7 electronic recycling resources for keeping hardware out of landfills

recycle Only 12.5 percent of e-waste is recycled— let’s change that.

The world’s largest IT hardware manufacturers all have recycling programs. You just need to know where to look. All of these programs strive for the same goal: Safely recycle or dispose of IT hardware and e-waste, saving it from landfills. Many businesses that sell IT equipment, as well as some states, run e-waste recycling programs, too.

Every program is a little different, depending on the manufacturer. So here are the recycling programs from six of the largest IT manufacturers, plus SHI’s “one-size-fits-all” approach to asset recovery. (more…)

This is how Datacate got a great deal on data center space

data-centerDatacate, a regional colocation provider, was recently in the market for new colocation space, but had strict requirements: Space had to come at the right price, but timing was the wrinkle. The entire process – negotiating contracts, ordering hardware, constructing cages, and making everything ready for move-in — would have to be completed in just over a month while keeping costs down. That’s a tight timeframe for a full implementation when constructing cages alone often takes several weeks. (more…)

The playbook to stopping dark data

dark-data-managementLurking in every data center is an unseen enemy: dark data. This unstructured data causes surging storage costs and exposes organizations to a variety of risks.

Win the fight against dark data by developing an information governance program. This plan identifies what dark data exists, how different departments manage data, and when it can be archived and destroyed.

Let’s review the steps organizations must take to create an information governance framework, and learn how organizations can successfully execute it. (more…)

This rogue IT asset is costing you money – here’s how to spot one

printerIt’s not every day you find $21,000 lying around your office. And no, we’re not talking about fixing improper software licensing or avoiding a ransomware attack. We’re talking about your printers.

When one organization took a closer look at its printers, it uncovered 281 so-called “problem devices” – printers that were too old, too expensive, or weren’t being used to their full potential. Refreshing just 153 of those devices could save the company $21,000 a month. (more…)

4 steps to create a CIPA-compliant network for your school

internet schoolsThis question will be on the final exam, and it’s one you don’t want to get wrong: Are you CIPA compliant?

We’re talking about the Children’s Internet Protection Act (CIPA), the federal legislation that requires schools and libraries to restrict access to obscene or harmful content on the internet.

It’s so important that eligibility for E-Rate funding hinges on schools’ and libraries’ CIPA compliance. They must certify that they’re enforcing a policies relating to internet safety, including blocking or filtering access to material considered obscene, pornographic, and harmful to minors.

Are your students protected? Does your school network fit the letter of the law? Here’s how to make sure you’re CIPA compliant. (more…)

Here’s how a company patched up its crumbling IT foundation

colocation 2The company had a problem: Its IT environment was so disjointed and outdated, it was a proverbial house of cards, teetering on collapse. The outdated infrastructure was unreliable and slow, which caused delays in sales and inventory reporting. If one system failed, it could shut down the entire IT infrastructure and paralyze sales management and order fulfillment.

For small and medium-sized businesses with more pressing budgetary priorities, it’s easy to see how such a situation could arise. When an external audit found that the company had severely underfunded its IT department for years, management took notice. (more…)

Here’s why unstructured data is putting your organization at risk

dark dataBig data seduces us with potential. Industries from retail to health care collect untold terabytes of data in hopes of finding correlations and connections that drive sales and improve patient health.

But beneath the depths lies dark data, or data whose value hasn’t yet been identified. We’re talking about documents, images, PDFs, videos, and other data that often aren’t work related, include sensitive information, or duplicate files many times over.

Many organizations do the right thing by regularly backing up their data (everything from email servers to file shares to individual user folders), but this process amasses tons of unnecessary unstructured data. It clogs up storage arrays and hard drives, creating big bills and unknown risks.

Is your organization hoarding this kind of unstructured data without realizing it? Let’s shine a light on dark data to uncover how you can move your organization toward better storage and improved efficiency. (more…)

Prove it or lose it: Why proof of concepts are a must do for many IT projects

Proof of conceptFew of us would buy a car without first taking it for a test drive. But this is exactly what organizations do when they purchase new technology without completing a Proof of Concept (POC).

In the IT realm, a POC tests how potentially disruptive technology interacts or integrates with an existing environment. These experiments can give an organization the confidence to adopt new and emerging technologies, or fair warning for what challenges must be solved first.

While you don’t need a POC to buy some new laptops, you should test any significant implementation you’re planning. Here’s why. (more…)

How one health care provider learned that compliance does not equal security

Health care compliance and securityWhich causes business leaders to buy into an IT security assessment quicker: ransomware or a data breach?


Unfortunately, that’s just the situation a regional health care provider network faced a few years ago. Although the IT staff knew a review of the security of the network and file server was overdue, the C-suite remained focused on existing HIPAA compliance guidelines.

That’s when a ransomware attack hit, resulting in a data breach. A user simply clicked on a popup, ransomware was then installed on the machine, and health care records stored on the user’s hard drive were compromised.

After the breach was fixed and the damage assessed, management realized many questions needed answering: Why did this attack happen? What should be IT’s first step in protecting data? What data should be secured? How could the organization balance compliance and security to stop attacks in the future? (more…)

Earth Day review: Here’s how much pollution we prevented in 2015 through asset recovery

Earth Day review of asset recoveryIf you read our blog post highlighting the 5 hallmarks of successful asset recovery, you might remember why asset recovery – the proper disposal or recycling of hardware devices – is so important: It’s a versatile, economical solution that protects your organization and simplifies IT asset management.

One of the biggest advantages to asset recovery is the environmental benefits. Adopting an asset recovery program guarantees devices are responsibly disassembled and recycled, and the precious metals, toxic materials, and extra components aren’t dumped in a landfill. If you throw those same devices in a standard garbage can, they end up feeding the growing global environmental issue of e-waste.

E-waste contains various hazardous metals that can harm the human immune, nervous, and reproductive systems, as well as pollute the air, water, and soil. By handing off end-of-life devices to an asset recovery provider, you are not only protecting the environment but the rest of humanity as well. (more…)