it failure

Results 176 - 200 of 220Sort Results By: Published Date | Title | Company Name
Published By: OutSystems     Published Date: Jul 15, 2014
Anyone with a mobile device these days knows all about the seemingly never-ending procession of new applications for smartphones, tablets and anything else people can carry in their pockets, purses or bags. And while apps are extremely popular, theres also been failure with millions of attempts to build mobile applications for both business and consumer use. How can the mistakes be avoided? We asked several experts in the eld to outline some of the top pitfalls of mobile application development and how teams can avoid them to build a useful, innovative app that enables and empowers as many potential end-users as possible.
Tags : 
outsystems, applications, strategic business, innovation, app development, mobile, it management, data center
    
OutSystems
Published By: Cisco     Published Date: Dec 21, 2016
Identifying a shortcoming and labeling it a failure might be a bit of hyperbole, but it still leaves enterprises wondering if there is a place for private cloud in their strategy. This paper will attempt to answer this question, and will focus on the role of OpenStack in particular as a private cloud solution.
Tags : 
    
Cisco
Published By: Active Power     Published Date: Nov 17, 2014
This paper provides a quantitative analysis of the in-service reliability of Active Powers CleanSource 750HD UPS (uninterruptible power supply) system versus a double-conversion UPS with batteries.
Tags : 
active power, data center power, data center batteries, power and cooling, energy, data center energy, power source, server hardware
    
Active Power
Published By: BlackBerry Cylance     Published Date: Sep 18, 2019
More than 70 percent of cyber attacks target small businesses," according to National Cyber Security Alliance estimates. Thats not surprising when you consider how many small and medium-sized businesses (SMBs) still rely on legacy AV tools despite their repeated failures to stop modern malware, ransomware, and zero-day attacks. Legacy AV is a lose-lose-lose proposition for SMBs. Attacks get through and cause damage. IT staff struggle to keep up with endless signature file updates from their AV vendors. End-users complain about sluggish system performance during scans and signature file updates. Fortunately, next-generation solutions are now available that protect endpoints with artificial intelligence (AI) rather than signatures. Ready to learn more? Then read the new eSecurity Planet executive brief sponsored by BlackBerry Cylance.
Tags : 
    
BlackBerry Cylance
Published By: IBM     Published Date: Apr 06, 2015
How effective is your mobile app development process when it comes to meeting customer needs and business objectives? IBM commissioned Forrester to identify the key drivers of successful mobile apps and the costs of failure -- for both customer-facing and enterprise applications. Watch the webcast to understand the key cost drivers and why its more important than ever to get this right due to what Forrester calls the mobile mind shift. IBM customer, Bank of Montreal, also shares their mobile app dev story. A good app can increase traffic, sales, productivity and brand satisfaction. And a bad app will do the opposite (you could risk doubling your costs if youre not mindful of the key cost drivers).
Tags : 
mobile app development, customer-facing applications, enterprise applications, ibm, mobile moments, traffic, sales, productivity
    
IBM
Published By: Jive     Published Date: Apr 10, 2014
Different types of businesses will have different use cases for Social Business. In this whitepaper, we cover four different use cases at four very different types of businesses. But in each instance, the company's IT staff followed some key rules to minimize chances of failure and make it easier to convince employees and managers alike to dive into an enterprise social environment.
Tags : 
reachmail, customer relationships, engagement, customer support, best practices
    
Jive
Published By: Cisco     Published Date: Jan 05, 2016
Not long ago Gartner released an oft-quoted statistic: 95% of private clouds fail. According to Tom Bittman, VP Distinguished Analyst at Gartner, of 140 customers polled, 95% reported something was wrong with their private cloud. Identifying a shortcoming and labeling it a failure might be a bit of hyperbole, but it still leaves enterprises wondering if there is a place for private cloud in their strategy. This paper will attempt to answer this question, and will focus on the role of OpenStack in particular as a private cloud solution.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Apr 15, 2016
Not long ago Gartner released an oft-quoted statistic: 95% of private clouds fail. According to Tom Bittman, VP Distinguished Analyst at Gartner, of 140 customers polled, 95% reported something was wrong with their private cloud. Identifying a shortcoming and labeling it a failure might be a bit of hyperbole, but it still leaves enterprises wondering if there is a place for private cloud in their strategy. This paper will attempt to answer this question, and will focus on the role of OpenStack in particular as a private cloud solution.
Tags : 
cloud management, cloud services, cloud management, best practices, cloud computing, content integration, infrastructure
    
Cisco
Published By: Viavi Solutions     Published Date: Sep 30, 2016
IT today is more complex than ever. Public cloud, networks, storage systems, servers, and applications all combine to deliver todays IT services. But how do you manage such a diverse and complex infrastructure? Can legacy tools help after this seismic shift? This document answers these questions and provides 20 tools you need to deliver services in this new hybrid IT world. Todays IT environment provides greater promise than ever before. New technologies are driving new capabilities and even more opportunities to differentiate. The opportunity for innovation has never been greater: faster compute, more storage, and new applications all working together to drive greater efficiency and greater power. But this wave of innovations has also added greater complexity since one failure in this increasingly complex IT stack means a failure of the entire service. New consumer-focused cloud based applications are setting a high standardnearly 100% up time with peak performance all while IT.
Tags : 
    
Viavi Solutions
Published By: Wheelhouse     Published Date: Aug 13, 2013
Changes in a number of areas are transforming business telephony. These changes have varying causes: advances in IP communication technology, the explosion of mobile communication, the growth of cloud-based services, and the proliferation of video conferencing, to name a few. The changes have affected small companies in big ways. In particular, they have given SMBs access to communication capabilities formerly reserved for large companies. But they also have growing potential to affect enterprises. Thus the failure to keep on top of them can leave even the biggest companies at risk of falling behind.
Tags : 
cio, playbook, telphony, video, ip technology, best practices, business intelligence, video conferencing
    
Wheelhouse
Published By: HP     Published Date: May 14, 2014
Your data is everywhere. Its in the cloud, in virtual environments, in remote offices, and on mobile devices. Plus, theres more of it, and much of it is business-critical, meaning you need to back up larger volumes of data than ever before without adding costs or bandwidth. Even more importantly, you need the ability to restore data quickly in the event of a disaster, failure, outage. The cost of data protection is higher now more than ever.
Tags : 
hewlett packard, cloud, mobile, remote, data recovery, disaster, failure, data management
    
HP
Published By: IBM     Published Date: Feb 27, 2014
Why should we bother automating deployments in the first place? What should the scope of the automation effort be? How do we get started? This white paper provides a solid introduction to these topics.
Tags : 
ibm, ibm software, deployment automation, manual deployments, automation, change management, automated solution, automated investments
    
IBM
Published By: IBM     Published Date: Feb 27, 2014
This book defines the basics of application release and deployment, and provides best practices for implementation with resources for a deeper dive.
Tags : 
ibm, ibm software, application release, deployment, software delivery, delivery methods, deployment standards, implementation
    
IBM
Published By: Marketo     Published Date: Jul 12, 2017
Unfortunately, weve all been there. Every now and then, we make cringe-worthy mistakes. But the mistakes that haunt us in our personal lives often arent as public as email marketing mistakes, which go out to hundreds and thousands of subscribers. Download this ebook to learn about the eight most common email marketing pitfalls and how you can avoid or fix them: Mistake 1: Unclear subject lines Mistake 2: Poor email list hygiene Mistake 3: Failure to measure email inboxing Mistake 4: No engagement segmentation Mistake 5: No re-engagement strategy Mistake 6: Using image-based CTA buttons Mistake 7: No mobile optimization Mistake 8: Bad testing decisions
Tags : 
continuously opened emails, engagement, unique clicks, multiple clicks, cleaning campaign, sender reputation, marketo, marketing
    
Marketo
Published By: Backupify     Published Date: Jul 15, 2013
The data that resides within Salesforce.com is arguably some of an organizations most valuable data for all current and future revenue including contacts, purchase history, lead information, reports on prospects, sales quotes, signed contracts, and customer invoices. Salesforce has a robust data center and the infrastructure to protect your data from hardware failure, even on a catastrophic scale. However, it does not protect you from user error or data being overwritten.
Tags : 
roi, salesforce, backup, calculate, data center
    
Backupify
Published By: IBM     Published Date: Jun 19, 2008
Discover the high performance, flexibility and extreme availability of IBM System x3550 Express rack-mount server. IBM PowerExecutive software manages energy usage to keep costs and heat output down. And advanced predictive failure analysis and Light Path Diagnostics keep you up and running, reduce down time and service costs. Watch this video demo of the IBM System x3550 Express to see how it compares to competitive products and how it can bring savings, power and reliability to your business.
Tags : 
ibm, express seller, system x, server, infrastructure, server hardware, servers
    
IBM
Published By: IBM     Published Date: Aug 21, 2008
Reliability Centered Maintenance (RCM) is an advanced maintenance strategy for increasing asset availability by minimizing downtime caused by failures, reducing an asset’s total cost of ownership and increasing overall equipment effectiveness (OEE).This white paper describes the Reliability Centered Maintenance (RCM) process, breaking it down into seven steps including supporting information on how IBM Maximo® Asset Management supports each step of the process.
Tags : 
rcm, reliability centered maintenance, asset-intensive, maximo asset management, it management, infrastructure, network management, ibm mi
    
IBM
Published By: IBM     Published Date: Aug 21, 2008
Establishing an ESB is essential in delivering a Service-Oriented Architecture. But for an SOA to be effective, you’ll also need your ESB to recover quickly from unexpected hardware and software failures. Clustering can help by enabling your systems to operate in parallel, so that if one should fail, those remaining can seamlessly step in.
Tags : 
ibm mi, ibm, ibm grm, high availability, cluster, clustering, grid computing, utility computing
    
IBM
Published By: XOsoft     Published Date: Aug 21, 2009
The primary information management concern in the enterprise today is to ensure that the knowledge necessary to drive critical business processes is available where it needs to be, when it needs to be. The costs of failure to do this are high. 
Tags : 
cost control, data loss, data protection, information management, data management, business process management, xosoft, knowledge management
    
XOsoft
Published By: Quocirca     Published Date: Jan 11, 2008
Small and medium-sized businesses (SMBs) can benefit from the expansive use of information technology (IT) just as much as their larger counterparts. Indeed, in many cases they have to, because to trade they need to interact with business partners of all sizes and IT failure affects not just internal users but those of third parties.
Tags : 
insight report, quocirca, smb, small business, soho, mid-sized business, smbs, data security
    
Quocirca
Published By: Quocirca     Published Date: Sep 18, 2008
Whether we like it or not we are all IT users now. Through the ubiquity of networks of devices that we rely on for information, security and day-to-day transactions even those who eschew technology now rely on it, even if they do not acknowledge it. The failure of these networks can lead to widespread disruption, unhappy customers, unproductive employees and lost business. Ensuring their availability, security and efficiency is a job for experts who need powerful tools to carry out the task.
Tags : 
quocirca, service management, high availability, security
    
Quocirca
Published By: Magonaga     Published Date: Jan 17, 2007
This white paper examines how the failure to structure equitable relationships, establish ethical foundations for action and correct blinding group think led to the catastrophic death of a specific corporate organism.
Tags : 
corporate culture, team dynamics, project management, team management, people management, magonaga, it management, employee performance
    
Magonaga
Published By: Infor     Published Date: Feb 27, 2007
Countless surveys have confirmed that most lean initiatives are abandoned outright or fail to deliver expected and needed results.  One well-known lean business consultant estimates that the failure rate is 98%. What is it the 2% of companies know that the others do not? Download this white paper to learn more.
Tags : 
supply chain management, best practices, workforce management, productivity, employee performance, lean methods, lean, six sigma
    
Infor
Published By: Asentria Corporation     Published Date: Sep 04, 2007
One of the greatest challenges to any advanced wireless operation is the maintenance of continuous and economical service. Today’s networks have evolved into business-critical services that organizations rely upon every day. However, unplanned remote site downtime due to equipment and power failure, and adverse environmental conditions can severely impair network service.
Tags : 
telecom alarms, snmp traps, remote site managers, terminal servers, remote access, snmp monitoring, snmp, contact closures
    
Asentria Corporation
Published By: Asentria Corporation     Published Date: Sep 04, 2007
More than ever before, IT managers need to secure equipment and facilities against a variety of intrusive conditions that could cripple critical operations, resulting in system malfunctions, loss of data or intellectual property, damage to mission critical hardware or even theft of valuable physical assets. Such conditions often include environmental events, failure of air conditioning systems, power outages, and untoward human actions.
Tags : 
telecom alarms, snmp traps, remote site managers, terminal servers, remote access, snmp monitoring, snmp, contact closures
    
Asentria Corporation
Start   Previous    1 2 3 4 5 6 7 8 9    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.