RSS feed Get our RSS feed

News by Topic

failure

Results 151 - 175 of 288Sort Results By: Published Date | Title | Company Name
By: Group M_IBM Q1'18     Published Date: Feb 15, 2018
IBM SPSS predictive analytics solutions help uncover key predictors that lead to online student success or failure. Identifying specific issues early, target intervention measures for at-risk students, and take the appropriate steps to help improve online student graduation rates.
Tags : online education, online students, graduation rates, spss
     Group M_IBM Q1'18
By: New Relic     Published Date: Sep 17, 2014
So you’re ready to plunge headlong into DevOps. Right on! You’ve done your homework, and you realize that in order to keep up with the rapid pace of business today, you need to implement DevOps practices at your organization. Yet despite the obvious benefits, such as faster deployments and fewer failures, the rest of your organization may not be so enthusiastic. This eBook will help you familiarize yourself with the common barriers to DevOps adoption so that you can come up with ways to win over the skeptics—and get your organization’s DevOps movement rolling.
Tags : devops, benefits, deployments and fewer failures, successful transition, common barriers, devops implementation
     New Relic
By: CloudEndure     Published Date: Oct 12, 2018
Maintaining business continuity is your highest priority. In today’s commercial landscape, business continuity depends on the efficient, uninterrupted flow of data across the organization – from operations to sales to fulfillment. Even a brief lapse in workload continuity can mean thousands of lost sales opportunities, disruption to production, and compromised customer trust. The causes of those lapses can range from natural disasters to mechanical failure or human error. You need a data platform and a proactive disaster recovery (DR) strategy that will help you stay up and running in the event that your physical infrastructure is unavailable for any length of time. BUSINESS CONTINUITY Fulfilling orders, providing a high level of customer service, and keeping consumers engaged all depend on the efficient, uninterrupted flow of data throughout your organization. CUSTOMER TRUST Above all, protecting customer data—especially personally identifiable information (PII) —is critical
Tags : 
     CloudEndure
By: Group M_IBM Q119     Published Date: Mar 04, 2019
The convergence between new technologies - like AI, blockchain, intelligent sensors, and edge computing - have the potential to disrupt, transform and streamline traditional supply chain operations. Join Supply Chain experts to learn: - Successes and failures of manufacturer’s to-date - Tips for selecting the best use case for your business - Industry best-practices for applying AI and blockchain
Tags : 
     Group M_IBM Q119
By: CA Technologies     Published Date: Feb 13, 2015
For the managed services provider (MSP), service desk capabilities play a critical role in the level of service that customers receive and in the degree to which those services are delivered efficiently and profitably. In short, the service desk can make the difference between a service provider’s success or failure. This paper offers some key principles MSPs should adopt in order to ensure their service desk fully supports operational efficiency, optimal service levels and business growth.
Tags : service desk, customer service, msp business, service providers
     CA Technologies
By: Nokia     Published Date: Sep 18, 2018
This paper examines the benefits of using advanced machine learning models in predictive maintenance software for asset management of Power Utilities.
Tags : machine learning, nokia, asset management, power & energy, power asset management, energy asset management, substation, electrical substation
     Nokia
By: IBM     Published Date: Dec 02, 2014
In a recent Aberdeen Group Analyst Insight report,1 Asset Management: The Changing Landscape of Predictive Maintenance, a survey of executives states that the number one risk to operations was failure of their critical physical assets —ensuring that they are available, reliable and performing as originally intended. Though, such a risk can become an opportunity. Top-performing companies rely on analytics related to maintenance, safety and replacement equipment to plan for capital expenditures, manage their assets on a daily basis and maximize asset performance.
Tags : asset productivity, operational performance, predictive maintenance, operational costs
     IBM
By: Globalscape     Published Date: Mar 21, 2014
This whitepaper provides guidance on common high-availability and scale-out deployment architectures, and discusses the factors to consider for your specific business environment. Three basic models are described for deploying an on-site managed file transfer (MFT) solution. The attributes of each option are described; each has pros and cons and offers a different balance of cost, complexity, availability, and scalability. The paper explains that, no matter how reliable each model is, any deployment can experience outages. The recommendation is to use clustering services to protect your data when the inevitable hardware, software, or network failures occur.
