THE ORIGINA BLOG

3 Ways SAMs Can Protect Their IT Estates from Questionable Vendor Tactics

3 Ways SAMs Can Protect Their IT Estates from Questionable Vendor Tactics

Megavendors are notorious for their unfair pricing tactics, massive upcharges, and questionable auditing practices. Here are a few ways to protect your software estate and your company.

read more
It’s All Connected: E-Waste and Corporate Right to Repair

It’s All Connected: E-Waste and Corporate Right to Repair

Learn about the deep links between e-waste and the corporate Right to Repair. Develop a mindset that learns when to ask a simple question: “Why?”

read more
Four Challenges Holding Your Z Mainframe Cloud Migration Back

Four Challenges Holding Your Z Mainframe Cloud Migration Back

Are these common challenges holding your mainframe cloud migration back? Read about four issues that can throw a wrench in your plans and how to combat them.

read more
A Beginner’s Guide to Third-Party Software Maintenance

A Beginner’s Guide to Third-Party Software Maintenance

Many questions arise when thinking about whether or not to make the move to a third-party software maintenance provider for your IBM® estate. Read on for answers to some of the most common questions about TPSM.

read more
Opportunities for SAMs and IT Leaders in an Unstable Economy

Opportunities for SAMs and IT Leaders in an Unstable Economy

Finding stability in a tough economy gets easier when teams work together to make educated technology solutions. Advice and analysis inside.

read more
Potential Issues Linger for Log4j Security Vulnerability

Potential Issues Linger for Log4j Security Vulnerability

The cyber community is still dealing with the repercussions from the Apache Log4j security vulnerability from 2021. Experts agree the worst might be yet to come.

read more
How Sainsbury’s Revitalized Their Chain of IT Suppliers

How Sainsbury’s Revitalized Their Chain of IT Suppliers

Learn how Sainsbury’s achieved $10 million (and counting) in supplier cost reduction. Best practices, insights, and talking points for all businesses.

read more
The Year of the Healthy Skeptic: A New Way of Thinking for IT Leaders

The Year of the Healthy Skeptic: A New Way of Thinking for IT Leaders

An in-depth look at Empower 2023 thought-provoking roundtables, interviews and bright ideas curated for IT, procurement, and software asset management professionals.

read more
 Breaking Free From the 90/10 Model: How to Invest More in Digital Transformation

 Breaking Free From the 90/10 Model: How to Invest More in Digital Transformation

Discover three practical strategies to jumpstart cost optimization, potentially saving 30% to 50% in your IT support budget.

read more
CVE-2023-23477: IBM WebSphere Vulnerability Information and Remediation Advice

CVE-2023-23477: IBM WebSphere Vulnerability Information and Remediation Advice

A new, potentially high-severity IBM® Websphere vulnerability has been published and is ready to give your business another headache. Harden your perimeter with advice from our cybersecurity team.

read more
Rethinking Patch-First Approach: Effective Strategies for Securing Your Business Technology

Rethinking Patch-First Approach: Effective Strategies for Securing Your Business Technology

Software security patches can’t consider your unique business and technology context. When securing your software estate, a fuller view of security and performance is necessary. Learn more about a multi-layer approach that does more than tick a box.

read more
Nobody Ever Got Fired for Buying IBM (And Other Too-Safe Thinking)

Nobody Ever Got Fired for Buying IBM (And Other Too-Safe Thinking)

The business technology landscape looks nothing like it did in the ‘80s or ‘90s. Why do we continue to place our trust in untrue “truisms” from those eras that land companies in bad spots?

read more