RSS feed Get our RSS feed

News by Topic

failure

Results 126 - 150 of 288Sort Results By: Published Date | Title | Company Name
By: Backupify     Published Date: Jul 15, 2013
The data that resides within Salesforce.com is arguably some of an organization’s most valuable data for all current and future revenue – including contacts, purchase history, lead information, reports on prospects, sales quotes, signed contracts, and customer invoices. Salesforce has a robust data center and the infrastructure to protect your data from hardware failure, even on a catastrophic scale. However, it does not protect you from user error or data being overwritten.
Tags : roi, salesforce, backup, calculate, data center
     Backupify
By: Dell Cloud Marketplace     Published Date: Jan 07, 2015
This report will help CIOs, application architects, and IT decision-makers identify common patterns of implementation failures and successes and provide a framework for evaluating multi-cloud environments.
Tags : dell, cloud strategy, cloud computing, cloud services, application infrastructure, application architecture
     Dell Cloud Marketplace
By: Jive Software     Published Date: Dec 02, 2014
Customer interactions today span multiple touch-points. As such, businesses are constantly seeking ways to adapt their activities to interact with buyers through the most relevant channels. While this pursuit helps firms better connect with clients, it also means capturing data related to different views / parts of the customer journey. Failure to connect these pieces results in disconnected customer messaging. Watch this webinar today to learn how social collaboration tools help companies overcome this challenge.
Tags : customer interactions, customer data, social collaboration, emerging marketing, social media, crm & customer care
     Jive Software
By: Infoblox     Published Date: Sep 09, 2014
By enhancing DNS services provided to Active Directory (AD), IT organizations see immediate benefits in performance, speed, and accuracy of data across DNS and AD. Read this white paper to learn how to transform your Microsoft environment today.
Tags : infoblox_dns_dhcp_ipam, infoblox_ddi, infoblox_dns, infoblox_ipam, infoblox_dhcp, infoblox_ip_address_management, dhs_dhcp_ipam, dns
     Infoblox
By: VMware     Published Date: May 02, 2011
The cost of downtime and/or lost data can be devastating. For this reason, business continuity and disaster recovery (BC/DR) is becoming a critical mandate. Virtualization can keep your business running through many types of planned and unplanned IT outages. Download this white paper to learn more.
Tags : smb, vmware, virtualization, business continuity, disaster re vsphere, downtime, it failure, vms
     VMware
By: Magento     Published Date: Mar 28, 2018
International retail sales are expected to increase by 5.5% to $28.3 trillion by 2018. launching an international site can take up valuable time and resources, and missteps can be costly. From web page layout, to word definitions and cultural preferences, countries have widely varying practices and unique online user behaviors. How efficiently you manage changes in culture, language, customs, currency, tax, and laws can make the difference between success and failure. POWER YOUR BUSINESS TO EXPAND RAPIDLY INTO FOREIGN MARKETS: Think Local and Flexible to Act Global Communicate in Other Cultures Design a Flexible and Scalable Global Process Efficiently Manage Multiple International Sites
Tags : international, markets, company, globally, competition
     Magento
By: HP     Published Date: Oct 22, 2008
The importance of data processing in today’s business environment is increasing and it is clear that business operations must be secured against every possible contingency to provide continuous uptime. Business continuity is not just concerned with IT infrastructure and data processing, it also includes manual and automatic IT systems with the human involvement. This white paper explains how HP StorageWorks XP for Business Continuity Manager (BCM) Software makes sure that all processes within the data-handling procedures are automated in such a way that in the event of a failure or unplanned disruption, business operations can continue with minimal interruption.
Tags : disaster proof, 4aa1-0140enw, bcm, business continuity manager, storageworks, xp10000 disk array, xp12000 disk array, wwenterprise
     HP
By: Hewlett Packard Enterprise     Published Date: Oct 24, 2017
Security is a looming issue for organizations. The threat landscape is increasing, and attacks are becoming more sophisticated. Emerging technologies like IoT, mobility, and hybrid IT environments now open new organization opportunity, but they also introduce new risk. Protecting servers at the software level is no longer enough. Organizations need to reach down into the physical system level to stay ahead of threats. With today’s increasing regulatory landscape, compliance is more critical for both increasing security and reducing the cost of compliance failures. With these pieces being so critical, it is important to bring new levels of hardware protection and drive security all the way down to the supply chain level. Hewlett Packard Enterprise (HPE) has a strategy to deliver this through its unique server firmware protection, detection, and recovery capabilities, as well as its HPE Security Assurance.
Tags : cloud optimization, cloud efficiency, cloud management, cloud assurance, cloud visibility, enterprise management, data management
     Hewlett Packard Enterprise
By: Hewlett Packard Enterprise     Published Date: May 11, 2018
Security is a looming issue for businesses. The threat landscape is increasing, and attacks are becoming more sophisticated. Emerging technologies like IoT, mobility, and hybrid IT environments now open new business opportunity, but they also introduce new risk. Protecting servers at the software level is no longer enough. Businesses need to reach down into the physical system level to stay ahead of threats. With today’s increasing regulatory landscape, compliance is more critical for both increasing security and reducing the cost of compliance failures. With these pieces being so critical, it is important to bring new levels of hardware protection and drive security all the way down to the supply chain level. Hewlett Packard Enterprise (HPE) has a strategy to deliver this through its unique server firmware protection, detection, and recovery capabilities, as well as its HPE Security Assurance.
Tags : 
     Hewlett Packard Enterprise
By: Group M_IBM Q2'19     Published Date: May 31, 2019
In the Garage, you work side by side with IBM experts to create first-of-a-kind MVPs, experiment with emerging technologies and quickly learn from failures. In this webinar hear from Ed Forman, Partner of Cognitive Process Transformation at IBM. Ed has partnered with organizations across industries including automotive, life sciences, financial services and telecommunications. In his work with the IBM Garage he has helped shape an award-winning method for innovation that has transformed business models for Fortune 500 clients. Listen to this 30-minute presentation to find out more.
Tags : 
     Group M_IBM Q2'19
By: Group M_IBM Q3'19     Published Date: Aug 13, 2019
In the Garage, you work side by side with IBM experts to create first-of-a-kind MVPs, experiment with emerging technologies and quickly learn from failures. In this webinar hear from Ed Forman, Partner of Cognitive Process Transformation at IBM. Ed has partnered with organizations across industries including automotive, life sciences, financial services and telecommunications. In his work with the IBM Garage he has helped shape an award-winning method for innovation that has transformed business models for Fortune 500 clients. Listen to this 30-minute presentation to find out more.
Tags : 
     Group M_IBM Q3'19
By: Group M_IBM Q3'19     Published Date: Aug 13, 2019
In the Garage, you work side by side with IBM experts to create first-of-a-kind MVPs, experiment with emerging technologies and quickly learn from failures. In this webinar hear from Ed Forman, Partner of Cognitive Process Transformation at IBM. Ed has partnered with organizations across industries including automotive, life sciences, financial services and telecommunications. In his work with the IBM Garage he has helped shape an award-winning method for innovation that has transformed business models for Fortune 500 clients. Listen to this 30-minute presentation to find out more.
Tags : 
     Group M_IBM Q3'19
By: IBM     Published Date: Jun 19, 2008
Discover the high performance, flexibility and extreme availability of IBM System x3550 Express rack-mount server. IBM PowerExecutive software manages energy usage to keep costs and heat output down. And advanced predictive failure analysis and Light Path Diagnostics keep you up and running, reduce down time and service costs. Watch this video demo of the IBM System x3550 Express to see how it compares to competitive products and how it can bring savings, power and reliability to your business.
Tags : ibm, express seller, system x, server
     IBM
By: Solidcore     Published Date: Jan 07, 2008
Identifying critical change control failure points in your infrastructure can help reduce the threat of costly downtime, potential security breaches, and compliance weaknesses. Read this paper for guidelines on how to identify and categorize systems that have characteristics which heighten risk.
Tags : audit, auditing, security audit, vulnerabilities, vulnerability, vulnerability management, security management, change management
     Solidcore
By: VMware     Published Date: Feb 20, 2009
According to the National Archives and Records Administration, 93 percent of companies that lost their data center for 10 days or more due to a disaster filed for bankruptcy within one year of the disaster. Don't let that happen to you, learn more today!
Tags : vmware, vmware virtualization, business continuity, it infrastructure, vmware esx platform, distributed resource scheduler, drs, recovery infrastructure
     VMware
By: Genpact     Published Date: Jul 30, 2012
A global transportation company was challenged with high contract cost due to frequent part failures. Genpact implements the right Failure forecast modeling technique to reduce overall part consumption by ~43% till the life of the contract.
Tags : failure forecasting, customer contract management, transportation
     Genpact
By: Polycom     Published Date: Jun 29, 2017
Law firms are under increasing pressure to respond quickly – often within hours – to client demands. Failure to increase agility can result in costly client churn, but law firms are often ill-equipped to be so nimble. As a result, it may be time to consider a technology that has been proven integral to law firms around the world - video collaboration. In under 30 minutes, we'll explain: Common use cases for video collaboration - going way beyond team meetings to the tasks at the heart of practicing law The types of solutions deployed - if you think an expensive, wall-mounted, on premise solution is your only option, you may be surprised by what's available From the meeting room to the courtroom - hear how a this technology is proliferating the courtroom and how the best lawyers will be equipped to take full advantage
Tags : video collaboration, law technology, client satisfaction, response time
     Polycom
By: Quocirca     Published Date: Jan 11, 2008
Small and medium-sized businesses (SMBs) can benefit from the expansive use of information technology (IT) just as much as their larger counterparts. Indeed, in many cases they have to, because to trade they need to interact with business partners of all sizes and IT failure affects not just internal users but those of third parties.
Tags : insight report, quocirca, smb, small business, soho, mid-sized business, smbs, data security
     Quocirca
By: Gigamon     Published Date: Dec 13, 2018
Stop deploying cyberthreat prevention tools in detection mode. Get “Scaling Inline Threat Prevention Tools” to learn the benefits of an inline bypass architecture. Learn how inline bypass removes failure points by automatically distributing traffic to the right security tools, keeping both traffic and protection up and running. Discover how you can add, remove, and upgrade security tools at the speed of your network to maximize threat prevention, security resilience, and network uptime. Get the paper.
Tags : 
     Gigamon
By: Gigamon     Published Date: Mar 26, 2019
Stop deploying cyberthreat prevention tools in detection mode. Get “Scaling Inline Threat Prevention Tools” to learn the benefits of an inline bypass architecture. Learn how inline bypass removes failure points by automatically distributing traffic to the right security tools, keeping both traffic and protection up and running. Discover how you can add, remove, and upgrade security tools at the speed of your network to maximize threat prevention, security resilience, and network uptime. Get the paper.
Tags : 
     Gigamon
By: Gigamon     Published Date: Jun 10, 2019
Stop deploying cyberthreat prevention tools in detection mode. Get “Scaling Inline Threat Prevention Tools” to learn the benefits of an inline bypass architecture. Learn how inline bypass removes failure points by automatically distributing traffic to the right security tools, keeping both traffic and protection up and running. Discover how you can add, remove, and upgrade security tools at the speed of your network to maximize threat prevention, security resilience, and network uptime. Get the paper. 
Tags : 
     Gigamon
By: Gigamon     Published Date: Feb 20, 2019
Stop deploying cyberthreat prevention tools in detection mode. Get “Scaling Inline Threat Prevention Tools” to learn the benefits of an inline bypass architecture. Learn how inline bypass removes failure points by automatically distributing traffic to the right security tools, keeping both traffic and protection up and running. Discover how you can add, remove, and upgrade security tools at the speed of your network to maximize threat prevention, security resilience, and network uptime. Get the paper.
Tags : 
     Gigamon
By: SQC     Published Date: Oct 14, 2010
This paper describes why slow system integration is a major cause of project failure, why it happens and how to organize and prepare to avoid suffering the same fate.
Tags : software delivery, software management, integration, software integration testing, system integration
     SQC
By: Staples     Published Date: May 24, 2016
Your company wouldn’t be the same without the right IT strategy. You know it, and they know it. Protecting your infrastructure from failure should be a top priority — not just to prevent catastrophes, but to keep IT driving the business forward. Download the white paper Driving Efficiency and Savings with IT Asset Lifecycle Management to learn how to keep your uptime up and your downtime down.
Tags : it asset lifecycle management, asset failure
     Staples
By: Progress Software BTA Telecommunications     Published Date: Apr 09, 2009
Did you know that 61 telcos worldwide reported a loss of up to 10% of revenue due to order fallout? Why is this happening? How else is order fallout affecting companies? This report by Vanson Bourne, an independent research firm, examines the scope and nature of the problem. Business transaction assurance-making sure orders process successfully-may seem simple but it isn't. Learn about the challenges that telecommunications experts face and why current monitoring and management systems can't do the job.
Tags : progress software, telecommunications, telcos, telecom, business transaction, vanson, transaction failure
     Progress Software BTA Telecommunications
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics