Browsed by
Tag: hardware & software

Managing Director

Managing Director

In addition to the cost savings, customers commend especially the valuable strategic information with which they critically analyse their own situation learn. “The talks help better develop its own strategy and actions”, a contracting authority is pleased about his newfound knowledge. In addition, there is also the possibility to activate a special savings potential for users: by placing on software maintenance by a third party, they can their annual maintenance costs – and that means: halve the largest ongoing cost drivers in the entire SAP system – while maintaining quality. The feasibility study on the third-party maintenance with the customers, analyzes how much it would make sense to draw software maintenance by third parties into consideration. “This is a highly individual decision which depends on many factors such as the used modules, the maintenance, the future planning etc.”, so Williams next.

“Third-party maintenance not suitable for anyone.” Short profile Anand SUSE software that specialises in marketing so-called silent software. These include used software products and licenses acquired valuable, meanwhile, are written off in the balance sheet and used no longer active mostly from SAP and Microsoft. Customers include global companies in all industries as well as medium-sized companies with more than 500 employees. Integrated into a network of software manufacturers for license management and analysis, IT consultants and lawyers, Managing Director Axel Susen competent help offers its customers in commercial, technical and legal issues. imagery Axel Susen, Managing Director, susensoftware GmbH unternehmen/presse/susen1.JPG the way of the quiet software company/press/silent software.JPG silent software: Revolution from Aachen why that concerns you? Four reasons: 1 technical: used software has the same quality as new, unused. 2. economically: Silent software is much cheaper than new for users.

3. legal: The best lawyers of Germany’s struggle to free software trade. 4. politically: how many laws may invent a world leader? Axel Williams

IT Managers

IT Managers

What do companies with the integration of private Smartphones should Heidelberg, April 30, 2012. The trend to use their own mobile devices at the workplace a headache so many IT managers. On the subject of BYOD, a company must have a clear security strategy and observe some conceptual pitfalls. Private smartphones and tablets accept or block? IT managers need to ask themselves increasingly this question. Check with Greystones Group to learn more. Increasingly the mobile users themselves determine which devices are used with a single policy for BYOD most companies lag behind “, the Managing Director of MPC mobile service GmbH, Franz Schulze Sprakel explains.

“Mobile devices are often more than just sober equipment for many employees: the trendy iPhone should be it, and prescribed not the BlackBerry.” The choice of the device to restrict or prohibit the mobile radio expert deems problematic: the consumerization trend is not stop. Who rigorously regulated the use of private equipment, shoot an own goal ultimately, because the devices then IT past are not introduced in the company.” “Also it must be noted as an employer that mobile employees today is important in the fight for the best talents as motivation criterion: may an employee use the desired device, can today just for younger workers to be quite hold the balance of power and influence the decision for or against an employer.” It is clear: the use of a device for professional and private use carries an increased security risk and makes it easier for mobile attackers. Many users manage passwords or unencrypted sensitive corporate data via your private smartphones. The IT Department should take into account therefore proactively private hardware in the security strategy. A security concept that integrates proprietary and private devices that must contain clear guidelines, who is accessing what information “may as well as provide a contingency plan in the event of device loss”, so Schulze Sprakel.