resilience

Results 76 - 100 of 107Sort Results By: Published Date | Title | Company Name
Published By: Whil Concepts, Inc.     Published Date: Jan 30, 2017
This eBook provides an overview of the science behind mindfulness meditation and highlights why its captured the attention of top executives across the globe. Its intended for people who are not only interested in the health and performance benefits of mindfulness, but also want the proof points... just like us.
Tags : 
mindfulness, wellbeing, wellness, mental wellbeing, emotional wellbeing, stress, resilience, sleep, training, benefits, virgin pulse, jiff, health, fitness, performance, health, sleep, brain training, performance, perks
    
Whil Concepts, Inc.
Published By: Whil Concepts, Inc.     Published Date: Jan 30, 2017
This Best Practices Guide shares how to successfully add mindfulness training to your current wellness program to make employees happier, more focused and more productive. It also provides insights from survey results compiled over 6 months in conversations with 56 companies, including 30 Fortune 500 brands.
Tags : 
mindfulness, wellbeing, wellness, mental wellbeing, emotional wellbeing, stress, resilience, sleep, training, benefits, virgin pulse, jiff, health, fitness, performance, health, sleep, brain training, performance, perks
    
Whil Concepts, Inc.
Published By: Whil Concepts, Inc.     Published Date: Jan 30, 2017
Download these case studies to learn how Whil was able to increase employee satisfaction and decrease employee turnover by introducing mindfulness in the below organizations: Global fashion retailer City government Technology University Leading non-profit Production company Global advertising agency
Tags : 
mindfulness, wellbeing, wellness, mental wellbeing, emotional wellbeing, stress, resilience, sleep, training, benefits, virgin pulse, jiff, health, fitness, performance, health, sleep, brain training, performance, perks
    
Whil Concepts, Inc.
Published By: Intel Security     Published Date: Apr 06, 2016
This solution brief outlines how security operations must evolve to a continuous operation focused on assessing readiness, acquiring and integrating threat intelligence, and increasing the speed of threat response capability
Tags : 
advanced malware, targeted malware, layered malware defense, targeted attacks, critical infrastructure threats, forensic analysis, static detection, dynamic detection, forensic analysis, application control, vulnerability scanning, real-time kernel protection, change management monitoring, database activity monitoring, siem, network ips, global intelligence, advanced threat defense
    
Intel Security
Published By: IBM     Published Date: Sep 16, 2014
In 2013, Bon Ton Stores invested in upgrading IT, continuing to update and expand its eCommerce sites, and launching a new mobile site supporting delivery of promotions and online purchasing. A central aspect of this technology upgrade involved the replacement of an x86 server environment, supporting eCommerce with ten IBM PowerLinux 7R2 servers and IBM PowerVM running IBM WebSphere Commerce on SUSE Linux operating systems. This case study highlights of some of the key aspects of this significant migration and its results, including how Bon-Ton IT executives support the business and what they prioritize, why they decided to make this move, what performance and capability resulted, and how it affected full data center costs and business resilience.
Tags : 
stack costs, online purchasing, promotion delivery, mobile retail, application performance management, business analytics, business intelligence, customer experience management
    
IBM
Published By: IBM     Published Date: Jan 26, 2016
Read this white paper to learn why forward-thinking business and technology leaders are turning to B2B integration and collaboration solutions to get the speed, agility, high-availability and resilience they need.
Tags : 
ibm, b2b, collaboration, integration, agility, solutions, enterprise applications, data management
    
IBM
Published By: IBM     Published Date: Feb 26, 2016
Building and managing cloud resiliency solutions in-house is difficult. Many organizations prefer to work with a third-party technology provider for the development and management of cloud solutions.
Tags : 
cloud hosting, ibm, integration, cloud computing, data centers, application integration, best practices, business analytics, content integration, content management system
    
IBM
Published By: Hewlett-Packard     Published Date: Aug 02, 2013
This report documents the results of ESG Labs hands-on testing and validation of the HP 3PAR StoreServ 7000 storage array, with a focus on autonomic simplicity, efficient unified storage, application performance, and resilience for mid-range enterprises.
Tags : 
esg, storeserv, storage area networks, storage management, storage virtualization, data center design and management
    
