
The Secure and Value-Wise Process of Parts Harvesting
Bridge the IT labor gap
Where is the chain of custody for in-transit data-bearing equipment and devices?
As part of Data Privacy Week, Eric Dorn, SVP and General Manager, Sipi Asset Recovery, shares the single most common data security disconnect he witnesses almost daily. And it’s keeping him up at night. “Data in transit risk is a critical problem that needs to be addressed! Specifically, equipment and devices moving from one customer’s facility
Continue ReadingParts Harvesting From Your Own IT Equipment, Is That A Thing?
You bet it’s a thing, and, it’s happening in data centers and offices now more than ever before. Worldwide, manufacturing has been affected by the pandemic. With electronics manufacturing being at the center of many industries, it has been hit especially hard. Computer chips, processors, hard drives, and many other parts are not readily available, causing delays
Continue ReadingBeyond the RFP
A Request for Information (RFI) leading to a Request for Proposal (RFP) is the classic and generally reliable way to find an ITAD provider that meets your business needs. However, simply comparing the responses to the RFP lacks the actual testing necessary to understand which contending vendors will be the best fit for your asset
Continue ReadingSipi’s Box Program: essential for the work from home transition
Our country has been continuing to move forward amidst the COVID-19 pandemic. Through stay-at-home orders and closed offices and stores, workers across many industries continue their hard work. This hasn’t come without sacrifice; for many workers used to “going to the office,” it’s been a major shift. This could be up to half of the
Continue ReadingIs your secure ITAD provider in it for the long haul?
As we’ve referenced before, the world of IT asset disposition, lifecycle management, and inventory management is constantly on the move. 2018 was a landmark year and 2019 is breezing by with its own set of challenges. Key player leaves the ITAD market However, of all the news in 2019, one recent announcement has left a
Continue ReadingData security and quantum computing: Part 2
In our previous blog, we covered the basics of how quantum computing is changing the outlook for data security — specifically, how it could affect current data security, sanitization, and destruction standards. But how worried should we be? Is the quantum revolution right around the corner? The answers aren’t so clear cut… except for that
Continue ReadingData security and quantum computing: Part 1
Data security is at the forefront of IT asset management and disposition, at every step in the lifecycle. Data must be protected while it’s actively in use as a part of IT inventory all the way to its end-of-life, whether that means remarketing, recycling, or destruction. We’ve talked before about how the ITAD industry (and
Continue Reading