it failure

Results 151 - 175 of 220Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Jul 09, 2009
The product portfolio decisions you make today will determine whether your company is relevant tomorrow. With such a fine line between success and failure, now is the time to make product portfolio decisions based on fact-not guesswork, political agendas, intuition or the opinions of the loudest voice in the room. Learn more today!
Tags : 
ibm, value driven, product portfolios, rational software, value, portfolio management, customer value, value maximization, strategic alignment, npd, r&d, research and design, new product development, ibm rational focal point, lifecycle, networking, knowledge management, enterprise applications, customer relationship management
    
IBM
Published By: Neverfail Group     Published Date: Aug 21, 2009
This document introduces Neverfail Heartbeat, a technology that enables the protection of applications against many potential failures, including application failure, operating system failures, and hardware, network or site failures, at a reasonable cost.
Tags : 
microsoft, ms windows, windows, application security, cost control, it spending, application performance, high availability, neverfail, platforms, storage, clustering
    
Neverfail Group
Published By: Dyn     Published Date: Jul 29, 2015
In this O'Reilly report, author Andy Still points out: How the advantages of using cloud-based systems outweigh the disadvantages How you can closely monitor system elements that you dont control, with Real User Monitoring (RUM) and other tools How to use a CDN and cache data as close to users as possible How to architect your systems to gracefully handle potential cloud service failures
Tags : 
optimization, cloud, infrastructure, web operations, cloud migration, real user monitoring, cdn, cloud service failures
    
Dyn
Published By: Globalscape     Published Date: Jul 31, 2014
Downtime happens and often at the worst time possible. Organizations experiencing downtime face direct and indirect costs from the loss of critical systems. This whitepaper discusses a Globalscape survey of 283 IT professionals and end users revealing the frequency of unplanned downtime, the effects on organizations, including average costs, and what IT administrators can do to minimize core system failure.
Tags : 
globalscape, downtime, productivity, it environments, critical systems, mission-critical systems, data loss prevention, security, load balancing, highly-scalable infrastructures, servers
    
Globalscape
Published By: HP     Published Date: Mar 31, 2015
When was the last time you thought about your disaster recovery plan? Natural disasters, such as earthquakes, tsunamis, hurricanes, fires, or floods can occur anytime and disable your data center, with little to no warning. Hacker activities like a denial of service attack can also take down your systems unexpectedly. Then you have the more mundane risks such as human error and hardware or software failures. The only predictable thing to say about these risks is that at some point, on some scale, youll have to recover your data center from downtime. When it comes to disaster readiness, proactive planning is the key to success. Every business, regardless of size, needs to have a well-tested disaster recovery plan in place. Every minute your systems are down, the financial implications grow. Take the assessment to see where your disaster recovery plan ranks. Then learn about next steps and more information.
Tags : 
disaster recovery, natural disasters, data center, hackers, hardware failure, software failure, planning, disaster readiness, networking, security, it management, data management
    
HP
Published By: Code42     Published Date: Jan 13, 2016
BACKUP ISNT JUST A COPY IN THE CLOUD. ITS THE ANTIDOTE TO EVERYTHING. Be it user error, natural disaster, hardware failure, malware, theft or litigationtheres a countermeasure to restore your business to normal. Skeptical? Click through the eBook to ?nd out how backup makes the enterprise impervious.
Tags : 
code42, endpoint backup, cloud storage, data migration, data storage solutions, e-discovery, security, it management, knowledge management, enterprise applications
    
Code42
Published By: Rackspace     Published Date: Mar 08, 2016
In this world of always-on services, the systems that support them must be designed to be both highly available and resilient. Today, many IT leaders are looking for their applications and infrastructure to be covered by the following: Defined SLAs for workloads and applications Mapped failure points and impact of these on the business Regularly measure application and Infrastructure health Access this white paper to discover your resiliency, and learn how to create a resilient architecture on Microsoft Azure cloud platform.
Tags : 
rackspace, resilient architectures, microsoft azure, network infrastructure, cloud computing, distributed computing, infrastructure, network architecture, network performance, network performance management
    
Rackspace
Published By: SAP     Published Date: Mar 24, 2011
The list of initiatives that are data-enabled-indeed, data-intensive-vary from company to company, from industry to industry. But the common denominator is an increasing awareness that these and other programs can't succeed without clean, meaningful, and available information. In this white paper, Baseline Consulting's Jill Dych discusses how the data conversation is changing from philosophical questioning to hard-core tactics, from "What do we need?" to "Where do we start?" It covers the most common reasons for data governance failure, as well as the components of data governance that will inform the right strategy and give companies a means of determining where and how to begin their data governance journeys.
Tags : 
data governance, data governance failure, data governance initiative, governance, business intelligence, database development, data integration, data mining, data protection, data quality, database security, data warehousing
    
SAP
Published By: Lane Telecommunications     Published Date: Apr 14, 2009
The fax market is changing significantly though not in the way predicted by many. Far from an inevitable decline brought about by the emergence of e-mail, the demand for fax, particularly from larger companies, is actually growing. The way that fax is managed within the business is also undergoing a significant period of transition.
Tags : 
kudos, lane, lane telecommunications, fax over ip, foip, ip network, integrated business communications, integrated ip, voice market, voip, multi- function peripherals, mfps, erp, public switched telephone network, pstn, fax over internet protocol, t.37, store and forward, t.38, real-time
    
Lane Telecommunications
Published By: APC     Published Date: Feb 19, 2008
Cooling for IT wiring closets is rarely planned and typically only implemented after failures or overheating occur. Historically, no clear standard exists for specifying sufficient cooling to achieve predictable behavior within wiring closets. An appropriate specification for cooling IT wiring closets should assure compatibility with anticipated loads, provide unambiguous instruction for design and installation of cooling equipment, prevent oversizing, maximize electrical efficiency, and be flexible enough to work in various shapes and types of closets. This paper describes the science and practical application of an improved method for the specification of cooling for wiring closets.
Tags : 
apc, power, cooling, it wiring, heat removal, green computing, infrastructure, internetworking hardware, network architecture, power and cooling
    
APC
Published By: APC     Published Date: Apr 08, 2010
Many of the mysteries of equipment failure, downtime, software and data corruption, are the result of a problematic supply of power. There is also a common problem with describing power problems in a standard way. This white paper will describe the most common types of power disturbances, what can cause them, what they can do to your critical equipment, and how to safeguard your equipment, using the IEEE standards for describing power quality problems.
Tags : 
apc, power, cooling, it wiring, heat removal, green computing, ieee, equipment failure, server hardware, servers, ebusiness, system management software, power and cooling, data center design and management
    
APC
Published By: Intel Corp.     Published Date: Aug 08, 2012
Virtualization reduces the number of physical servers IT needs to provision and maintain, but it also transforms the data protection paradigm. Now businesses can recover from failures in minutes, not hours, with unprecedented affordability. The key to achieving the best business uptime and cost savings is the effective design of storage management and data protection. This white paper outlines an end-to-end storage and data protection architecture optimized for VMware vSphere and Microsoft Hyper-V environments.
Tags : 
complete, storage, data, protection, architecture, virtual, environments, virtualization, physical, servers, server, transforms, data, management, security, it management, data management, infrastructure, server hardware, data center design and management
    
Intel Corp.
Published By: Adobe     Published Date: Apr 03, 2015
A lack of executive support and poor data quality are just some reasons why analytics programs fail. The guide by Adam Greco, Reenergize Your Web Analytics, identifies the key reasons for program failures and provides ten ways to make your analytics program successful. Read the guide to discover key ways to improve your analytics program, including: How to deal with your stakeholders How to set your analytics priorities How to reap the rewards of change
Tags : 
analytics program, stakeholders, adobe, marketing, personalization
    
Adobe
Published By: Dell Cloud Marketplace     Published Date: Jan 07, 2015
This report will help CIOs, application architects, and IT decision-makers identify common patterns of implementation failures and successes and provide a framework for evaluating multi-cloud environments.
Tags : 
dell, cloud strategy, cloud computing, cloud services, application infrastructure, application architecture, infrastructure, application integration
    
Dell Cloud Marketplace
Published By: Tripwire     Published Date: Nov 30, 1999
This paper covers the basic requirements of PCI, with a focus on the administrative and technical elements of the program. It also reviews the validation requirements of the standard and potential sanctions for failure to comply.
Tags : 
pci, pci compliance, payment card, credit card, credit cards, payment card industry, cisp, privacy, customer privacy, consumer privacy, consumer data, data protection, customer data, tripwire, security, authentication, compliance, internet security, security management, security policies
    
Tripwire
Published By: Tripwire     Published Date: Jul 05, 2007
Learn about the validation requirements of the payment card industry's data security standard (PCI DSS), including administrative and technical elements of the program, and the potential sanctions for failure to comply.
Tags : 
pci, pci compliance, payment card, credit card, credit cards, payment card industry, cisp, privacy, customer privacy, consumer privacy, vulnerability, consumer data, data protection, customer data, tripwire, compliance, pci, pci dss, database security, authentication
    
Tripwire
Published By: IBM     Published Date: Apr 06, 2016
As big data environments ingest more data, organizations will face significant risks and threats to the repositories containing this data. Failure to balance data security and quality reduces confidence in decision making. Read this e-Book for tips on securing big data environments
Tags : 
ibm, big data, data security, risk management, security
    
