RSS feed Get our RSS feed

News by Topic

failure

Results 101 - 125 of 285Sort Results By: Published Date | Title | Company Name
By: Google Analytics 360 Suite     Published Date: Jul 27, 2017
Most companies have a few people who are testers and optimizers by nature, interest, or experience. But what really moves the dial is when everyone in the company embraces a test-and-learn approach to improving the customer experience across all touchpoints. Why is the test-and-learn approach so effective? When you test everything, your team values data over opinions. Everyone keeps learning — even from failures. The results? More visitors, more sales, happier customers, and a healthier bottom line. To help you get there, this guide provides insights on: What constitutes a culture of growth and optimization Tips for building that culture in your own company Lessons from marketing leaders who embrace the test-and-learn approach
Tags : 
     Google Analytics 360 Suite
By: Google Analytics 360 Suite     Published Date: Jul 28, 2017
Most companies have a few people who are testers and optimizers by nature, interest, or experience. But what really moves the dial is when everyone in the company embraces a test-and-learn approach to improving the customer experience across all touchpoints. Why is the test-and-learn approach so effective? When you test everything, your team values data over opinions. Everyone keeps learning — even from failures. The results? More visitors, more sales, happier customers, and a healthier bottom line. To help you get there, this guide provides insights on: What constitutes a culture of growth and optimization Tips for building that culture in your own company Lessons from marketing leaders who embrace the test-and-learn approach
Tags : 
     Google Analytics 360 Suite
By: Group M_IBM Q1'18     Published Date: Feb 15, 2018
IBM SPSS predictive analytics solutions help uncover key predictors that lead to online student success or failure. Identifying specific issues early, target intervention measures for at-risk students, and take the appropriate steps to help improve online student graduation rates.
Tags : online education, online students, graduation rates, spss
     Group M_IBM Q1'18
By: Group M_IBM Q119     Published Date: Mar 04, 2019
The convergence between new technologies - like AI, blockchain, intelligent sensors, and edge computing - have the potential to disrupt, transform and streamline traditional supply chain operations. Join Supply Chain experts to learn: - Successes and failures of manufacturer’s to-date - Tips for selecting the best use case for your business - Industry best-practices for applying AI and blockchain
Tags : 
     Group M_IBM Q119
By: Group M_IBM Q2'19     Published Date: May 31, 2019
In the Garage, you work side by side with IBM experts to create first-of-a-kind MVPs, experiment with emerging technologies and quickly learn from failures. In this webinar hear from Ed Forman, Partner of Cognitive Process Transformation at IBM. Ed has partnered with organizations across industries including automotive, life sciences, financial services and telecommunications. In his work with the IBM Garage he has helped shape an award-winning method for innovation that has transformed business models for Fortune 500 clients. Listen to this 30-minute presentation to find out more.
Tags : 
     Group M_IBM Q2'19
By: Group M_IBM Q3'19     Published Date: Jun 25, 2019
In the Garage, you work side by side with IBM experts to create first-of-a-kind MVPs, experiment with emerging technologies and quickly learn from failures. In this webinar hear from Ed Forman, Partner of Cognitive Process Transformation at IBM. Ed has partnered with organizations across industries including automotive, life sciences, financial services and telecommunications. In his work with the IBM Garage he has helped shape an award-winning method for innovation that has transformed business models for Fortune 500 clients. Listen to this 30-minute presentation to find out more.
Tags : 
     Group M_IBM Q3'19
By: Hayes, Inc.     Published Date: Feb 22, 2017
Struggling with physician buy-in? Failure is not an option when it comes to physician engagement. Yet many supply chain and value analysis professionals say they’re doing just that. Take a humorous look at the possible causes for failing to create physician buy-in and see how evidence helps you create actionable solutions In this eBook, you'll receive such "bad advice" as: • Making decisions without involving clinicians • Working in silos • Being resistant to change Prepare to succeed at physician engagement…by learning how to fail!
