RSS feed Get our RSS feed

News by Topic

failure

Results 151 - 175 of 303Sort Results By: Published Date | Title | Company Name
By: Shell     Published Date: Nov 19, 2018
Your turbine operates in tough conditions—running at high temperatures and exposed to a ton of contaminants. As the pressure to perform builds on your turbine, your turbine oil can start to degrade. Read this brief and learn why monitoring turbine oil condition can be critical to preventing unplanned downtime. You'll also: • Discover the causes of sludge and varnish formation that lead to critical component failure • Understand how common contaminants contribute to degradation processes like hydrolysis • Find out why oil additives become depleted, significantly impacting oil life and performance GET THE BRIEF ON CAUSES AND CURES OF OIL DEGRADATION. In the brief, you’ll learn some of the common causes of turbine oil degradation that happen all the time during the course of turbine operation. Download the brief and learn how to avoid problems like contamination and varnish build-up that can really cost your operation money in unplanned maintenance, repairs, and downtime.
Tags : 
     Shell
By: Shell     Published Date: May 30, 2019
The cost of a single turbine failure – whether it’s a steam, gas, water or combined cycle turbine - can amount to hundreds of thousands of dollars per hour. Avoiding turbine outages is business critical, but do you know what warning signs to look out for, and what steps to take to get to the root of the problem?
Tags : 
     Shell
By: F5 Networks Singapore Pte Ltd     Published Date: Jan 28, 2019
You’ve been having trouble sleeping because of the SSL visibility problem with all the fancy security tools that don’t do decryption. Put down that ambien, because this Lightboard Lesson solves it. In episode, David Holmes diagrams the Right Way (tm) to decrypt and orchestrate outbound SSL traffic, improving SSL visibility, decreasing failures and improving network performance.
Tags : ssl, outbound visibility
     F5 Networks Singapore Pte Ltd
By: F5 Networks Singapore Pte Ltd     Published Date: Jan 28, 2019
You’ve been having trouble sleeping because of the SSL visibility problem with all the fancy security tools that don’t do decryption. Put down that ambien, because this Lightboard Lesson solves it. In episode, David Holmes diagrams the Right Way (tm) to decrypt and orchestrate outbound SSL traffic, improving SSL visibility, decreasing failures and improving network performance.
Tags : ssl, outbound visibility
     F5 Networks Singapore Pte Ltd
By: Zebra Technologies     Published Date: May 02, 2018
Up to 14% of medical records include inaccurate, potentially dangerous patient data as a direct result of failures in patient identification. Often, errors can be attributed to outdated manual processes, such as oral verification or written wristbands, which can impact the standard of care delivered. In this white paper Zebra Technologies outlines the benefits of an automated barcode wristband solution, including insight into: Reducing common Patient ID errors The advantages of automated Patient ID processes over manual The best automated barcoding options
Tags : patient, identification, streamline, hospital, processes, optimization, zebra
     Zebra Technologies
By: HP     Published Date: Jun 23, 2008
HP StorageWorks XP Disk Arrays are enterprise-class storage systems that deliver dependable performance for environments where downtime is not an option. Complete redundancy throughout the architecture provides non-disruptive online upgrades and no single point of failure so you can count on your data being available.
Tags : disaster proof, hp disaster proof, disaster-proof, disk array, storageworks, storage
     HP
By: HP     Published Date: Oct 22, 2008
The importance of data processing in today’s business environment is increasing and it is clear that business operations must be secured against every possible contingency to provide continuous uptime. Business continuity is not just concerned with IT infrastructure and data processing, it also includes manual and automatic IT systems with the human involvement. This white paper explains how HP StorageWorks XP for Business Continuity Manager (BCM) Software makes sure that all processes within the data-handling procedures are automated in such a way that in the event of a failure or unplanned disruption, business operations can continue with minimal interruption.
Tags : disaster proof, 4aa1-0140enw, bcm, business continuity manager, storageworks, xp10000 disk array, xp12000 disk array, wwenterprise
     HP
By: Panda Security     Published Date: Feb 27, 2008
With thousands of new malware threats being created and unleashed into the Internet daily, the End Point security model is failing.  Without additional layers of security, infiltration may be virtually impossible to stop.  This important white paper explores alternatives that eliminate dangerous traffic prior to reaching the network or server.
