The Scalable Blog provides articles about the latest news and information related to IT asset management and Scalable Software.
By Bruce Aboudara and Martin Koegel A clever co-operation: Asset Vision® (Scalable) meets samQ (VOQUZ) Even though companies use a lot of different software, only a few have the resources and expertise to really handle all their software licenses efficiently and with confidence. Therefore, it's reasonable to use a software asset management solution, which is specialized in the different types of licenses. Why you need specialized help on applications like SAP Remembering … [Read more...]
Data is everywhere. Data is used to back up assumptions presented as facts. We look to data to create information that we base business, personal and community decisions on. Not only are the absolutes of the numbers important, but how they were obtained, how they are analyzed, and what assumptions are made are critical to assessing the value of the data. This creates uncertainty and even applying the scientific method is no basis for comfort. One such example is "p-hacking," in which … [Read more...]
Trustworthy data is vital for IT Finance and Procurement to be able to manage and control costs. In order for IT Asset Managers to identify opportunities for rationalization and improved planning, an IT Asset baseline is critical – but one more granular than is generally available. Many organizations rely on out-of-date CMDBs and spreadsheets to provide a baseline. Worse yet, they employ spreadsheet kung- fu to combine multiple discovery sets of data. These "business as usual" baseline … [Read more...]
IT security is a complex and very broad topic that requires multiple elements of an organization working well together. At the systems level you must consider business, information, data and solution architectures. Next there are all the process designs that overlay these systems. Therefore just being able to collect, patch and provide device vulnerability data should not be considered protecting against a ransomware attack. That instead requires a layered security approach that can anticipate … [Read more...]
I never guess. It is a capital mistake to theorize before one has data. Insensibly one begins to twist facts to suit theories, instead of theories to suit facts. -- Sir Arthur Conan Doyle, Author of Sherlock Holmes Stories Hard to argue with this logic, especially in such a data intensive industry as ours. The old adage of 'Garbage in Garbage out' is pretty self-explanatory. If we agree it is fundamental to good IT practices, why does it still persist? I would suggest that we still do not … [Read more...]