Tags : clustering, uptime, failover, mft, network failure, high volume, scale-out configuration, sla
     Globalscape
By: CompareERP.com     Published Date: Jun 24, 2009
ERP failure is a very real concern for companies of all sizes. Our buying checklist helps you avoid common ERP mistakes. You learn how to buy the right system for your needs, how to negotiate a great deal, experience a smooth implementation and gain user acceptance. Learn more today!
Tags : erp, midmarket, assessment, vendor, demo, trial, compare erp, enterprise resource planning
     CompareERP.com
By: Inovis     Published Date: Aug 06, 2007
The challenges presented by multiple Value-Added Networks (VANs) and managing diverse trading partners create barriers to the efficiencies promised by EDI. Multiple providers mean multiple points of failure with no one entity to hold accountable. Also, as trading communities grow, end-to-end supply chain visibility becomes an essential operational requirement.
Tags : van, vans, value added, value-added, value added, edi, electronic data interchange, scm
     Inovis
By: AtTask     Published Date: Feb 11, 2012
To protect their investment in a project, an organization needs to engage in a three step process to put a reasonable and viable risk management plan in place. This free guide walks you through the process.
Tags : project risk management, risk management tools, it project risk management, enterprise risk management, risk management plan, business risk management
     AtTask
By: Active Power     Published Date: Nov 17, 2014
This paper provides a quantitative analysis of the in-service reliability of Active Power’s CleanSource 750HD UPS (uninterruptible power supply) system versus a double-conversion UPS with batteries.
Tags : active power, data center power, data center batteries, power and cooling, energy, data center energy, power source
     Active Power
By: Applause Israel     Published Date: Jun 19, 2018
obile Payments have emerged as a catalyst for transactions across all markets. In underdeveloped markets, mobile payment technology is enabling businesses to sell products and services to consumers that had previously been out of reach. In developed markets, it has made the process of purchasing products and services even simpler. PayPal, one of the most popular digital payment solutions on the market, facilitated $66 billion in payment volume throughout 2015, and now has 188 million active registered user accounts across the US. Furthermore, Statista projects that mobile payments will account for more than $210 billion in transactions by 2019. Mobile payment technology is a step forward in the process of connecting businesses to the people they are serving. However, some merchants will find themselves miles behind their competitors by the time the transition to mobile payments is complete. The reason? A failure to implement the correct mobile payment strategy. An ever-increasing numbe
Tags : 
     Applause Israel
By: Asentria Corporation     Published Date: Sep 04, 2007
More than ever before, IT managers need to secure equipment and facilities against a variety of intrusive conditions that could cripple critical operations, resulting in system malfunctions, loss of data or intellectual property, damage to mission critical hardware or even theft of valuable physical assets. Such conditions often include environmental events, failure of air conditioning systems, power outages, and untoward human actions.
Tags : telecom alarms, snmp traps, remote site managers, terminal servers, remote access, snmp monitoring, snmp, contact closures
     Asentria Corporation
By: Dell Storage     Published Date: Jan 16, 2009
Most storage devices support multiple SAN connections for performance and reliability, but in many configurations servers use only a single storage connection. This creates a single point of failure and potential performance bottleneck for I/O. Multipath Input/Output (MPIO) is server software that extends redundancy to the entire I/O pathway in a SAN, delivering fault tolerance, high availability, and better performance.
Tags : dell, san connections, storage area networks, configuration servers, mpio, multipath input/output, storage
     Dell Storage
By: Clicktale     Published Date: Oct 14, 2015
As marketers, we rely on metrics to measure our success or failure. But how effective are traditional analytics? When metrics can’t see beyond the mouse click, how can we understand what the people behind the screen are experiencing? How can we know what happened before the click, or what happens after? ClickTale’s newest eBook will show you how Digital Customer Experience metrics help you look past the numbers, and understand what your customers and visitors are really experiencing on your website. Download Digital Customer Experience Metrics: Uncovering the Behavior behind the Numbers now, and start turning metrics into actionable understanding!
Tags : engagement metrics, engagement optimization, website optimization, web analytics, website analytics, website engagement, user experience, user interface
     Clicktale
By: Vision Solutions     Published Date: Jun 10, 2009
Journaling? RAID? Vaulting? Mirroring? High availability? Know your data protection and recovery options! Download this information-packed 29-page report that reviews the spectrum of IBM i (i5/OS) and AIX resilience and recovery technologies and best practices choices, including the latest, next-generation solutions.