Tags : 
     Hayes, Inc.
By: Hewlett Packard Enterprise     Published Date: Oct 24, 2017
Security is a looming issue for organizations. The threat landscape is increasing, and attacks are becoming more sophisticated. Emerging technologies like IoT, mobility, and hybrid IT environments now open new organization opportunity, but they also introduce new risk. Protecting servers at the software level is no longer enough. Organizations need to reach down into the physical system level to stay ahead of threats. With today’s increasing regulatory landscape, compliance is more critical for both increasing security and reducing the cost of compliance failures. With these pieces being so critical, it is important to bring new levels of hardware protection and drive security all the way down to the supply chain level. Hewlett Packard Enterprise (HPE) has a strategy to deliver this through its unique server firmware protection, detection, and recovery capabilities, as well as its HPE Security Assurance.
Tags : cloud optimization, cloud efficiency, cloud management, cloud assurance, cloud visibility, enterprise management, data management
     Hewlett Packard Enterprise
By: Hewlett Packard Enterprise     Published Date: May 11, 2018
Security is a looming issue for businesses. The threat landscape is increasing, and attacks are becoming more sophisticated. Emerging technologies like IoT, mobility, and hybrid IT environments now open new business opportunity, but they also introduce new risk. Protecting servers at the software level is no longer enough. Businesses need to reach down into the physical system level to stay ahead of threats. With today’s increasing regulatory landscape, compliance is more critical for both increasing security and reducing the cost of compliance failures. With these pieces being so critical, it is important to bring new levels of hardware protection and drive security all the way down to the supply chain level. Hewlett Packard Enterprise (HPE) has a strategy to deliver this through its unique server firmware protection, detection, and recovery capabilities, as well as its HPE Security Assurance.
Tags : 
     Hewlett Packard Enterprise
By: Hewlett-Packard     Published Date: Aug 02, 2013
Every data center IT manager must constantly deal with certain practical constraints such as time, complexity, reliability, maintainability, space, compatibility, and money. The challenge is that business application demands on computing technology often don’t cooperate with these constraints. A day is lost due to a software incompatibility introduced during an upgrade, hours are lost tracing cables to see where they go, money is spent replacing an unexpected hardware failure, and so on. Day in and day out, these sorts of interruptions burden data center productivity. Sometimes, it’s possible to temporarily improve the situation by upgrading to newer technology. Faster network bandwidth and storage media can reduce the time it takes to make backups. Faster processors — with multiple cores and larger memory address space — make it possible to practically manage virtual machines.
Tags : bladesystem, blade, infrastructure, blade infrastructure
     Hewlett-Packard
By: HireRight     Published Date: May 01, 2013
There are a number of reasons why shrewd staffing agencies run background checks on potential employees before inviting them in to their business and, in turn, into their customers’ businesses. Background screening may be required by law for certain placements and industries, or, the customer may require screening. In all instances, failure to properly screen employees can have serious business and financial consequences. This industry brief outlines the risks that can arise from bad hires and how careful background screening can help mitigate those risks.
Tags : staffing, hireright, human resources, hr department, clients, potential employees
     HireRight
By: HireRight     Published Date: May 01, 2013
Franchise owners have the benefit of brand recognition and a proven business model and plan. It is up to you, as a franchisee, to make your location successful and this success lies heavily on the staff you hire. Background screening may be required by law for certain franchise employees, depending upon the nature of the business. In all instances, failure to properly screen employees can have serious business and financial consequences. This industry brief outlines the risks that arise from bad hires and how careful background screening can help mitigate those risks.
Tags : hireright, human resources, hr department, investments, properly screen employees, franchise owners
     HireRight
By: HireRight     Published Date: May 01, 2013
Do no harm and help heal are some of the top responsibilities for health care providers. The first step in meeting these requirements is to make sure your employees are worthy of your trust and that of your patients. Background screening is required by law for health care providers in many instances. In all instances, failure to properly screen health care employees can have serious business and financial consequences. This industry brief outlines the risks that arise from bad hires and how careful background screening can help mitigate those risks.
