RSS feed Get our RSS feed

News by Topic

failure

Results 251 - 275 of 288Sort Results By: Published Date | Title | Company Name
By: Splunk     Published Date: Apr 16, 2012
Using Splunk, Cricket was able to identify system degradation and failures, even in the application area of Cricket's highly-automated and virtualized environment. Read about Cricket's impressive hard and soft ROI.
Tags : splunk, cricket communications, virtualization, automation, customer behavior, data, analyzying, decision making
     Splunk
By: Sponsored by HP and Intel®     Published Date: Nov 02, 2012
Virtualization reduces the number of physical servers IT needs to provision and maintain, but it also transforms the data protection paradigm. Now businesses can recover from failures in minutes, not hours, with unprecedented affordability.
Tags : virtualization, data management, it infrastructure, cloud computing
     Sponsored by HP and Intel®
By: SQC     Published Date: Oct 14, 2010
This paper describes why slow system integration is a major cause of project failure, why it happens and how to organize and prepare to avoid suffering the same fate.
Tags : software delivery, software management, integration, software integration testing, system integration
     SQC
By: Staples     Published Date: May 24, 2016
Your company wouldn’t be the same without the right IT strategy. You know it, and they know it. Protecting your infrastructure from failure should be a top priority — not just to prevent catastrophes, but to keep IT driving the business forward. Download the white paper Driving Efficiency and Savings with IT Asset Lifecycle Management to learn how to keep your uptime up and your downtime down.
Tags : it asset lifecycle management, asset failure
     Staples
By: Stratus Technologies     Published Date: Jun 04, 2009
Cloud computing allows companies to use IT resources as a service, taking advantage of shared applications, processing and storage managed within the cloud - either inside a private cloud at an internal data center, or in an external cloud at a service provider. Greater robustness of the virtualized servers supporting this new IT model will ensure a resilient cloud infrastructure capable of delivering "on-demand" access to users.
Tags : demand, stratus, cloud computing, virtualized, on demand, storage management, shared applications, cloud
     Stratus Technologies
By: Stratus Technologies     Published Date: Jan 31, 2017
he pursuits to reduce costs and avoid unplanned downtime remain primary operational goals in industrial plants. A convergence of factors has created an opportunity for industrial organizations such as manufacturing, oil and gas, chemicals and water treatment companies to aggressively pursue both. Although the pace of investment can be relatively slow in industrial automation (IA), technological advances, economic trends and market pressures have created an environment in which plants are compelled to modernize operational technology (OT) in order to ensure maximum efficiency and minimum process interruptions. Simply put, OT is getting old. The industrial sector is heavily capital-intensive and traditionally utilizes equipment with long lifecycles. Organizations with such outdated automation systems are in dire need of OT modernization to keep up with the pace of change, customer demands and business priorities, and reduce the risk of critical failures and costly downtime. Download th
Tags : stratus, performance improvements, downtime, operations, unplanned downtime, operational technology
     Stratus Technologies
By: StreamSets     Published Date: Sep 24, 2018
Imagine you’re running a factory but without a supply chain management system or industrial controls. Instead, you expect your customers to find and fix your delivery and quality problems. Sound ludicrous? Well, in many enterprises that’s the current “supply chain management” process for big and fast data. It relies on the lightly monitored dumping of unsanitized data into a data lake or cloud store, forcing data scientists and business users to deal with failures from data availability and accuracy issues.
Tags : dataflow, operations, factory, industrial
     StreamSets
By: Symantec.cloud     Published Date: May 11, 2012
Read When Good Backups Go Bad: Data Recovery Failures and What to Do About Them to understand backup challenges, impacts, and solutions. Don't let your business fall victim to downtime because of a computer or system failure.
Tags : symantec, cloud, backup, technology, system failure, recovery
     Symantec.cloud
By: The Starr Conspiracy     Published Date: Apr 03, 2017
The true failure points for HCM tech startups are less obvious than poor product quality or a lack of money. View our latest Lightpaper® for a breakdown of the patterns we witness time and time again that cause many startups to end up in the junk pile.
Tags : starr conspiracy, hcm, hr technology, startups
     The Starr Conspiracy
By: The Starr Conspiracy     Published Date: Sep 19, 2017
The true failure points for startups in the HCM tech segment are less obvious than a lack of money and poor product quality. Download our latest Lightpaper®, “Why HCM Tech Startups Fail,” and receive a breakdown of the patterns we have witnessed time and time again that cause many startups to lose their way and end up in the junk pile.
Tags : 
     The Starr Conspiracy
By: TIBCO Software     Published Date: Aug 15, 2018
Produced in collaboration with INFOPRO Digital with participation from Capgemini MAINTENANCE MADE EASY WITH THE HELP OF DATA Predictive maintenance involves gathering targeted data for analysis, the results of which will help anticipate potential failures before they occur. Companies opt for this type of maintenance to avoid predictable incidents and repair equipment, assembly lines, or machinery with minimum impact on their operations.
Tags : 
     TIBCO Software
By: TrendKite     Published Date: Apr 25, 2018
Sometimes a perfect storm comes together to signal a radical shift or rebirth of an industry. But it’s not enough to say public relations is in flux or rapidly changing. It’s more impactful to discuss the evolution of the change, understand the potential gaps, and be early to capitalize on opportunities created by these gaps. The path for change in the PR industry has been tumultuous. And understandably so. The irrationality of basing performance on vanity metrics is so ingrained in the profession that the left-brain, rational piece has been pushed aside. This has created a culture of estimating based on vanity metrics like AVE (ad value equivalency), leading to a dynamic where the C-suite craves that WSJ or TechCrunch story, yet doesn’t believe PR’s reporting on the value of that coverage. When everyone in the marketing stack is crunching numbers and showing real, tangible value, PR is holding onto air. Why keep setting the profession up for failure by perpetuating the cycle of abstr
Tags : ave, trendkite, marketing
     TrendKite
By: Tricentis     Published Date: Mar 13, 2018
In a case of “if you can’t measure it, you can’t manage it,” some software project failures occur because of a lack of traceability — that is, an incomplete record of documentation around software quality assurance efforts. The lack of traceability has a significant impact on QA testing effectiveness and meeting strategic goals. However, with optimal traceability, testing becomes more efficient and enables collaboration throughout the software development lifecycle, as well as between product owners and organization leaders.
Tags : 
     Tricentis
By: Tripp Lite     Published Date: Jun 28, 2018
One of the fundamental decisions in the design of data centers, server rooms and network closets is which uninterruptible power supply (UPS) systems to use. You cannot be certain that the power you receive from your local utility will be suitable for your equipment, or that it will always be available. And even when you are receiving good-quality power from the utility, equipment inside your facility (such as electric motors) can introduce power problems. A network/server UPS system conditions input power 24x7 to ensure that your equipment always receives reliable power and protection from damaging and disruptive power problems. A network/server UPS system also supports your equipment during power failures, providing enough battery backup runtime to outlast shorter outages. During longer outages, the UPS system will provide enough runtime to save files and gracefully shut down systems or to ensure that equipment is powered until standby generators are ready to support the load. Choosi
Tags : 
     Tripp Lite
By: Tripwire     Published Date: Nov 30, 1999
This paper covers the basic requirements of PCI, with a focus on the administrative and technical elements of the program. It also reviews the validation requirements of the standard and potential sanctions for failure to comply.
Tags : pci, pci compliance, payment card, credit card, credit cards, payment card industry, cisp, privacy
     Tripwire
By: Tripwire     Published Date: Jul 05, 2007
Learn about the validation requirements of the payment card industry's data security standard (PCI DSS), including administrative and technical elements of the program, and the potential sanctions for failure to comply.
Tags : pci, pci compliance, payment card, credit card, credit cards, payment card industry, cisp, privacy
     Tripwire
By: ttec     Published Date: Jul 24, 2019
One of the most significant areas of opportunity for contact center leaders to cut costs is to leverage customer service bots to deflect calls. But today’s consumers have little patience for conversational bots that can’t understand what they’re saying or don’t know how to provide an accurate answer.
