UNICOR, also known as Federal Prison Industries, has shut down its electronics recycling facilities at several prisons across the country, leaving a sizable gap in the U.S. e-scrap recycling chain.
In the latest sign of financial turmoil in the e-scrap industry, the US prison system has closed many of the doors of their recycling facilities (UNICOR) – not to criticism for using forced labor as E-Stewards has complained, but most likely due to economic problems. The event was presaged by the many e-scrap vendors who offered recycling for free who closed their doors in 2014 and 2015. Of course, the world wide issue with CRTs most likely influenced the situation, as stated in the article.
IT professionals and CIOs plan to spend slightly more than a third of their total IT budgets on cloud and hosting services in 2017, according to survey results from 451 Research. While IaaS remains popular, most of the money will be spent on application, management, and security services.
The article suggests a move to more organized cloud planning as well as a transitioning in how IT people do their jobs.
Thanks in no small part to the confusion between Software Asset Management and compliance, SAM programs are often seen by some less-enlightened stakeholders as a necessary evil. A program that increases operational costs without driving tangible business benefits. A grudge spend, if you like.
Is it time to take the self-service model to the next step and fund SAM directly from the savings that we develop? Whether you agree with that statement or not, it is important to think about how we heighten perception of ITAM as more than overhead.
NEWS ANALYSIS: Corporate IT and security specialists need to resolve the mutual mistrust that is keeping them from working together to fend off security breaches.
Insight into one of the many issues between the two critical groups within the organization is starting to work its way through. Competing viewpoints of the other surrounding trust, perception, budget creates the antagonistic relationship. Here is an area where ITAM can bring the two together for the benefit of both.
China passed a controversial cybersecurity bill tightening restrictions on online freedom of speech and imposing new rules on online service providers, raising concerns it is further cloistering its heavily controlled internet.
Does your organization have offices or do business in China? If so, read up on these new restrictions.
That's for his legal bills and court costs – not defamation
The larger picture here is not about taste in movies, it’s as technology is incorporated more and more into our lives, how does the individual defend themselves against unauthorized or hacked actions like this and who’s going to be ultimately responsible for it?
Changes in the criminal procedure rule could help the government investigate cybercrime activity, but also pose a potential threat to personal privacy rights.
A last ditch effort to block the expansion of authority under the Federal Rules of Criminal Procedure gives the FBI more authority over stored data as it applies to a crime has failed. Some elected officials trying to block the change felt it would violate individual privacy rights.
Global concern about the mountains of e-waste generated every year has been rising for quite some time – and with good reason.
Buying hardware that is more easily recycled benefits the organization as well as the environment. Considering design features that make recycling easier as acquisition criteria may seem difficult right now, but watch for opportunities. This article presents Dell’s view and action on what they are doing.
NIST's computer security publications (FIPS, Special Pubs, and NISTIRs) that have been published as drafts, inviting public comments.
For those managing mobile devices and usage, NIST has released a draft of a document explaining LTE and its security. Draft Special Publications (SP) 800-187, Guide to LTE Security is available for reading and public comment. This document manages to lay out architecture without confusion. Make sure that you technical team has seen it too.
Few organizations purposely misuse assets, but many are caught out of compliance due to the increasing complexity of license usage policies.
When confronted with a vendor audit, having an ITAM program is key. The results of this survey point to the fact that though organizations find business need for ITAM data, the means to make it usable appears to be quite labor intensive which points to a lack of funding and management support for the program.
AWS costs can spiral out of control if you don’t optimize them. In this blog, we show you how to determine how much you are wasting and how to fix it.
Information Week published a summary of Right Scale’s three month study that has a finding of 35% wasteful spending in the public cloud. Reading the summary is good, but here is a link to the original blog with charts to make the message easy to share.
Licensing is complex & mind-numbing. Here's what we've done to make it easier.
Have you thought about the fonts that are licensed within your organization? Simple, right? Nope. Licensing can be complicated, just like software. Toby Martin of Extensis, a professional long in IT and ITAM space, directed me to this article from a font “foundry” talking about many of licensing issues that they have seen. Worth a read, at least to inspire discussion with your website and marketing people.
James C. Fish Jr. will take over as the company's president and CEO. He was also elected to the Board of Directors.
Recently, there has been an uptick management changes at the top of the ITAD/Waste/Recycling industry that are worth noting and considering the stresses that the industry that supports ITAD has had in 2015 and 2016.
CIOs will be under pressure to deliver new products and services at a fast pace. Tech spending will increase a modest 2.9% in 2017.
No longer can IT survive in a bubble. IT needs to implement business practices into its operations and have a strategic plan to handle the adoption of new technology. Certified ITAMs are prepared to aid in this effort.
Sharing your scoops to your social media accounts is a must to distribute your curated content. Not only will it drive traffic and leads through your content, but it will help show your expertise with your followers.
How to integrate my topics' content to my website?
Integrating your curated content to your website or blog will allow you to increase your website visitors’ engagement, boost SEO and acquire new visitors. By redirecting your social media traffic to your website, Scoop.it will also help you generate more qualified traffic and leads from your curation work.
Distributing your curated content through a newsletter is a great way to nurture and engage your email subscribers will developing your traffic and visibility.
Creating engaging newsletters with your curated content is really easy.