Hewlett-Packard
Published By: IBM     Published Date: Apr 20, 2017
The growth of virtualization has fundamentally changed the data center and raised numerous questions about data security and privacy. In fact, security concerns are the largest barrier to cloud adoption. Read this e-Book and learn how to protect sensitive data and demonstrate compliance. Virtualization is the creation of a logical rather than an actual physical version of something. such as a storage device, hardware platform, operating system, database or network resource. The usual goal of virtualization is to centralize administrative tasks while improving resilience, scalability and performance and lowering costs. Virtualization is part of an overall trend in enterprise IT towards autonomic computing, a scenario in which the IT environment will be able to manage itself based on an activity or set of activities. This means organizations use or pay for computing resources only as they need them.
Tags : 
data protection, data security, data optimization, organization optimization, cloud management, virtualization, data center, cloud environment
    
IBM
Published By: Vision Solutions     Published Date: Dec 04, 2009
The newest edition of this unique report is filled with survey findings from over 4,000 individuals responsible for the resilience and protection of AIX and IBM i (i5/OS) environments. Discover if and how your peers are meeting recovery-time and recovery-point objectives, disaster recovery plans and more.
Tags : 
vision solutions, ibm power systems, aix users, data protection, recovery and optimization, it availability, data management, as/400
    
Vision Solutions
Published By: Vision Solutions     Published Date: Jun 10, 2009
Journaling? RAID? Vaulting? Mirroring? High availability? Know your data protection and recovery options! Download this information-packed 29-page report that reviews the spectrum of IBM i (i5/OS) and AIX resilience and recovery technologies and best practices choices, including the latest, next-generation solutions.
Tags : 
aix, i5/os, vision, resilience, recovery, recovery solutions, os/400, ibm i, next generation solutions, recovery time, hacmp, high availability, clustering, environmental conditions, operator error, software bugs, data loss, 99.99, failure, logical volume manager
    
Vision Solutions
Published By: Vision Solutions     Published Date: Jun 10, 2009
For IT departments looking to bring their AIX environments up to the next step in data protection, IBM’s PowerHA (HACMP) connects multiple servers to shared storage via clustering. This offers automatic recovery of applications and system resources if a failure occurs with the primary server.
Tags : 
aix, i5/os, vision, resilience, recovery, recovery solutions, os/400, ibm i, next generation solutions, recovery time, hacmp, high availability, clustering, environmental conditions, operator error, software bugs, data loss, 99.99, failure, logical volume manager
    
Vision Solutions
Published By: Cisco     Published Date: Feb 17, 2015
Analyst brief brought to you by NSS Labs. Where the goal of cyberprevention has been to reduce the probability of an attack against the organization, cyber resilience looks to reduce the impact of these attacks through cyber risk management. A cyber resilience program still considers detection and prevention techniques, but it also assumes that a breach is likely. This stance emphasizes anticipation, agility, and adaptation. Not every attack can be prevented, but with a cyber resilience program, damage can be mitigated or avoided altogether.
Tags : 
cisco, nss, cyber, prevention, risk management, resilience, firewall, security, protection, epp, breach, cyberattack, operations, network, best practices
    
Cisco
Published By: IBM     Published Date: Sep 27, 2013
Founded in 1975, DIMAR Group operates in retail, marketing consumer products through a multi-channel distribution network that includes cash and carry, franchising, discount and supermarket operations. With 174 stores and 2,000 employees located mainly in western Liguria and southern Piemonte, DIMAR Group is ready for the rapid and frequent changes that characterize the northern Italian market.
Tags : 
ibm, ibm solutions, ibm bladecenter, ibm system storage, virtualization, virtualization technologies, dimar, ibm platform, storage, computing, flexibility, enterprise applications, data center
    