Tags : email security, e-mail security, security appliance, desktop, endpoint security, end point security, anti-spam, spam
     Panda Security
By: Marketo     Published Date: Jun 08, 2017
Unfortunately, we’ve all been there. Every now and then, we make cringe-worthy mistakes. But the mistakes that haunt us in our personal lives often aren’t as public as email marketing mistakes, which go out to hundreds and thousands of subscribers. Download this ebook to learn about the eight most common email marketing pitfalls and how you can avoid or fix them: Mistake 1: Unclear subject lines Mistake 2: Poor email list hygiene Mistake 3: Failure to measure email inboxing Mistake 4: No engagement segmentation Mistake 5: No re-engagement strategy Mistake 6: Using image-based CTA buttons Mistake 7: No mobile optimization Mistake 8: Bad testing decisions
Tags : continuously opened emails, engagement, unique clicks, multiple clicks, cleaning campaign, sender reputation, marketo, marketing
     Marketo
By: Jive Software     Published Date: Dec 02, 2014
Customer interactions today span multiple touch-points. As such, businesses are constantly seeking ways to adapt their activities to interact with buyers through the most relevant channels. While this pursuit helps firms better connect with clients, it also means capturing data related to different views / parts of the customer journey. Failure to connect these pieces results in disconnected customer messaging. Watch this webinar today to learn how social collaboration tools help companies overcome this challenge.
Tags : customer interactions, customer data, social collaboration, emerging marketing, social media, crm & customer care
     Jive Software
By: Mimecast     Published Date: Nov 06, 2017
Trying to manage disparate email solutions? Not just for e-discovery, archiving and recovery, but security and continuity as well? Your perfect-world archive is achievable. Reduce administrative complexity with a 100% cloud solution for not only your email archiving but continuity and security, too. Watch the virtual event on cloud archiving on-demand now, featuring: Amanda Crew, from the hit show Silicon Valley, with a brief history of cringeworthy archive failures. First-hand industry insight from Mimecast CEO Peter Bauer and CTO Neil Murray. A deep dive demonstration of the leading cloud archive solution including, data protection, recovery, e-discovery and compliance features. View on-demand now
Tags : mimecast, virtual event, email archiving, email solutions, cloud archiving
     Mimecast
By: Oracle Service Cloud     Published Date: Mar 23, 2016
The Internet of Things (IoT) is connecting our world in ways that were unimaginable 10 years ago—collecting data on everything we do and using it to streamline our daily activities. In doing so, IoT is changing the way that consumers think about service. Service organizations must be prepared to support these new customer expectations to ensure continued satisfaction to strengthen and foster loyalty. Additionally, IoT is making its way into the enterprise, especially among organizations in industries like utilities, oil and gas, medical devices, manufacturing and telecommunications. Connected devices enable more efficient processes for maintenance and repair by constantly providing information on machines’ performance, environmental conditions, and possible failures. For example, a connected washing machine in a customer’s home could automatically send out an error report to the manufacturer when it experiences a failure. This is where field service management comes in.
Tags : oracle, service cloud, service management, customer interaction, internet of things
     Oracle Service Cloud
By: Citrix ShareFile     Published Date: Apr 11, 2017
Password-protected PDFs tout the ability to share your sensitive data securely. But several factors make them vulnerable, which means your firm and clients’ information could easily be exposed to hackers. Download this white paper to learn how password protection failures cause your firm to: • Lose data when colleagues share passwords with others, especially through email. • Face risk by not knowing if an unauthorised person has accessed your files. • Have clients’ PDF files cracked by hackers in minutes.
Tags : pdf protection, data security, password protection, hacker prevention
     Citrix ShareFile
By: Citrix ShareFile     Published Date: Apr 14, 2017
Password-protected PDFs tout the ability to share your sensitive data securely. But several factors make them vulnerable, your accountancy firm’s data and your clients’ information could easily be exposed to hackers. Download this white paper to learn more about PDF password protection failures that: • Expose data when people share passwords with others, especially through email. • Prevent your firm from knowing when files are read by unauthorized individuals. • Allow hackers to easily to gain access to confidential financial documents within minutes.
Tags : business documents, file sharing, file security, file backup, file sync, file delivery, data protection, data security
     Citrix ShareFile
By: Citrix ShareFile     Published Date: Apr 14, 2017
Do Passwords Really Protect Your PDFs? Password-protected PDFs tout the ability to share your sensitive data securely. But several factors make them vulnerable, which means your firm and clients’ information could easily be exposed to hackers. Download this white paper to learn how password protection failures cause your firm to: • Lose data when colleagues share passwords with others, especially through email. • Face risk by not knowing if an unauthorised person has accessed your files. • Have clients’ PDF files cracked by hackers in minutes.
