This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies By closing this message or continuing to use our site, you agree to our cookie policy. Learn MoreThis website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Ali Fenn, president of ITRenew and one of Mission Critical’s inaugural Top 25 Women in Technology winners, discusses how data centers can contribute to a circular economy in this episode of The Thought Cloud.
Circularity is a broad concept that encompasses many things, but it could be said to have two primary aims: creating resiliency and fostering holistic sustainability.
After jumping out early in 2020 as a voice of caution for corporations unprepared for the shift to WFH under COVID-19, IAITAM is now looking ahead to what it expects in the new year of 2021.
Every day during December, IT Asset Management Awareness Month, the organization will offer free sessions that highlight the industry’s most popular topics or issues, including ITAD, data/privacy risks, licensing, mobile asset management, software asset management, and best practices.
CommScope’s Professional Services team will manage the upgrade of StackPath’s data centers —including the installation of new switches, power distribution units, and network cabling, as well as the decommissioning of equipment, asset tagging and recovery, bespoke packaging, logistics, and warehousing in preparation for future redeployment.
Organizations rely on their information security departments or engage outside consultancies to try to protect against attacks, but preventative efforts fail with alarming frequency, even for the largest companies with the most well-funded cybersecurity efforts.