IBM
Published By: IBM     Published Date: Oct 10, 2013
In the past, server, storage and data center redundancy were the only options that met corporate resilience objectives. Read this white paper to gain an understanding of the resiliency challenges facing organizations today and how you can transition to cloud-based resiliency.
Tags : 
continuity, business continuity, cloud computing, cloud-based resilience, resiliency, business resiliency, recovery, recovery time
    
IBM
Published By: IBM     Published Date: Oct 10, 2013
Disaster recovery has become a necessary component of organizations' IT plans, but that flat IT budget makes it harder and harder to protect critical business applications. Read this white paper to learn how cloud-based business resilience can provide cost-effective alternatives to traditional disaster recovery.
Tags : 
disaster recovery, cloud computing, ibm, backup, smartcloud virtualized server recovery, vulnerability management, virtualization
    
IBM
Published By: IBM     Published Date: Jul 09, 2014
Interactive guide to provide insights on the key actions to take to take to safeguard your reputation by security and resilience investments.
Tags : 
ibm, it risk management, risk management, reputational management, outsourcing, managed services, risk mitigation, security, it management
    
IBM
Published By: IBM     Published Date: Oct 14, 2014
Interactive guide to provide insights on the key actions to take to take to safeguard your reputation by security and resilience investments.
Tags : 
it risk management, it security, resilience investments, enhanced brand value, security, it management, best practices, business intelligence
    
IBM
Published By: IBM     Published Date: Jan 09, 2015
Every organization must put a plan in place for recoverability after an outage, but testing your enterprise resilience without full business and IT validation is ineffective. Read the white paper to learn how to put a plan in place for full functional validation, and get details on the importance of validating resiliency in a live environment; learn why small-scale recovery simulations are inadequate and misleading; understand why validating resilience demands involvement from IT and the business; and get details on the checks and balances you need to maintain and validate business resilience.
Tags : 
resiliency testing, it validation, business resilience, small-scale recovery simulations, it management, knowledge management, enterprise applications, data management
    
IBM
Published By: HP     Published Date: May 14, 2014
This report documents the results of ESG Labs hands-on testing and validation of the Hewlett Packard 3PAR StoreServ 7450 Storage system, with a focus on application acceleration, autonomic simplicity, efficient unified storage, and resilience for organizations with tier-0 performance requirements.
Tags : 
3par storeserv, new style of it, storage architecture, itaas, cloud, hybrid cloud, private cloud, it management, enterprise applications
    
HP
Published By: IBM     Published Date: Feb 27, 2014
Learn about the evolution of business resiliency management and learn the best practices that are used in today's business resiliency management programs.
Tags : 
business resiliency, business resiliency management, management, best practices, ibm, planning, managing, resilience, business continuity, resiliency services, business activity monitoring, business analytics, business intelligence, business management, business process management
    
IBM
Published By: IBM     Published Date: Aug 21, 2008
IT is becoming increasingly important in virtually every aspect of business. For enterprises to compete effectively in the marketplace, IT service management must broaden its focus and take a more holistic attitude toward IT service provision. The goal is to resolve the disconnect between IT and business within organizations in order to achieve necessary levels of resilience, control, availability and quality of service.
Tags : 
ibm, ibm mi, ibm grm, service management, it management, itil, itsm
    
IBM
Published By: IBM     Published Date: Jan 23, 2013
Global organizations are increasingly emphasizing business resilience, that is, the ability to adapt rapidly to a continuously changing business environment.
Tags : 
risk management, disaster recovery, business continuity, security, email security, encryption, hacker detection, internet security, intrusion prevention, security management, vulnerability management
    
IBM
Published By: IBM     Published Date: Jan 23, 2013
Business continuity planning and IT security management are becoming an integral part of enterprise-wide risk management and business resilience frameworks at a growing number of organizations.
Tags : 
    
IBM
Published By: IBM     Published Date: Jan 23, 2013
The paper examines key factors you should consider when planning for the transition to cloud-based business resilience and in selecting your cloud partner.
Tags : 
disaster recovery, cloud computing, cloud, virtualization, data protection, business continuity, backup and recovery, storage virtualization, encryption
    
IBM
Start   Previous    1 2 3 4 5    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.