Education Resource Center Education Resource Center

Research Finds $30 Billion Wasted In U.S. On Unused Software
Research Finds $30 Billion Wasted In U.S. On Unused Software

Global organizations are wasting money on software that is not used, according to a new report from Software Lifecycle Automation company 1E. The report The Real Cost of Unused Software analyzed the results of a four-year study of more than 1,800 software titles deployed on 3.6 million desktops, in 129 enterprises, across 14 industries.

More Education Articles


More Education Articles


  • 5 Reasons A Security Command Center Is Crucial To Higher Education

    Today’s campus environments require a variety of systems to manage the vast amount of data, evolving security needs, and a growing number of assets that must be protected on a daily basis. To accomplish this, colleges and universities should look at a number of ways technology can help address safety and security needs.

  • The Top 3 Tech Needs In Higher Education This School Year

    An annual study by Wakefield Research for VitalSource Technologies found that 44 percent of students don’t go more than 10 minutes without using some form of technology during an average school day. Knowing the prevalence among students to use technology throughout the day is so high, why not meet them on common ground when trying to connect? Schools have an opportunity to not only enhance the connected campus experience, but also to reduce costs and improve operations as well. Reduced maintenance technology that supplants dinosaur devices or practices can save colleges and universities countless time and money through an overall low total cost of ownership.

  • Top 5 Tech Trends Universities Use To Enhance Student Security

    It is only fitting that institutions of higher learning, where innovation is encouraged, are leading the way in advancements related to confirming student identity and controlling access to campus buildings. While student identification (ID) cards have evolved over the years, some colleges and universities have truly gone high-tech in the ways students can prove who they are.

  • The Top 5 Ways Universities Confirm Student Identity Through Access Control

    As students return to school, packing lecture halls and moving into dorm rooms in the colleges and universities, officials behind the scenes look for ways to safeguard the students, faculty, and assets. To accomplish this feat, today’s higher education organizations look for a combination of policies and new technology solutions.

  • 5 Ways IT Service Providers Can Win With SMB Mobile Security

    When the mobility wave hit, data security got way more complicated for IT services providers and their SMB customers. Indeed, as mobile devices have infiltrated the SMB market in a big way, hackers have kept pace, waging full-blown attacks against the mobile landscape. Studies have shown that mobile malware assaults rose by 58 percent in 2012, making mobile data security one of the biggest threats for businesses today. 

More Premium Content


  • Ingram Micro Government Market
    Ingram Micro Government Market Solution providers who serve the government market face unique challenges and need unique support. Fortunately, Ingram Micro Data Capture/POS Division, in conjunction with Ingram Micro GovEd Alliance, can supply everything you need
  • OKI Education Solutions
    OKI Education Solutions

    As an industry leader in print solutions for education, OKI Printing Solutions gives you the ability to bring learning to life with color while being able to control the costs of printing. Studies have shown that color increases student learning by as much as 78%, while also increasing students' willingness to read and participate by up to 80%.*

More Products & Services