IBM
Published By: IBM     Published Date: Jul 15, 2016
As big data environments ingest more data, organizations will face significant risks and threats to the repositories containing this data. Failure to balance data security and quality reduces confidence in decision making. Read this e-Book for tips on securing big data environments.
Tags : 
ibm, data, security, big data, data management
    
IBM
Published By: Hewlett-Packard     Published Date: Aug 02, 2013
Every data center IT manager must constantly deal with certain practical constraints such as time, complexity, reliability, maintainability, space, compatibility, and money. The challenge is that business application demands on computing technology often dont cooperate with these constraints. A day is lost due to a software incompatibility introduced during an upgrade, hours are lost tracing cables to see where they go, money is spent replacing an unexpected hardware failure, and so on. Day in and day out, these sorts of interruptions burden data center productivity. Sometimes, its possible to temporarily improve the situation by upgrading to newer technology. Faster network bandwidth and storage media can reduce the time it takes to make backups. Faster processors with multiple cores and larger memory address space make it possible to practically manage virtual machines.
Tags : 
bladesystem, blade, infrastructure, blade infrastructure, blade servers, storage virtualization, best practices, productivity
    
Hewlett-Packard
Published By: IAG Consulting     Published Date: Aug 24, 2010
Requirements quality is tangible. It is possible to look at the specific characteristics of requirements documentation and determine if it is sufficiently clear, accurate and complete to lead to a successful project. Since flawed requirements trigger about 70% of all project failures,1 this paper will present some hard and fast rules for looking at requirements documents, in any format, and being able to determine if they are reasonably well constructed. It will outline the key points to look for in a requirements document, and why this can save a company hundreds of thousands of dollars. Finally, it will offer five straightforward questions to address when evaluating requirements quality. The paper is not intended to be a full audit of requirements, but rather act as a guide and checklist for evaluation.
Tags : 
iag, project management, project management, maturity, consulting, business requirements, business intelligence, business management
    
IAG Consulting
Published By: Vision Solutions     Published Date: Jun 10, 2009
Journaling? RAID? Vaulting? Mirroring? High availability? Know your data protection and recovery options! Download this information-packed 29-page report that reviews the spectrum of IBM i (i5/OS) and AIX resilience and recovery technologies and best practices choices, including the latest, next-generation solutions.
Tags : 
aix, i5/os, vision, resilience, recovery, recovery solutions, os/400, ibm i, next generation solutions, recovery time, hacmp, high availability, clustering, environmental conditions, operator error, software bugs, data loss, 99.99, failure, logical volume manager
    
Vision Solutions
Published By: Vision Solutions     Published Date: Jun 10, 2009
For IT departments looking to bring their AIX environments up to the next step in data protection, IBM’s PowerHA (HACMP) connects multiple servers to shared storage via clustering. This offers automatic recovery of applications and system resources if a failure occurs with the primary server.
Tags : 
aix, i5/os, vision, resilience, recovery, recovery solutions, os/400, ibm i, next generation solutions, recovery time, hacmp, high availability, clustering, environmental conditions, operator error, software bugs, data loss, 99.99, failure, logical volume manager
    
Vision Solutions
Published By: HP Virtualization     Published Date: Mar 22, 2010
Virtually every organization understands that its successful operation depends on the continuous availability of its applications. Most companies rely on internal applications-ranging from enterprise resource planning to payroll systems-to keep the wheels of their enterprise turning. They also depend on external-facing applications for everything from selling products to their customers to automating the supply chain with suppliers and partners. The failure of any of these mission-critical applications could be catastrophic to a business.
Tags : 
business continuity, servers, application integration, best practices, business activity monitoring, business management, it spending, return on investment
    
HP Virtualization
Published By: IBM     Published Date: Apr 10, 2013
Your goal is clearproduce high-quality goods while optimizing resources at every step of production. And in today's uncertain economy, cost-control efforts may never have been more important. Unscheduled downtime because of equipment failure can have a serious impact on your organization's bottom line. Download this white paper from IBM, and learn the basics of predictive maintenance, the benefits it provides manufacturing operations and the underlying technologies that make it possible. Predictive analytics helps you in a number of ways: identify when equipment is likely to fail or need maintenance and take action to maximize up time and reduce future warranty claims costs; optimize allocated labor resources and spare part inventories, helping eliminate undue maintenance, prevent downtime and reduce inventory costs; and determine why certain production runs fail more often than others, identify the cause and analyze whether those runs warrant a recall.
Tags : 
predictive, maintenance, manufacturing, productivity, minimize, downtime, reduce, cost-control
    
IBM
Start   Previous    1 2 3 4 5 6 7 8 9    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.