-
Podcast Episode 7 - SAM Tool Implementation Success
Ahead of our ITAM Tools Day event in New York later this month Martin Thompson and David Foxen talk with guests about building the business case for SAM tools, implementation resources required, techniques and gotchas for ... -
Event Listing: SAM Workshop (London)
The ITAM Review will be running a SAM Workshop at the BCS in London on the 29th April. This will be an interactive session whereby those with issues or interest around SAM can discuss openly in ... -
Let's meet in 2015, ITAM Review Spring Events Schedule
I am pleased to share our events calendar for Spring 2015. Unfortunately our week of events planned for New York were cancelled due to the ‘January 2015 nor’easter’ – these have all been rescheduled for May. Sorry ... -
January News Roundup
News CCL Writes to Oracle The Campaign for Clear Licensing published an open letter to Larry Ellison and Oracle in January on the back of their successful Oracle Seminar and other research. The letter highlights a ... -
Event Listing: IBM and SAP Seminar (London)
Building on our Oracle seminars, we’re pleased to introduce a series of seminars on IBM and SAP licensing and audit defence. This seminar will cover the key issues of IBM and SAP licensing and will include ... -
Event Listing: IBM and SAP Seminar, 14th May (New York)
Building on our Oracle seminars, we’re pleased to continue our series of seminars on IBM and SAP licensing and audit defence with a stop in New York. This seminar will cover the key issues of IBM and ... -
Introducing: The End User Review
We are delighted to announce our new, user-based feature for the ITAM Review. The End User Review is a chance for any of our readers to fill out a quick online form to have their say and ... -
February News Roundup
News Forever 21 accused of pirating Adobe software – It was reported in February that fashion retailer Forever 21 have been knowingly pirating copies of Adobe software. According to Adobe, they even told Forever 21 they ... -
Bring Your Own Trojan Horse: get ready to ‘muck out’
A new promotional report entitled ‘The BYOD Trojan Horse. Dangerous Mobile App Behaviours & Back-door Security Risks’ suggests that that enterprises are not doing enough to understand which mobile app behaviour(s) hitting their data networks are ...