failure

Results 126 - 150 of 291Sort Results By: Published Date | Title | Company Name
By: Veeam '18     Published Date: May 01, 2019
The digital revolution is transforming every industry. Yet it also brings new challenges: threats to the security and Availability of mission-critical data and services. Approximately 80% of IT decision-makers say their organization has an Availability gap, that is, a failure to meet recovery requirements—a common issue across all industries. 75% say they also have a data protection gap, meaning they are unable to protect their data frequently enough to ensure that business units’ expectations against data loss are being met.
Tags : 
     Veeam '18
By: Worldpay     Published Date: Apr 29, 2015
In 2014, the UK saw online sales exceed £10bn per month. For small businesses, getting online is a great way to increase revenue. However, there’s no escaping the fact that small e-retailers are most at risk of suffering a data breach and that breaches are increasing. It is your responsibility to keep the card payment data of your customers safe and a failure to secure your systems could be a costly mistake which leads to penalty fines, lost custom and bad publicity. Worldpay is the leading payments provider in the UK and Europe. Whilst Worldpay has fewer businesses suffering data breaches, compared to our market size, we have a unique oversight on most UK card data breaches. We have compiled our insight and advice into this guide so all businesses, new or old, can ensure they are prepared.
Tags : ecommerce, payments, online payments, small business, fraud, security, card payments, card data
     Worldpay
By: Winshuttle     Published Date: Aug 17, 2017
How do you invest resources and plan budgets for your organization? The answer to that question often predicts business success or failure. Most organizations have similar goals: They want to achieve business insights from accurate data so they can optimize their business processes and balance organizational needs with financial objectives.
Tags : sap, budget, budgeting, planning, sap finance, sap master data, sap implementations, s/4hana
     Winshuttle
By: Riverbed     Published Date: Feb 26, 2015
The goal of understanding and managing service behavior remains elusive. Failure to adopt operational practices such as service portfolio management, process refinement, consolidation of tools, and consolidation of the organizational entities themselves explain most of the trouble.
Tags : service management, application visibility, operational practices, infrastructure, application monitoring, database monitoring, cloud performance management, network management
     Riverbed
By: Return Path     Published Date: Jan 29, 2013
Measuring your data can be difficult, but knowing what to do next is even harder. Identify issues quickly with the “Email Metrics Troubleshooter” checklist, so you can focus less time on identifying problems and more time on reaching your goals.
Tags : email failure, high unsubscribe rate, low click-through rate, drop in open rate, low response rate, rise in traffic but not in conversion, email trends, email marketing trends
     Return Path
By: Epicor     Published Date: Aug 03, 2012
Do you cringe at the thought of having to replace your enterprise software solution? Does it seem like a monumental undertaking, with a high risk of failure?
Tags : cloud computing, software solutions, distributors, marketing groups, rfp, planning, decision-making, buyers
     Epicor
By: Adaptive Growth     Published Date: Feb 25, 2008
In what practical ways – if any – is ERP implementation project success different from the absence of failure? Both casual and thorough analysis of ERP failure agree on several interesting points.
Tags : erp, adaptive growth, project management, enterprise applications, enterprise resource planning, adaptivegrowth
     Adaptive Growth
By: Adaptive Growth     Published Date: Mar 12, 2008
ERP system acquisition projects are rarely deemed to fail.  All the well-advertised failures come later, during implementation and afterward.  Nevertheless, the seeds of these failures are invariably planted in the earliest stages of ERP acquisition planning.
Tags : erp, adaptive growth, project management, enterprise applications, enterprise resource planning, adaptivegrowth
     Adaptive Growth
By: Adaptive Growth     Published Date: May 14, 2008
Projects to implement ERP tend to be difficult, expensive and drawn-out. They are often full of painful surprises and overrun budgets and schedules that were extravagant in the first place. They fail entirely in an alarming number of cases.  Why this should be so is not immediately apparent. If we list, at a fairly high level, the tasks required to implement an ERP system in a company that’s already familiar with ERP practices, what we see is a significant but not daunting amount of work.
Tags : erp, project management, adaptive growth, enterprise applications, enterprise resource planning
     Adaptive Growth
By: VMware     Published Date: Mar 16, 2009
Mid-sized businesses have long struggled to protect their IT systems. Many firms are inadequately protected and mistakenly think that a disaster is rare and won’t happen to them anytime soon. This custom Yankee Group Report uses customer interviews, statistical data and Yankee Group SMB survey results to examine disaster recovery (DR) issues.
Tags : vmware, disaster recovery, smb, it system, it infastructure, virtualization, storage replication, ups
     VMware
By: Symantec.cloud     Published Date: May 11, 2012
Read When Good Backups Go Bad: Data Recovery Failures and What to Do About Them to understand backup challenges, impacts, and solutions. Don't let your business fall victim to downtime because of a computer or system failure.
Tags : symantec, cloud, backup, technology, system failure, recovery, authentication, disaster recovery
     Symantec.cloud
By: ForeScout     Published Date: Aug 14, 2012
Information security has undergone a sea change in the past 10 years. Compliance mandates in the form of industry standards and Federal rules like NERC, FFIEC, HIPAA/HITECH and PCI-DSS are the new norm. To stay in compliance, IT teams need to be able to keep up with updatesand changes to existing mandates while also being prepared for new ones. To maximize efficiency, manage risk and reduce potential violations due to compliance failure, organizations need to implement security tools whose features support multiple specifications within and across different compliance frameworks.
Tags : forescout, counteract, compliance, independent, assesment, network, access, control
     ForeScout
By: The Starr Conspiracy     Published Date: Apr 03, 2017
The true failure points for HCM tech startups are less obvious than poor product quality or a lack of money. View our latest Lightpaper® for a breakdown of the patterns we witness time and time again that cause many startups to end up in the junk pile.
Tags : starr conspiracy, hcm, hr technology, startups
     The Starr Conspiracy
By: LogRhythm     Published Date: Jun 19, 2018
As in years past, 2017 was packed with stories of cyber security failure. Between sophisticated attackers, lack of proper security monitoring and controls implementation, and devastating data breaches that may have arisen from these scenarios, it’s easy to see that we still face serious challenges in the security arena, with potentially serious consequences. Why are we continually seeing these issues? Many security professionals readily admit that we don’t have the staff, training and breadth of coverage in our security controls to adequately combat the attackers today. How is this happening when we’re spending so much money and time on cyber security?
Tags : logrhythm, sans, cloudai, ueba
     LogRhythm
By: Anaplan     Published Date: Sep 07, 2018
For many years, large corporations have employed financial planning and analysis professionals to oversee budgeting, planning, forecasting and analysis. But the sea-change in technology, data and the competitive landscape is having a sustained impact on the FP&A function as it transforms from a predominately budgeting function to a forward-focussed strategic contributor. Now, as new cloud technology makes implementing modern FP&A quicker and cheaper, the function has become more accessible to medium-sized, or even smaller, organisations. There is a nascent but growing realisation that this corner of the finance function should be demanding more of an organisation’s attention, large or small, because having accurate and timely visibility, further into the future, could mean the difference between success and failure in today’s highly uncertain and volatile business environment.
Tags : 
     Anaplan
By: Cloudian     Published Date: Feb 15, 2018
Not so long ago, if you asked a business executive, “what is the most irreplaceable part of your business?” they might have pointed at their building or their employees. The really forward-thinking execs may have chosen their customers. But the reality is that businesses have insurance to deal with the loss of a building; they can hire new employees; and they can acquire new customers. The one thing that is truly irreplaceable is their data. Lose that and you really are out of business. The potential risks to your data can be as subtle as the malfunction of tiny areas on a disk drive or as enormous as the failure of an entire data center. That means it’s not enough just to protect your data — you must also select the best way to protect it. To deliver that protection in an economical and rapidly recoverable way requires a system that gives you complete control to determine levels of data protection based on the type of data. In this paper, we’ll talk about the science of data protect
Tags : 
     Cloudian
By: Lenovo and Intel     Published Date: Jul 10, 2018
The risk of cyber attacks and the cost of failure are increasing. Penalties associated with failure are only going to increase. And these challenges are compounded by increasing collaboration, use of cloud-based solutions, and an increasingly mobile workforce. Join experts from Forrester, Lenovo and Microsoft as they explore Forrester’s newly updated Zero Trust Extended framework. Then Lenovo covers how the four core components of its Data, Identity, Online and Device (DIODe) approach can minimize risk to data and critical IT. By taking these important steps toward a full Zero Trust Extended framework, you can: Protect the business from advanced threats Reduce the impact of breaches Easily support new business and operating models Rise to the challenge of evolving regulations like FISMA, HIPPA, PCI and GDPR
Tags : 
     Lenovo and Intel
By: Shell     Published Date: Aug 15, 2018
While simple fixes may cost a few thousand dollars, lost revenue from equipment failures can run into the millions of dollars in lost productivity and replacement costs. There can be longer-term impacts, too, if the downtime inhibits a manufacturer’s ability to meet customer needs. That’s why it is important for companies to think about lubrication and equipment maintenance holistically, recognizing that short term cost savings may be leading to bigger, preventable expenses over the long term. Cheaper oil, for example, may save money initially, but it requires more frequent changes and provides less protection to the equipment, which could shorten component life. For many companies, the short-term savings simply aren’t worth the longterm cost risk. “Some companies don’t realize that they may be able to reduce their overall maintenance costs significantly by spending more up front on better quality lubricants,” Saffell says. “Their equipment may last longer and they are likely to see
Tags : cost, reduction, equipment, shell, manufacturing, maintenance, reliability, contamination control
     Shell
By: Shell     Published Date: Aug 27, 2018
While simple fixes may cost a few thousand dollars, lost revenue from equipment failures can run into the millions of dollars in lost productivity and replacement costs. There can be longer-term impacts, too, if the downtime inhibits a manufacturer’s ability to meet customer needs. That’s why it is important for companies to think about lubrication and equipment maintenance holistically, recognizing that short term cost savings may be leading to bigger, preventable expenses over the long term. By adopting a total cost of ownership (TCO) program, companies can find efficiencies they didn’t even know existed and reap benefits they didn’t realize were possible. Download our white paper, “The Cost Reduction Game,” to learn more about how a TCO program can help increase equipment reliability, extend equipment life, and lower energy costs.
Tags : cost, reduction, equipment, shell, manufacturing, maintenance, reliability, contamination control
     Shell
By: Shell     Published Date: Nov 19, 2018
Your turbine operates in tough conditions—running at high temperatures and exposed to a ton of contaminants. As the pressure to perform builds on your turbine, your turbine oil can start to degrade. Read this brief and learn why monitoring turbine oil condition can be critical to preventing unplanned downtime. You'll also: • Discover the causes of sludge and varnish formation that lead to critical component failure • Understand how common contaminants contribute to degradation processes like hydrolysis • Find out why oil additives become depleted, significantly impacting oil life and performance GET THE BRIEF ON CAUSES AND CURES OF OIL DEGRADATION. In the brief, you’ll learn some of the common causes of turbine oil degradation that happen all the time during the course of turbine operation. Download the brief and learn how to avoid problems like contamination and varnish build-up that can really cost your operation money in unplanned maintenance, repairs, and downtime.
Tags : 
     Shell
By: Shell     Published Date: May 30, 2019
The cost of a single turbine failure – whether it’s a steam, gas, water or combined cycle turbine - can amount to hundreds of thousands of dollars per hour. Avoiding turbine outages is business critical, but do you know what warning signs to look out for, and what steps to take to get to the root of the problem?
Tags : 
     Shell
By: F5 Networks Singapore Pte Ltd     Published Date: Jan 28, 2019
You’ve been having trouble sleeping because of the SSL visibility problem with all the fancy security tools that don’t do decryption. Put down that ambien, because this Lightboard Lesson solves it. In episode, David Holmes diagrams the Right Way (tm) to decrypt and orchestrate outbound SSL traffic, improving SSL visibility, decreasing failures and improving network performance.
Tags : ssl, outbound visibility
     F5 Networks Singapore Pte Ltd
By: F5 Networks Singapore Pte Ltd     Published Date: Jan 28, 2019
You’ve been having trouble sleeping because of the SSL visibility problem with all the fancy security tools that don’t do decryption. Put down that ambien, because this Lightboard Lesson solves it. In episode, David Holmes diagrams the Right Way (tm) to decrypt and orchestrate outbound SSL traffic, improving SSL visibility, decreasing failures and improving network performance.
Tags : ssl, outbound visibility
     F5 Networks Singapore Pte Ltd
By: Zebra Technologies     Published Date: May 02, 2018
Up to 14% of medical records include inaccurate, potentially dangerous patient data as a direct result of failures in patient identification. Often, errors can be attributed to outdated manual processes, such as oral verification or written wristbands, which can impact the standard of care delivered. In this white paper Zebra Technologies outlines the benefits of an automated barcode wristband solution, including insight into: Reducing common Patient ID errors The advantages of automated Patient ID processes over manual The best automated barcoding options
Tags : patient, identification, streamline, hospital, processes, optimization, zebra
     Zebra Technologies
By: HP     Published Date: Jun 23, 2008
HP StorageWorks XP Disk Arrays are enterprise-class storage systems that deliver dependable performance for environments where downtime is not an option. Complete redundancy throughout the architecture provides non-disruptive online upgrades and no single point of failure so you can count on your data being available.
Tags : disaster proof, hp disaster proof, disaster-proof, disk array, storageworks, storage, infrastructure, storage management
     HP
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search White Papers      

Add White Papers

Get your company's white papers in the hands of targeted business professionals.