Tags : background screening, health care providers, responsibilities, hireright, risks of bad hires
     HireRight
By: HP     Published Date: Jun 23, 2008
HP StorageWorks XP Disk Arrays are enterprise-class storage systems that deliver dependable performance for environments where downtime is not an option. Complete redundancy throughout the architecture provides non-disruptive online upgrades and no single point of failure so you can count on your data being available.
Tags : disaster proof, hp disaster proof, disaster-proof, disk array, storageworks, storage
     HP
By: HP     Published Date: Oct 22, 2008
The importance of data processing in today’s business environment is increasing and it is clear that business operations must be secured against every possible contingency to provide continuous uptime. Business continuity is not just concerned with IT infrastructure and data processing, it also includes manual and automatic IT systems with the human involvement. This white paper explains how HP StorageWorks XP for Business Continuity Manager (BCM) Software makes sure that all processes within the data-handling procedures are automated in such a way that in the event of a failure or unplanned disruption, business operations can continue with minimal interruption.
Tags : disaster proof, 4aa1-0140enw, bcm, business continuity manager, storageworks, xp10000 disk array, xp12000 disk array, wwenterprise
     HP
By: HP     Published Date: May 14, 2014
Your data is everywhere. It’s in the cloud, in virtual environments, in remote offices, and on mobile devices. Plus, there’s more of it, and much of it is business-critical, meaning you need to back up larger volumes of data than ever before without adding costs or bandwidth. Even more importantly, you need the ability to restore data quickly in the event of a disaster, failure, outage. The cost of data protection is higher now more than ever.
Tags : hewlett packard, cloud, mobile, remote, data recovery, disaster, failure
     HP
By: HP     Published Date: Dec 05, 2014
Do you have your arms around your Windows Server 2003 migration? Sure, your team has probably headed up countless maintenance initiatives in the past - upgrades, refreshes, migrations. But if you make the mistake of thinking your Windows Server 2003 migration is more of the same, you will lose on two fronts. First, you will underestimate the complexity of the effort, thus increasing the chance of failure by overrunning timeline and budget. More importantly, you will miss the opportunity to bring value to your business. This paper introduces five considerations that will change your perspective on the Windows Server migration initiative - and spur technical, finance and line of business employees to jump on board.
Tags : server, performance, efficiency, application, infrastructure, information technology, mobility, cloud
     HP
By: HP     Published Date: Mar 31, 2015
When was the last time you thought about your disaster recovery plan? Natural disasters, such as earthquakes, tsunamis, hurricanes, fires, or floods can occur anytime and disable your data center, with little to no warning. Hacker activities like a denial of service attack can also take down your systems unexpectedly. Then you have the more mundane risks such as human error and hardware or software failures. The only predictable thing to say about these risks is that at some point, on some scale, you’ll have to recover your data center from downtime. When it comes to disaster readiness, proactive planning is the key to success. Every business, regardless of size, needs to have a well-tested disaster recovery plan in place. Every minute your systems are down, the financial implications grow. Take the assessment to see where your disaster recovery plan ranks. Then learn about next steps and more information.
Tags : disaster recovery, natural disasters, data center, hackers, hardware failure, software failure, planning, disaster readiness
     HP
By: HP     Published Date: Mar 31, 2015
No business is immune to the threat of IT downtime caused by natural and manmade disasters. Natural disasters—such as earthquakes, tsunamis, hurricanes, fires, and floods—can happen with little to no advanced warning. But the bigger risk is often human-induced events—from simple IT configuration errors to significant data center problems. If you lack a rock-solid disaster recovery (DR) plan, any of these unpredictable events—natural or manmade—could bring your business and its revenue streams to a halt. Yet many organizations are not well prepared for the unknown. The randomness of such events lulls people into a sense of false security—“That’s not likely to happen here.” While you can hope to avoid events that threaten the continuity of your business, the reality remains unchanged: Disasters happen—so you need to prepare for them. Are you prepared? Please download this eBook to find out!