Tags : 
     ttec
By: Veeam '18     Published Date: May 01, 2019
The digital revolution is transforming every industry. Yet it also brings new challenges: threats to the security and Availability of mission-critical data and services. Approximately 80% of IT decision-makers say their organization has an Availability gap, that is, a failure to meet recovery requirements—a common issue across all industries. 75% say they also have a data protection gap, meaning they are unable to protect their data frequently enough to ensure that business units’ expectations against data loss are being met.
Tags : 
     Veeam '18
By: Venafi     Published Date: Mar 26, 2015
Advanced Persistent Threat (APT) operators have proven they can breach enterprises like yours by undermining your critical security controls when you fail to protect digital certificates and cryptographic keys. Not securing all of your keys and certificates enables cybercriminals to bypass controls like threat detection, data protection, firewalls, VPNs, DLP, privileged access, and authentication systems that you expect will mitigate threats.
Tags : keys, certificates, security controls, apt, advances persistent threat, cryptographic keys, cybercriminals, cyber attacks
     Venafi
By: Venafi     Published Date: Aug 07, 2015
This paper reveals how not securing all of your keys and certificates enables cybercriminals to bypass controls like threat detection, data protection, firewalls, VPNs, DLP, privileged access, and authentication systems that you expect will mitigate threats.
Tags : security, protect keys, security controls, cyber-attacks, cybercriminals, threat detection, data protection, firewalls
     Venafi
By: Viavi Solutions     Published Date: Sep 30, 2016
IT today is more complex than ever. Public cloud, networks, storage systems, servers, and applications all combine to deliver today’s IT services. But how do you manage such a diverse and complex infrastructure? Can legacy tools help after this seismic shift? This document answers these questions and provides 20 tools you need to deliver services in this new hybrid IT world. Today’s IT environment provides greater promise than ever before. New technologies are driving new capabilities and even more opportunities to differentiate. The opportunity for innovation has never been greater: faster compute, more storage, and new applications all working together to drive greater efficiency and greater power. But this wave of innovations has also added greater complexity since one failure in this increasingly complex IT stack means a failure of the entire service. New consumer-focused cloud based applications are setting a high standard—nearly 100% up time with peak performance all while IT.
Tags : 
     Viavi Solutions
By: Vindicia     Published Date: Sep 23, 2014
Vindicia has witnessed numerous best practices working with innovative digital businesses and noticed that companies that communicate the most effectively tend to follow three key practices consistently. This ebook give you three essential communication practices.
Tags : communication lifecycle, social network, communication practices, recurring billing, customer communication, consumers, digital goods, promotional offers
     Vindicia
By: Visier     Published Date: Nov 04, 2014
With workforce analytics, HR professionals can play a more pivotal role in their organizations to help direct senior management and hiring managers in connecting the dots between their company’s overall performance and their investment in their workforce. Workforce analytics empower HR professionals to shift from being an operational function to becoming more of a strategic role within their organization. Workforce analytics uncovers deep insights into workforce data by drilling down into the data and highlighting both patterns of success to be repeated and patterns of failure that could lead to risk and impact. Go from intuition- to fact-based workforce decision-making with this comprehensive guide to workforce analytics. This eBook includes advice on how to get started, tips to ensure successful implementation, and key recommendations for finding the right solution
Tags : visier, workforce analytics, hr metrics, planning
     Visier
By: Vision Solutions     Published Date: Jun 10, 2009
Journaling? RAID? Vaulting? Mirroring? High availability? Know your data protection and recovery options! Download this information-packed 29-page report that reviews the spectrum of IBM i (i5/OS) and AIX resilience and recovery technologies and best practices choices, including the latest, next-generation solutions.
Tags : aix, i5/os, vision, resilience, recovery, recovery solutions, os/400, ibm i
     Vision Solutions
By: Vision Solutions     Published Date: Jun 10, 2009
For IT departments looking to bring their AIX environments up to the next step in data protection, IBM’s PowerHA (HACMP) connects multiple servers to shared storage via clustering. This offers automatic recovery of applications and system resources if a failure occurs with the primary server.
Tags : aix, i5/os, vision, resilience, recovery, recovery solutions, os/400, ibm i
     Vision Solutions
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics