Josh Reynolds

Manager of ITAM Technology Solutions

Joshua Reynolds, IT asset management, SHIJosh is an IT asset management (ITAM), systems architecture, and systems development specialist. He has been with SHI for more than 13 years, and currently serves as Manager of ITAM Technology Solutions in the company’s Polaris division. In this role, Josh oversees all aspects of SHI’s ITAM teams, including staffing, product and service development, and roadmap planning.

You can reach Josh by emailing Joshua_Reynolds@SHI.com.

Ghost assets are scarier than you might think: Part 3

This post is part of a three-part series on ghost assets.

Ghost serversIn my last two posts, I told the frightening tale of ghost assets, the once lively pieces of an IT department’s infrastructure that eventually expired. Yet instead of burying these dead devices, many organizations leave them to haunt their IT departments, and they end up threatening a business’s bottom line and compliance. In the final portion of my tale, I’ll discuss how organizations can finally lay these ghosts to rest.

Exorcizing the specter
Tools are not the answer — they’re only an element of eliminating ghost assets. There is no such thing as a one-shot, out-of-the-box, perfect configuration and inventory management product, though many manufacturers claim to provide such a solution. These products are open-structured and highly configurable, but require tremendous time, effort, and expertise to set up and maintain. Many customers find that they can’t fully leverage the capability of these products without hiring a dozen or more subject matter experts or paying exorbitant rates for long-term, on-site consultants.

IT asset management (ITAM) should be thought of not as a tool, but as process — one that encompasses tools, personnel, expertise, and procedures. Here are some of the best ways to return ghost assets to their graves and eliminate the risks they pose. (more…)

You may also be interested in:

Putting the value in value added reseller: Why both manufacturers and customers rely on VA... Many organizations struggle to keep tabs on their IT assets. The number of products, manufacturers, and licensing agreements is enough to make any per...
How many laptops has your company lost this year? It’s 11 o’clock. Do you know where your laptops are? A misplaced laptop is no surprise to IT – many a laptop has been left in a public place or los...
IT time wasters: Failing to prepare for a software audit If you're like most organizations, it's been a while since your last self-audit. A survey we conducted found that out of 102 IT admins and executives,...

Ghost assets are scarier than you might think: Part 2

This post is part of a three-part series on ghost assets.

Ghost serversIn my last post, I discussed the ghost asset epidemic many organizations unknowingly face. These assets were once productive test systems, but have since dropped out of focus. They are rogue machines, falling outside the spectrum of active management and are often effectively invisible to daily IT operations, yet these assets present serious monetary and compliance risks for organizations. In this post, I’ll explain how organizations conjure these ghost assets.

Abandon all hope, assets who enter here
If there is so much value in these assets, how are they so easily lost? From sepulchral server farms to phantom PCs and laptops entombed in storage closets and desk drawers, there are countless ways assets become ghosts. One of our customers calculated that ghost assets were costing them $1.7 million per month! How can more than $20 million a year just vanish? Here are some of the most common scenarios we see every day. (more…)

You may also be interested in:

Ghost assets are scarier than you might think: Part 1 This post is part of a three-part series on ghost assets. The vast majority of IT environments are haunted. Large-scale infrastructures, by virtue ...
How many laptops has your company lost this year? It’s 11 o’clock. Do you know where your laptops are? A misplaced laptop is no surprise to IT – many a laptop has been left in a public place or los...
Ghost assets are scarier than you might think: Part 3 This post is part of a three-part series on ghost assets. In my last two posts, I told the frightening tale of ghost assets, the once lively pieces o...

Ghost assets are scarier than you might think: Part 1

Ghost serversThis post is part of a three-part series on ghost assets.

The vast majority of IT environments are haunted. Large-scale infrastructures, by virtue of their operational requirements, value high capacity and high availability over asset management. This inevitably means there are ghost assets lurking in most environments — devices whose purpose withered and passed on some time ago, but were not removed or repurposed. Still plugged in and probably connected to a network, they serve no material business purpose. They simply absorb space, power, and resources. A recent article on InfoWorld rightly points out that decommissioning ghost servers saves money on utility bills and datacenter space. However, these wraiths also embody a much more serious risk: software and regulatory compliance exposure.

Ghost in the machine
This post will refer to ghost assets rather than just servers. This term encompasses hardware, software, maintenance value, as well as any supporting systems that might be needlessly consumed by assets that no longer make a meaningful contribution to an IT environment. Power management, facilities maintenance, middleware, storage, backup, and disaster recovery are all secondary resources consumed by a ghost that add to its overall cost. But when ghost assets negatively impact compliance, the cost they represent increases exponentially. (more…)

You may also be interested in:

Ghost assets are scarier than you might think: Part 2 This post is part of a three-part series on ghost assets. In my last post, I discussed the ghost asset epidemic many organizations unknowingly face. ...
Software license management: Calculating product audit risk When it comes to compliance risk, we suggest that organizations craft two very different strategies for their overall software estate. Depending on th...
Ransomware 101: What it is and how to protect yourself Ransomware was once a blip on the cyber security radar, but times have changed: Ransomware attacks grew nearly 500 percent, to 3.8 million attacks, ...