Tags : disaster recovery, natural disasters, data center, hackers, hardware failure, software failure, planning, disaster readiness
     HP
By: HP - Enterprise     Published Date: Oct 16, 2008
If your company stores or processes credit card information, you must be able to demonstrate compliance with the Payment Card Industry (PCI) Data Security Standards (DSS). These standards include requirements for security management, policies, procedures, network architecture, design, and other critical protective measures. They also include one very prescriptive requirement:  Section 6.6 mandates that organizations secure all Web applications by conducting a code review or installing an application layer firewall. Companies have had a very difficult time passing the other parts of Section 6 and they have experienced a rising number of data breaches. Unless companies take 6.6 seriously, PCI compliance failure rates, and data breaches, will continue to grow.  Read this whitepaper to gain an overview of best practices to pass Section 6.6 and an understanding of the technology available to you.
Tags : business risk, security, application security, audit, risk, vulnerabilities, fortify, fortify software
     HP - Enterprise
By: HP - Enterprise     Published Date: Nov 19, 2008
This webinar explores 12 of the most common security traps in Java by examining the causes of security failures in modern Java–based applications. Approaching security with an “outside in” style, we look at vulnerabilities from a developer’s perspective, focusing on the source code.
Tags : security, application security, java, vulnerabilities, developer, source code, analysis, fortify software
     HP - Enterprise
By: HP - Enterprise     Published Date: Jun 05, 2013
As the networks become ever more essential to business processes, they are also increasing rapidly in size and complexity. Many factors can affect network availability and performance—increasing traffic, configuration problems, failed network elements, changes, and more. Since not all of these problems are hard failures, managing the network to detect and correct business-impacting problems requires new tools, strategies, and initiatives. To deliver the availability and performance business demands, network management teams need to optimize fault management and ensure availability, unify fault and performance management, automate change and configuration management to ensure compliance, and automate IT processes. This integrated approach is called Automated Network Management (ANM).
Tags : network management, network
     HP - Enterprise
By: HP - Enterprise     Published Date: Jun 05, 2013
Traditional project management techniques are not working as well as expected. According to research, an average organization has at least $74 million USD (yearly) in at-risk projects. And, even when projects are executed successfully, all too often they still fail to deliver business benefits. So, how do you get started? How do you prioritize which issues to address first? What are the risks and potential rewards? What can you do yourself and where can you need help? This paper helps you answer those questions. It provides important insights into the root causes of project failures and misalignment with business unit expectations, along with possible solutions. It illustrates the path to optimized project and portfolio management from four different starting points, and provides step-by-step advice to help you reach new milestones quickly. It is intended to help you make the transition from managing IT projects to managing business outcomes.
Tags : it project, portfolio management
     HP - Enterprise
By: HP and Intel® Xeon® processor     Published Date: Aug 10, 2012
Virtualization reduces the number of physical servers IT needs to provision and maintain, but it also transforms the data protection paradigm. Now businesses can recover from failures in minutes, not hours, with unprecedented affordability. The key to
Tags : complete, storage, data, protection, architecture, virtual, environments, virtualization
     HP and Intel® Xeon® processor
By: HP Virtualization     Published Date: Mar 22, 2010
Virtually every organization understands that its successful operation depends on the continuous availability of its applications. Most companies rely on internal applications-ranging from enterprise resource planning to payroll systems-to keep the wheels of their enterprise turning. They also depend on external-facing applications for everything from selling products to their customers to automating the supply chain with suppliers and partners. The failure of any of these mission-critical applications could be catastrophic to a business.
Tags : business continuity
     HP Virtualization
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics