Thursday, December 15, 2016

SAM Training – Can you re-wind and repeat your SAM certification training at will?



Probably not… One of the most significant drawbacks of a majority of Software Asset Management training and certification programs is that they’re essentially “one and done” in their delivery. This means that you attend a one- or two-day program, they teach you how to pass the exam, and you’re finished: “Instant Expert.” There is no provision for review, reflection, customization, or mastering the content.

The Institute for Technology Asset Management, with its Learning Management-Based online SAM Credential, takes you into the next generation of professional development.

For the first time in our industry, you, the SAM practitioner, can now:
  • Attend an online professional development program that is self-paced – allowing you to learn when it’s convenient for you and for your enterprise.
  • Attend a program that is based on the genuine competency needs of the individual practitioner – experience the knowledge you need to succeed in the real world of front line software asset management.
  • Attend a credentialing program with a clear and publicly available professional development Roadmap that delivers genuinely supplier-neutral SAM skills.
  • Attend this cutting edge professional development program from anywhere on the planet without leaving home.
  • Attend a program that includes a workbook that is actually a Work Book – encouraging you to convert each competency covered into a customized solution for your unique enterprise.
  • Attend a program that permits you to Learn to Mastery – view and review each competency module, each training page, until you are comfortable in your ability to actually use what you have learned.
What’s more, SAM and ITAM programs from The Institute for Technology Asset Management interface practitioner competency development with an Open Source curriculum, unique in the industry, allowing practitioners to apply local, or even in-house, training experiences to their credential growth.
Better yet: At ~175 USD, your TAMInstitute SAM credential exam is a fraction of the cost of alternative certificate options.
Institute programs are available in any of these formats:
  • Live Boot Camp Style – Either via our Norfolk, Virginia-based alliance with Infotectraining.com or delivered directly to your enterprise. (Check under Leadership and Management:  GO HERE )
  • Combined Boot Camp, with live delivery PLUS access to the online, self-paced materials for extended review / reference.
Each program includes access to our best in class Workbook with over 500 pages of genuinely useful information (no fillers), allowing you to convert the coursework to customized solutions.

Tuesday, December 6, 2016

Disaster Recovery Help for SAMs - 2 of 5


What can you do to recover after the hurricane, tornado, cyclone, tsunami, fire, or other disaster  has left your business decimated. This Knowledge Briefing delivers strategies for preventing yet another series of costly disasters—disasters of man-made origin!

Reduce Costs & Risks by Setting Effective Acquisition & Utilization Criteria for Technology Assets

Starting Over or Starting Out - When you begin planning your new technology, or your post-disaster technology environment, take a very serious look at your genuine needs. What level of hardware did you actually use prior to the disaster? What types of software? What were your problems, complaints, or cost concerns with previous products? The answers to these questions  should become the foundation for your purchasing criteria—requirements & expectations applied to every prospective purchase.

Real WorldAlthough incredibly unfortunate, a disaster gives you a chance very few businesses in the world will ever get—You get to correct previous technology and operational mistakes and plan a substantially more effective future infrastructure.

WIIFM – What's in it (in this briefing) for me? There are two simple ideas in this Knowledge Briefing that you can use to reduce technology costs and risks by as much as 30%. These strategies are applicable to businesses recovering from a disaster as well as new businesses building their first systems management (SAM or ITAM) infrastructure.

Take a look back. Prior to the event, how did you actually use your technology? How did your employees use it? Which of your tech products were genuinely doing the job? Which weren't? What functionalities did you value the most? The least? How much were you spending: On hardware, software, support, and services? How often did you change over to new hardware or new software? Were those changes because you needed the new products, or were they based on the vendor forcing you into the evolution? Did you really need a “genuine Intel” processor computer, or would an AMD or an Apple product be just as effective? Which of your prior software products regularly exposed you as a hackers or piracy audit target? Are there alternative products that you could use to reduce that exposure? Again, are your requirements criteria well thought out and based upon measurable need?

Once you have taken a serious look at the way your business technologies functioned before the disaster, it is time to set the criteria that will guide the technologies you will acquire for the new systems environment.

Here is a big cost reduction. How difficult would it be to rebuild your technologies using open source software? Many quality open source products are now available at no cost or for drastically lower costs than the more popular comparable proprietary products. The differences between open source and proprietary products in terms of functionality and support for the average small business are not as significant as you would expect.

For instance – Could your company use a minimally priced open source product as its desktop productivity suite—say for less than $100 per license? Or would you rather pay in excess of $400+ per computer for a comparable proprietary product? Could you use locally built computers, thus contributing to local growth, or would that multi-national brand name be more economical? Does your local tech community provide enough expertise to support your tech products, or will you pay that multinational company for telephone or email support?

Real WorldPrior to the disaster event, did you find yourself constantly patching and fixing defective systems and software? How much would you save, in labor alone, by moving to products that are not commonly targeted by hackers, malicious code, and counterfeiters?

Unfortunately, the vast majority of small- to medium-sized enterprises/businesses (SMEs/SMBs) acquire and use technologies based upon reactive purchasing instead of the more effective strategic purchase.

Do you want a guaranteed way to save money and reduce risk? Try this easy and cost effective process: Create a simple acquisition criteria template for all future tech purchases. If your personnel cannot clearly define and defend specific criteria for product functionality, do not purchase the product. Acquisition criteria must be directly tied to the bottom line or to improved productivity; and don't forget to ensure that those requirements criteria have not been provided by the product vendor (as is very frequently the case). 

Real World: We used to be able to acquire a perpetual license for most of our software-related products. This license meant that we purchase the product one time and continue to use it until we simply didn't need it any more—the one-time-fee license continued onward at no additional cost. Such perpetual licenses are few and far between in today's business technology environment. To increase their revenue streams, many software publishers have switched to the subscription based licensing scheme (SAAS) that requires you to pay an ongoing yearly fee to continue using the product. Your previous “one-time” cost just became a significant, and constantly escalating, repetitive expense. What's more, in many cases, if you refuse to pay the yearly fee, the licensor can legally shut the product down and deny use until you pay up or remove the product—very costly.

Setting and following acquisition criteria need not be difficult. As you may have gathered by the previous content, there are certain immediate steps you can take to produce instant savings. Remember the KISS principle? Consider the following...   

Real World – Over 80% of companies acquire technology assets (operating systems, software, hardware, & etc) based on ad hoc criteria. Altogether too frequently, ad hoc can be translated into pet product acquisitions. If you do nothing more than take away the free money and establish credible control over the entire acquisition process, you can reduce IT losses by as much as 30%.


Here's how you get caught...

Terrific Tales of Tremendous Terror – Over 60% of major businesses have refused to acquire the latest operating system for their PCs. With their extensive buying power, these large enterprises can afford to delay acquiring newly released products until the software publisher finishes their live beta testing (using customers to work the bugs out of products). Unfortunately, SMEs/SMBs do not have this leverage and must purchase whatever operating system the hardware provider supplies. Result? The business technology consumers least capable of absorbing financial losses due to technology
defects are the very companies that must carry the load.

Fortunately, and pretty much without precedent, an enormous number of PC systems builders have finally made a stand and refused to load the “latest” operating system on customers' PCs. Of course, the product was on the market for nearly six months before the systems providers took action. Take a moment and estimate how much defective software products cost you in down time, consulting fees for patch management, or simply inconvenience. You may want to seriously consider using these losses to gain more mutual benefit during your next hardware acquisition or software license negotiation.

Lots to consider. For now, your assignment is to establish the purchase criteria that most accurately fit your actual needs—measurable needs, not vendor hype. Work on criteria for hardware, operating system, software, and support. Don't forget your printers, copiers, fax systems, email, voice mail, even your cell phone needs. Could you reduce ongoing costs by standardizing on a specific product or service? Could the same standards reduce your exposure to risk issues such as hacking, compliance audits, built in obsolescence or constant unnecessary product feature bloat? I'll be back with more.