Tags : aix, i5/os, vision, resilience, recovery, recovery solutions, os/400, ibm i
     Vision Solutions
By: Oracle + Dyn     Published Date: Jun 27, 2017
"Today's internet-dependent business landscape demands frequent system changes, higher throughput and increased reliability. If your new features and fixes do not hit the digital market quickly, user experience, customer retention and revenue all take a hit. DNS however, is a tool that can be used to both mitigate problems and optimize the performance and delivery of these systems. Read the latest O'Reilly book to understand how the DevOps approach combined with the fundamentals of DNS can: • Use DNS as a means of distribution, deployment and high-availability • Mitigate failure and minimize risk • Improve system reliability and management Get the O'Reilly Book! "
Tags : 
     Oracle + Dyn
By: Prophix     Published Date: Jun 03, 2016
Prophix and IMA hosted a webcast, titled “Overcoming Barriers to Implement CPM Methods”, featuring subject matter expert Gary Cokins, the CEO, at Analytics-Based Performance Management. The adoption rate of business analytics and corporate performance management (CPM) methods has been slowed by various barriers. Gary Cokins outlines the causes of this lag, as well as lessons learned about how to overcome obstacles, and obtain buy-in to manage and improve performance. He describes techniques such as strategy maps, balanced scorecards with key performance indicators (KPIs), channel and customer profitability reporting, and driver-based budgeting that can prevent failure when implementing CPM methods.
Tags : prophix, best practices, performance management, business analytics, productivity
     Prophix
By: Workforce Software     Published Date: Jun 04, 2015
In the case of a technology project seeking to hit its mark—from staying on budget to achieving the desired results—these failures can be traced back to shortcomings in how the human element of the project was managed. Download to learn more!
Tags : workforce software, workforce management, pay slip, government regulations, compliance, labour regulations
     Workforce Software
By: Dyn     Published Date: Jul 29, 2015
In this O'Reilly report, author Andy Still points out: • How the advantages of using cloud-based systems outweigh the disadvantages • How you can closely monitor system elements that you don’t control, with Real User Monitoring (RUM) and other tools • How to use a CDN and cache data as close to users as possible • How to architect your systems to gracefully handle potential cloud service failures
Tags : optimization, cloud, infrastructure, web operations, cloud migration, real user monitoring, cdn, cloud service failures
     Dyn
By: HP - Enterprise     Published Date: Oct 16, 2008
If your company stores or processes credit card information, you must be able to demonstrate compliance with the Payment Card Industry (PCI) Data Security Standards (DSS). These standards include requirements for security management, policies, procedures, network architecture, design, and other critical protective measures. They also include one very prescriptive requirement:  Section 6.6 mandates that organizations secure all Web applications by conducting a code review or installing an application layer firewall. Companies have had a very difficult time passing the other parts of Section 6 and they have experienced a rising number of data breaches. Unless companies take 6.6 seriously, PCI compliance failure rates, and data breaches, will continue to grow.  Read this whitepaper to gain an overview of best practices to pass Section 6.6 and an understanding of the technology available to you.
Tags : business risk, security, application security, audit, risk, vulnerabilities, fortify, fortify software
     HP - Enterprise
By: Tripwire     Published Date: Nov 30, 1999
This paper covers the basic requirements of PCI, with a focus on the administrative and technical elements of the program. It also reviews the validation requirements of the standard and potential sanctions for failure to comply.
Tags : pci, pci compliance, payment card, credit card, credit cards, payment card industry, cisp, privacy
     Tripwire
By: MarkLogic     Published Date: Nov 08, 2016
Your high-stakes data projects don’t have to end – as analysts predict – in failure. Don’t just rely on legacy technology and outdated thinking - the key is to start your next data project armed with the right technology and mindset to succeed. Download now to learn more.
Tags : 
     MarkLogic
By: MarkLogic     Published Date: Jun 09, 2017
Your high-stakes data projects don’t have to end – as analysts predict – in failure. Don’t just rely on legacy technology and outdated thinking - the key is to start your next data project armed with the right technology and mindset to succeed. This paper will give you insights and guidelines to help you learn how to leverage all of your data to reach your data integration objectives with less time and expense than you might imagine. Change is good, and in this paper we’ll give you real-world examples of organizations that embraced change and found success.
Tags : 
     MarkLogic
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics