our new build is…
JDisc is happy to announe its new partnership with TechnoLava. TechnoLava is a value-added reseller in the area of ITIL. They provide consulting, training, and implementation of IT solutions to help customers to match their IT with their business needs. TechnoLava’s customers have substantial investments in IT assets. They operate in various industries and federal,…
It’s time for a new release! We are proud to announce the version 2.7 of our network inventory and documentation solution JDisc Discovery. This release incorporates many features and ideas that I mentioned in some of my previous blog entries. New in release 2.7 is the possibility to compare two devices. This helps administrators to…
JDisc Discovery is a network inventory and documentation software that scans all kind of devices and determines hardware- and software information. The software gets used by IT administrators that use the software on a day-by-day basis, but also by network consultants that run the software occasionally on their projects. IT administrators usually have a deep…
As mentioned in the previous post, creating a network documentation for remote computers and sites is not that easy. Inefficient protocols can make an effective discovery of remote sites even impossible, because network delays and limited bandwidth causes them to fail. JDisc Discovery can make use of its remote login capability to tunnel inefficient protocols…
The most important protocols WMI (Windows Management Instrumentation) and Remote Registry are not known to be the most efficient protocols. However they are for most agent-less discovery products the sole source of information. When running within a 100MBit or 1Gbit ethernet local area network, accessing WMI or registry information is not an issue. However, when…
JDisc’s R&D department has been adding a lot of new features to our network inventory solution “JDisc Discovery” over the last three years. Some of them are advanced features that are not that obvious to users who do not operate the software on day-by-day basis. The goal of my “Hidden Treasures” series is to present…
Dear JDisc friends, did you ever find yourself in the situation that one of your devices is not working correctly and you ask yourself: “Why the heck is that device failing, while others work properly? I swear, there is nothing different to other devices working properly!”? In most cases, the reason is that you think…
Dear JDisc friends, we think, that JDisc Discovery is a pretty cool network documentation product. I will present with “Hidden Treasures” some not so well known features within this blog and I hope that it’ll help to maximize the value created by JDisc. Starting a network inventory project is usually an iterative process. You start…