Got questions? Comments? Recommendations? Do you have horror stories of post-disaster experiences? Let us know and we'll follow up. I'm Alan Plastow & I firmly
believe that the more you know about managing technology assets, the less money you
will lose to sharp technology industry practices. Or, on the down side, you could always become one of those asset managers who are not permitted to do anything more than count computers and software titles...

Friday, December 2, 2016

Has Your Business Been Victim of a Technology Disaster? Learn How to Prevent Being Hammered Again.

When nature slams your business, a repeat disaster could easily follow—this one of man-made origin. This 5-part Briefing Series helps you minimize the inevitable post-disaster software piracy audit risks. From where we stand there isn’t a whole lot we can do to relieve the misery each of you has encountered, but The Institute wants to help where we can. So, here is our offer: We can help you prevent the next catastrophe with advice and guidance via the Internet.

It is now painfully obvious to all business technology consumers that computers, software, documentation, and electronic data make pretty lousy submarines. In the average disaster, the very core of your business is most likely gone or virtually unrecoverable. You are about to rebuild your technology infrastructure from scratch—be it two computers or twenty thousand computers—and, if you aren’t extremely careful, the con artists are going to set you up to get hammered yet again. You do not deserve that kind of abuse, so our primary goal is to provide advice to help you avoid future software piracy and non compliance punitive audit experiences courtesy of the software police and copyright cops. Our secondary goal—a very close second—is to enable you to save money when you re-invest in new technologies.

This article series was originally posted on our site for the benefit of victims of Katrina and other disasters. However, we quickly discovered a serious need for accurate, vendor-neutral advice on acquiring technologies after crippling events. Read on and consider what we have to offer individuals and companies that have been disaster victims.

Hello! I’m Alan Plastow, founder of The Institute for Technology Asset Management. After a disaster, when you buy your new computers, very frequently you’ll be looking for maximum product at minimum price. You’ll have little choice: Money is going to be tight. Although this is a perfectly normal reaction to the misery you’ve gone through, you need to be extremely careful of the operating systems, software, and other copyrighted products placed on those computers. From where I stand, I can predict with nearly 100% certainty that within a year of any significant disastrous event (18 months at the most) the software police and copyright cops will conduct mass software piracy, copyright violation, and license non compliance punitive audits in the areas of devastation.

Companies that are trying to recover from a disaster are going to fall prey to the “easy licenses” and “bargain costs” of counterfeit software and other products—including hardware. As well, these same companies, with their limited financial clout, are going to begin using shareware products to delay some computer-related expenses. The result? You will be setting yourselves up as easy targets for litigation by the nearly thirty members of the software police and/or copyright cops that are active in the U.S.—nearly 100 globally.

Another key issue you will need to become aware of is that the documentation from your software purchases is very closely scrutinized during a software non compliance, or piracy, audit. If, when you purchase your new copyright protected products, you do not receive the correct license; proofs of purchase; stamps, emblems, marks, or certificates of authenticity, or master media you will become a potential disaster target all over again.

Of all the businesses in the world, you are in a unique position. As demoralizing as your experience has been, you now have the opportunity to rebuild your business into something bolder and better than it may possibly have become prior to the disaster. Please permit me, at no cost, to guide you with advice in avoiding the software piracy audits that can easily follow your efforts to rebuild.

Monitor the Taminstitute.org blog site to access these full Disaster Recovery Knowledge Briefings. It’s free and you, your employees, and your company will benefit through short- and ling-term cost and risk reductions in technology asset management. This is the place for Disaster Survivors where I will answer your questions and provide no cost advice. Don’t suffer through the pain of recovering your business technologies only to be blind-sided and hammered all over again for incorrectly licensed copyrighted products after you are back in operation. We can provide the advice that you need.

With great respect for what you are enduring,

Alan L. Plastow
Founder