RSS feed Get our RSS feed

News by Topic

failure

Results 151 - 175 of 288Sort Results By: Published Date | Title | Company Name
By: IBM     Published Date: Nov 10, 2016
Within any organization, business content – applications, forms, reports, office documents, audio, video, and social media – is poorly managed and often out-of-reach of critical business processes. And, when business content is invisible, unclassified or unmanaged, it creates chaos. Content chaos causes a breakdown in the flow of information between an organization and its customers, its partners and even within itself – failures that often impact customer engagement, business agility, and the capacity to collaborate securely and effectively. It's time you learn how to put your business content to work.
Tags : ibm, analytics, ecm, business cost, business process
     IBM
By: IBM     Published Date: Jul 26, 2017
Business leaders are eager to harness the power of big data. However, as the opportunity increases, ensuring that source information is trustworthy and protected becomes exponentially more difficult. If not addressed directly, end users may lose confidence in the insights generated from their data—which can result in a failure to act on opportunities or against threats. Information integration and governance must be implemented within big data applications, providing appropriate governance and rapid integration from the start. By automating information integration and governance and employing it at the point of data creation, organizations can boost confidence in big data. A solid information integration and governance program must become a natural part of big data projects, supporting automated discovery, profiling and understanding of diverse data sets to provide context and enable employees to make informed decisions. It must be agile to accommodate a wide variety of data and seamle
Tags : mdm, big data, automation, organization
     IBM
By: IBM     Published Date: Jul 26, 2017
Fear of data misuse has led to both general and industry-specific data-privacy regulations worldwide that many organizations now must meet, and it’s important to embrace their requirements. The role of data-holding organizations has increasingly shifted to being stewards of information, in particular in the United States and the European Union (EU). And failure to comply with regulations can mean not only reputational damage, but substantial fines and even jail time. Just meeting compliance mandates, though, may not help you actively spot and stop a data breach.
Tags : data misuse, security, privacy regulations, data breach, compliance mandates
     IBM
By: IBM Corporation     Published Date: Jun 01, 2011
Gartner has identified five key failures in crucial interactions between security and risk professionals and their client.
Tags : ibm, gartner, communication, security message, enterprise risk management, jeffrey wheatman, chief information security officer, ciso
     IBM Corporation
By: Idera     Published Date: Mar 13, 2014
Recent headlines tout backup’s many failures and the struggles that organizations have with successfully executing on their backup strategies. Download this free white paper to learn how you can make backup a profitable service offering for your company.
Tags : idera, storage, backup, server backup, sql, microsoft
     Idera
By: Infinidat EMEA     Published Date: Jun 10, 2019
Digital disruption, economic instability, political upheavals and skills shortages have all at some point in the past 24 months been blamed for business failure, or at the very least, lost profitability and earnings. It’s perhaps not a huge surprise that a Gartner CEO survey on business priorities revealed that digital business is a top priority for next year. Survey respondents were asked whether they have a management initiative or transformation program to make their business more digital. The majority (62 percent) said they did. Of those organisations, 54 percent said that their digital business objective is transformational while 46 percent said the objective of the initiative is optimisation.* So, for businesses it’s a case of learning to evolve and be agile, to use technology to help compete more efficiently and not fall victim to inertia. As businesses become increasingly dependent on the insights from data analytics and face-up to competition fuelled by the 24/7 society of in
Tags : 
     Infinidat EMEA
By: Infoblox     Published Date: Aug 08, 2013
10 compelling reasons for taking another look at the way you manage DNS, DHCP, and IP addresses.
Tags : infoblox _dns_dhcp_ipam, infoblox_ddi, infoblox_dns, infoblox_ipam, infoblox_dhcp, infoblox_ip_address_management, dhs_dhcp_ipam, dns
     Infoblox
By: Infoblox     Published Date: Nov 07, 2013
Attacks on the computing infrastructure directly impact network management teams. Security is also a network management issue. This paper explains how your network management team is key to securing your business against cyber-attacks.
Tags : infoblox_dns_dhcp_ipam, infoblox_ddi, infoblox_dns, infoblox_ipam, infoblox_dhcp, infoblox_ip_address_management, dhs_dhcp_ipam, dns
     Infoblox
By: Infoblox     Published Date: Nov 07, 2013
Failure to meet compliance can result in fines, dangerous network exposure and damage to a company’s reputation. Traditional techniques leave many organizations at risk. Read this white paper to learn 7 critical steps to achieve network compliance.
Tags : infoblox_network_automation, infoblox netmri, infoblox_switch_port_manager, infoblox_automation_change_manager, infoblox_spm, infoblox_acm, network_automation, netmri
     Infoblox
By: Infoblox     Published Date: Sep 09, 2014
Active Directory can manage Microsoft tools; but core network services require best-in-class DNS and DHCP management utilities. Learn how Infoblox enhances Microsoft environments by improving visibility and management of DNS, DHCP, and IPAM processes.
Tags : infoblox_dns_dhcp_ipam, infoblox_ddi, infoblox_dns, infoblox_ipam, infoblox_dhcp, infoblox_ip_address_management, dhs_dhcp_ipam, dns
     Infoblox
By: Infoblox     Published Date: Sep 09, 2014
By enhancing DNS services provided to Active Directory (AD), IT organizations see immediate benefits in performance, speed, and accuracy of data across DNS and AD. Read this white paper to learn how to transform your Microsoft environment today.
Tags : infoblox_dns_dhcp_ipam, infoblox_ddi, infoblox_dns, infoblox_ipam, infoblox_dhcp, infoblox_ip_address_management, dhs_dhcp_ipam, dns
     Infoblox
By: Infoblox     Published Date: Sep 09, 2014
With trends like virtualization and BYOD making networks more complex, the need for accurate and dynamic IP address management (IPAM) is growing. Learn how to implement an IPAM solution that centralizes information to create highly efficient teams.
Tags : infoblox_dns_dhcp_ipam, infoblox_ddi, infoblox_dns, infoblox_ipam, infoblox_dhcp, infoblox_ip_address_management, dhs_dhcp_ipam, dns
     Infoblox
By: Infor     Published Date: Feb 27, 2007
Countless surveys have confirmed that most lean initiatives are abandoned outright or fail to deliver expected and needed results.  One well-known lean business consultant estimates that the failure rate is 98%. What is it the 2% of companies know that the others do not? Download this white paper to learn more.
Tags : supply chain management, best practices, workforce management, productivity, employee performance, lean methods, lean, six sigma
     Infor
By: Inovis     Published Date: Aug 06, 2007
The challenges presented by multiple Value-Added Networks (VANs) and managing diverse trading partners create barriers to the efficiencies promised by EDI. Multiple providers mean multiple points of failure with no one entity to hold accountable. Also, as trading communities grow, end-to-end supply chain visibility becomes an essential operational requirement.
Tags : van, vans, value added, value-added, value added, edi, electronic data interchange, scm
     Inovis
By: Intel     Published Date: Feb 28, 2019
Keeping the lights on in a manufacturing environment remains top priority for industrial companies. All too often, factories are in a reactive mode, relying on manual inspections that risk downtime because they don’t usually reveal actionable problem data. Find out how the Nexcom Predictive Diagnostic Maintenance (PDM) system enables uninterrupted production during outages by monitoring each unit in the Diesel Uninterrupted Power Supplies (DUPS) system noninvasively. • Using vibration analysis, the system can detect 85% of power supply problems before they do damage or cause failure • Information processing for machine diagnostics is done at the edge, providing real-time alerts on potential issues with ample of lead time for managers to rectify • Graphic user interface offers visual representation and analysis of historical and trending data that is easily consumable
Tags : 
     Intel
By: Intel Corp.     Published Date: Aug 08, 2012
Virtualization reduces the number of physical servers IT needs to provision and maintain, but it also transforms the data protection paradigm. Now businesses can recover from failures in minutes, not hours, with unprecedented affordability. The key to achieving the best business uptime and cost savings is the effective design of storage management and data protection. This white paper outlines an end-to-end storage and data protection architecture optimized for VMware vSphere and Microsoft® Hyper-V environments.
Tags : complete, storage, data, protection, architecture, virtual, environments, virtualization
     Intel Corp.
By: Iterable     Published Date: Sep 07, 2018
Today’s consumers are more informed, diverse, demanding and well-connected than ever before. With nearly unrestricted access to shopping resources used for discovery, comparison, and purchase, consumers are able to shop at will, often independent of branded retailer guidance. This rise of consumer independence can be attributed to the emergence of technological advancements favoring consumer empowerment; however, the repeated failures of brands to proactively offer personalized, high-value shopping experiences at scale is a significant contributing factor of consumer exodus. This has fostered an inclination among shoppers to become self-reliant in their pursuit of purchases, effectively shutting out promotional outreach from brands. Many brands continue to fall out of touch with their customers because they’ve lost sight of their customers’ true needs. Customer centricity has long been the foundation for modern marketing, but the brands which fail at creating deeply personalized market
Tags : 
     Iterable
By: Jive     Published Date: Apr 10, 2014
Different types of businesses will have different use cases for Social Business. In this whitepaper, we cover four different use cases at four very different types of businesses. But in each instance, the company's IT staff followed some key rules to minimize chances of failure and make it easier to convince employees and managers alike to dive into an enterprise social environment.
Tags : reachmail, customer relationships, engagement, customer support, best practices, crm & customer care
     Jive
By: Jive Software     Published Date: Dec 02, 2014
Customer interactions today span multiple touch-points. As such, businesses are constantly seeking ways to adapt their activities to interact with buyers through the most relevant channels. While this pursuit helps firms better connect with clients, it also means capturing data related to different views / parts of the customer journey. Failure to connect these pieces results in disconnected customer messaging. Watch this webinar today to learn how social collaboration tools help companies overcome this challenge.
Tags : customer interactions, customer data, social collaboration, emerging marketing, social media, crm & customer care
     Jive Software
By: Kaseya     Published Date: Apr 04, 2013
A complete and holistic solution can help organizations create system snapshots that can be restored quickly and efficiently, getting users back up and productive immediately.
Tags : disaster recovery, backup, business continuity, virtualization, security, rto, rpo, sla
     Kaseya
By: Kaseya     Published Date: Mar 12, 2015
Providers who add BDR to their offerings can enjoy substantial profit margins and incremental monthly recurring revenue. BDR, therefore, is ideal for solution providers, especially as a first step to a managed services practice.
Tags : backup, data loss, risks, recovery services, humor error, program deletions, hardware failures, system crashes
     Kaseya
By: KPMG     Published Date: Oct 19, 2018
A modular, holistic approach to change Digital disruption is forcing companies to fundamentally rethink how they compete. You probably used to solve this challenge by buying better technology. But in today’s complex, fast-changing business world, that single-minded approach is destined for failure. KPMG’s Technology Strategy and Selection (TSS) framework is a modular, holistic approach that drives lasting, long-term value from technology change. This article walks through the four key phases of the leading edge framework—creating a transformation vision, blueprinting the future organization, selecting the supporting technology, and implementing the new tools.
Tags : 
     KPMG
By: Lane Telecommunications     Published Date: Apr 14, 2009
The fax market is changing significantly though not in the way predicted by many. Far from an inevitable decline brought about by the emergence of e-mail, the demand for fax, particularly from larger companies, is actually growing. The way that fax is managed within the business is also undergoing a significant period of transition.
Tags : kudos, lane, lane telecommunications, fax over ip, foip, ip network, integrated business communications, integrated ip
     Lane Telecommunications
By: Lenovo and Intel     Published Date: Jul 10, 2018
The risk of cyber attacks and the cost of failure are increasing. Penalties associated with failure are only going to increase. And these challenges are compounded by increasing collaboration, use of cloud-based solutions, and an increasingly mobile workforce. Join experts from Forrester, Lenovo and Microsoft as they explore Forrester’s newly updated Zero Trust Extended framework. Then Lenovo covers how the four core components of its Data, Identity, Online and Device (DIODe) approach can minimize risk to data and critical IT. By taking these important steps toward a full Zero Trust Extended framework, you can: Protect the business from advanced threats Reduce the impact of breaches Easily support new business and operating models Rise to the challenge of evolving regulations like FISMA, HIPPA, PCI and GDPR
Tags : 
     Lenovo and Intel
By: LifeWorks     Published Date: Dec 04, 2018
For many years, an organization’s approach to employee mental well- being was simply “leave your problems at the door”. But those days are gone. Not only are mental and emotional health issues losing their stigma, but businesses are realizing that failure to understand and fulfill employees’ total well-being requirements, such a physical and financial well-being, ultimately leads to reduced productivity and output.
Tags : 
     LifeWorks
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics