Whether you’re leasing computers or purchasing IT assets, it helps to understand product lingo when deciding.
Here are some terms provided by the non-profit technology organization TechSoup to help you make your decision:
1. CPU (Central Processing Unit, or just processor)
What it does – Essentially it’s your computer’s brain, which processes information. The faster the processor, the faster the computer.
What you need to consider – How well the processor will perform. This is based mostly on the number of cores (single, dual, etc.) and the processor speed (also known as “clock speed”), which is measured in gigahertz (GHz).
Minimum standard – Dual core processor with a clock speed of 2.6 GHz.
While most businesses need computers to handle their day-to-day operations, not every business needs brand-new state-of-the-art computers.
As TechSoup points out, a used or refurbished computer will likely be fine for tasks like word processing, e-mailing and web browsing.
“Used and refurbished computers are usually much less expensive than new computers,” the non-profit writes. “They’re also a greener option, since you’re extending the life of an old computer, rather than buying a new one.”
Thanks to TV and movies, most of us can tell the difference between ghosts and zombies.
But can you tell the difference between “ghost” and “zombie” IT assets? And more importantly, do you know why they’re so scary?
Ghost assets refer to devices that you have in your inventory but don’t use. We’ve written about this topic before, and since then, have come across the term “zombie assets.” The distinction here is that zombie assets are those that are sitting in your building, but aren’t on your books.
That’s according to a recent survey from Greenpeace, which found that more than half the respondents think manufacturers are releasing too many phone models. Brands like Apple and Samsung typically introduce new versions of their flagship phones each year.
Instead, people want smartphones that are easier to repair or at the very least recycle. And consumers in each of the six countries involved in the survey say it’s important that phone-makers put out products that aren’t made with hazardous chemicals.
We mention this survey because it comes at a time when IT asset managers are facing more and more challenges when dealing with mobile device management. As the IT Asset Knowledge Database put it recently, those challenges include mobile life-cycle management, parts availability and data erasure.
Two different terms, but it’s important not to think of them as two different things.
Rather, think of mobile device management as a type of ITAM, the same way astronomy or geology are types of science.
And mobile device management is itself already party of a larger practice known as enterprise mobility management (EMM), which deals with the securing, monitoring, integrating and managing the smartphones, tablets and laptops used by a business, whether they’re employee-owned or provided by the company.
What does the IT equipment financing market look like these days? That was one of the things the Equipment Leasing Finance Association set out to learn in its annual Survey of Equipment Finance Activity in late 2015.
The ELFA is a trade group that represents companies in the trillion-dollar equipment finance sector. Each year, they track how spending changes in various sectors, such as agriculture, medical and IT.
One of the things this year’ survey found: IT and related tech financing accounts for one of the largest pieces of new business volume: a little over 19 percent, second only to transportation, which accounted for 28 percent of new business volume.
More and more people are using smartphones and tablets for their primary workplace computer, causing IT asset managers to take a closer look at their data destruction practices.
This phenomenon is something we’ve discussed on this blog before. Some offices have what’s known as a BYOD – “bring your own device,” while others tell their workers “Choose your own device” (CYOD), letting them pick from a list of preapproved devices.
It’s not something every company has embraced – in fact, some companies ban it. But if your company has a CYOD policy, it’s worth looking at some methods available to erase data from mobile devices.