Winding Down and Virtualization Study

Written By Peter Fleming of Soundview IT Solutions In the middle of 2011 a Connecticut based hedge fund announced their founder was retiring and the fund would subsequently be closing its doors. Among the myriad of issues the hedge fund faced, one was...

read more
Data Privacy Safeguards and Process Evaluation

Data Privacy Safeguards and Process Evaluation

For many businesses, information and hardware asset security has become a daily concern. IT Asset Management Group would like to highlight a chart from PricewaterhouseCoopers 15th annual Global State of Information Security® Survey that illustrates the statistical...

read more

ITAD Guidance

Stay informed on important IT asset management topics.

Our posts focus on IT management, data security, and computer hardware from the unique perspective of IT asset disposal experts.

Subscribe and you will stay on top of:

  • IT procurement trends and analysis
  • Data security methods and best practices
  • Compliance tools and updates

Recent Posts

Project Management is Key to Safe IT Asset Disposition

Project management is a critical component in any IT project yet end of life disposal process is often lacking the proper amount of attention. Proper IT disposal planning will minimize data security risks and cleanly close out the life cycle of computer equipment with...

One CIO’s Trash, Is The Same CIO’s Liability

What happens when end use computing, mobile devices and data center infrastructure reach the end of its useful life in the enterprise environment? It turns into a major business liability. Each week, vast amounts of hardware is discarded by corporations large and...

It’s Smart to Watch Your Electronic Waste Habits

Growing up watching someone talk into their watch always looked pretty cool. Now with the Samsung Galaxy Gear that high-tech, talk into your watch age is here. Samsung has been winning praise for their ads which speak to that TV viewing audience. An article on...

Revisiting “What Does A Gigabit Network Really Mean?”

Back in April, the ITAMG blog touched on what does a gigabit network really mean. 'Without these (data infrastructure) investments, the US will struggle to lead in the development of next generation internet applications." April 26th, 2013, ITAMG Our good friends...

The Frightening Impact of Theft, Loss, and Data Breaches

“Don’t panic, it’s only a data breach.” Are those words that you would ever hear? Certainly not, because when there is a data breach while panic may not be the optimal reaction it more often than not is the reaction. A data breach can cause...

5 Ways an IT Pro Can Succeed as a Manager

An IT Manager takes on a diverse role that encompasses technical challenges, analyzing information, staffing, conflict resolution, strategic planning, developing budgets, and even data center management. Both the technical and management components require your...

World’s Biggest Physical Data Breaches: Visualized

Ever hear of this thing called “big data”? It is hard to visualize reams of information and how to make them useful, especially when it comes to understanding all the different kinds of data breaches and industries most effected. Creative engineers and information...

ITAM: The most boring thing….

ITAM stands for IT Asset Management, but there is often a lot of confusion when talking to vendors that name solutions after industry terms, let alone a a certain company that just so happens to be named IT Asset Management Group. All too often acronyms confuse...

Top 10 Virtualization Project Killers

Would you believe that a large number of desktop virtualization projects get to roughly about 30% completion and then never reach production? An even greater number fall apart prior to even reaching a small scale pilot stage. What makes ITAMG an expert to even share a...