Search results

You searched for **. We found 100 results
Many organizations are overspending on Software and at the same time are at risk of non-compliance by not keeping their Software Assets & Usage under control. Below provides an overview of key SAM Focus Areas worth ...
04 January 2017
4 minute read
This article has been contributed by Walker White of BDNA. Ending the vendor audit cycle Vendor software and hardware audits have become so common in the enterprise IT landscape that they are beginning to be accepted ...
15 November 2016
9 minute read
  If your organization is running an in-house Software Asset Management program, the chances are your SAM team can boil their activity down to one thing. Compliance. Ensuring your organization isn’t under-licensed (and therefore risking blowing ...
02 November 2016
5 minute read
This is a guest post from Robin Fry of Cerno.  The European Court has restated the legality of the resale of software in Europe in its latest judgment but confirmed that the principle does not extend ...
31 October 2016
6 minute read
This quick guide to Microsoft BYOL (Bring Your Own Licensing)  has been contributed by Deepika Shrivastava. Cloud computing has been attributed with increasing competitiveness through cost reduction, greater flexibility, elasticity and optimal resource utilization. With Cloud, there ...
02 August 2016
6 minute read
Defining big data The term “big data” is thrown around these days as though it’s been around for a long time – the concept gained momentum in the early 2000s, but the term itself is still ...
01 July 2016
6 minute read
By Mark Feinman – Siwel Consulting My wife is a very smart woman, but when it comes to explaining to her what I do in IT, I might as well be speaking another language. And so ...
14 June 2016
6 minute read
Firstly, apologies for not writing an article in so long; we’ve been extremely busy dealing with a recent IBM ‘review’. We learnt an awful lot during and post review, and I wanted to share my experiences ...
25 November 2015
6 minute read
It seems with each passing day; we see another story of a cyber security breach. After doing some research, I found that each day, we, in fact, have nearly two. In research published by the Identity ...
17 November 2015
4 minute read
By Walker White, President, BDNA Today’s enterprises are balancing a dynamic IT portfolio, from cloud infrastructure and BYOD to a network of apps and even IoT devices. This complex array of assets makes it critical for ...
10 September 2015
6 minute read

Can’t find what you’re looking for?