Tags : password protection, account management, document protection, data protection, data management, password vulnerability, encryption, data integration
     Citrix ShareFile
By: Magento     Published Date: Feb 13, 2018
Commerce is permanently altering the way B2B businesses work- from customer acquisition to customer retention, and from order fulfillment to building a relationship with customers. From our experience of working with B2B companies across industries, we have curated a list of 11 most common obstacles to B2B eCommerce success, including: Thinking About eCommerce In Isolation Ignoring Customer Experience No Advanced Analytics Failure Maintain and Improve Systems
Tags : 
     Magento
By: HP and Intel® Xeon® processor     Published Date: Aug 10, 2012
Virtualization reduces the number of physical servers IT needs to provision and maintain, but it also transforms the data protection paradigm. Now businesses can recover from failures in minutes, not hours, with unprecedented affordability. The key to
Tags : complete, storage, data, protection, architecture, virtual, environments, virtualization
     HP and Intel® Xeon® processor
By: GFI Software     Published Date: Mar 21, 2011
Companies' dependency on email to do business brings with it various problems. Storage limitations, backups, problematic PST files, access to old emails and regulatory compliance or eDiscovery requests are a few issues that arise. Failure to address these effectively could have serious repercussions for the organization.
Tags : gfi, email archiving, backups, storage, pst files, regulatory compliance, ediscovery, exchange server
     GFI Software
By: Microsoft Dynamics     Published Date: Jul 03, 2008
The people in your organization have access to volumes of information that was once unimaginable. Success or failure can hinge on whether or not people can use this information to make wise decisions quickly. But without the ability to make sense of information, a knowledge gap exists, and the best anyone can do is guess or follow a hunch. Business intelligence helps you decipher and extract meaning from data so you can make informed decisions.
Tags : analytics, business intelligence, business management, metrics, business metrics, microsoft
     Microsoft Dynamics
By: Inovis     Published Date: Aug 06, 2007
The challenges presented by multiple Value-Added Networks (VANs) and managing diverse trading partners create barriers to the efficiencies promised by EDI. Multiple providers mean multiple points of failure with no one entity to hold accountable. Also, as trading communities grow, end-to-end supply chain visibility becomes an essential operational requirement.
Tags : van, vans, value added, value-added, value added, edi, electronic data interchange, scm
     Inovis
By: 6th Sense Analytics     Published Date: Sep 18, 2007
Software development projects have a long and storied history of failure. In fact, 82% of projects today run late, while errors cost 80% of the average project budget to fix (The Standish Group). Certainly no other business process today is allowed to endure this sort of failure. But software development is often left to chance, despite the significant cost and importance of the process.
Tags : software development, development, programming, programmer, quality assurance, quality control, software testing, cost
     6th Sense Analytics
By: Stratus Technologies     Published Date: Jun 04, 2009
Cloud computing allows companies to use IT resources as a service, taking advantage of shared applications, processing and storage managed within the cloud - either inside a private cloud at an internal data center, or in an external cloud at a service provider. Greater robustness of the virtualized servers supporting this new IT model will ensure a resilient cloud infrastructure capable of delivering "on-demand" access to users.
Tags : demand, stratus, cloud computing, virtualized, on demand, storage management, shared applications, cloud
     Stratus Technologies
By: Dell Storage     Published Date: Jan 16, 2009
Most storage devices support multiple SAN connections for performance and reliability, but in many configurations servers use only a single storage connection. This creates a single point of failure and potential performance bottleneck for I/O. Multipath Input/Output (MPIO) is server software that extends redundancy to the entire I/O pathway in a SAN, delivering fault tolerance, high availability, and better performance.
Tags : dell, san connections, storage area networks, configuration servers, mpio, multipath input/output, storage
     Dell Storage
By: Dell Storage     Published Date: Jan 16, 2009
System reliability is a vital component in Storage Area Network (SAN) design that keeps your production environment operating and avoids data loss and downtime. But since SANs are built using both mechanical and electronic parts, component failures due to usage, environmental factors, or manufacturing defects are not uncommon. Even in completely redundant systems, controllers can fail, fans can stop operating, power supplies can burn out, and disk drives can degrade or fail.
Tags : dell, san, storage area networks, component failures, data loss, reliable san, building san, raid
     Dell Storage
By: Cisco     Published Date: Jan 29, 2009
For small and medium-sized businesses (SMBs), the impacts of a disaster can result in loss of or lack of access to data, applications, and work facilities. Those with disaster recovery plans in place fared much better than those without such contingency plans.
Tags : cisco, disaster preparedness, medium-sized businesses, smb, contingency plans, business continuity, recovery management, data protection
     Cisco
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics