failure

Results 226 - 250 of 303Sort Results By: Published Date | Title | Company Name
Published By: Tripwire     Published Date: Nov 30, 1999
This paper covers the basic requirements of PCI, with a focus on the administrative and technical elements of the program. It also reviews the validation requirements of the standard and potential sanctions for failure to comply.
Tags : 
pci, pci compliance, payment card, credit card, credit cards, payment card industry, cisp, privacy
    
Tripwire
Published By: Tripwire     Published Date: Jul 05, 2007
Learn about the validation requirements of the payment card industry's data security standard (PCI DSS), including administrative and technical elements of the program, and the potential sanctions for failure to comply.
Tags : 
pci, pci compliance, payment card, credit card, credit cards, payment card industry, cisp, privacy
    
Tripwire
Published By: IBM     Published Date: Dec 02, 2014
In a recent Aberdeen Group Analyst Insight report,1 Asset Management: The Changing Landscape of Predictive Maintenance, a survey of executives states that the number one risk to operations was failure of their critical physical assets —ensuring that they are available, reliable and performing as originally intended. Though, such a risk can become an opportunity. Top-performing companies rely on analytics related to maintenance, safety and replacement equipment to plan for capital expenditures, manage their assets on a daily basis and maximize asset performance.
Tags : 
asset productivity, operational performance, predictive maintenance, operational costs
    
IBM
Published By: IBM     Published Date: Apr 06, 2016
As big data environments ingest more data, organizations will face significant risks and threats to the repositories containing this data. Failure to balance data security and quality reduces confidence in decision making. Read this e-Book for tips on securing big data environments
Tags : 
ibm, big data, data security, risk management
    
IBM
Published By: IBM     Published Date: Jul 15, 2016
As big data environments ingest more data, organizations will face significant risks and threats to the repositories containing this data. Failure to balance data security and quality reduces confidence in decision making. Read this e-Book for tips on securing big data environments.
Tags : 
ibm, data, security, big data
    
IBM
Published By: Hewlett-Packard     Published Date: Aug 02, 2013
Every data center IT manager must constantly deal with certain practical constraints such as time, complexity, reliability, maintainability, space, compatibility, and money. The challenge is that business application demands on computing technology often don’t cooperate with these constraints. A day is lost due to a software incompatibility introduced during an upgrade, hours are lost tracing cables to see where they go, money is spent replacing an unexpected hardware failure, and so on. Day in and day out, these sorts of interruptions burden data center productivity. Sometimes, it’s possible to temporarily improve the situation by upgrading to newer technology. Faster network bandwidth and storage media can reduce the time it takes to make backups. Faster processors — with multiple cores and larger memory address space — make it possible to practically manage virtual machines.
Tags : 
bladesystem, blade, infrastructure, blade infrastructure
    
Hewlett-Packard
Published By: IAG Consulting     Published Date: Aug 24, 2010
Requirements quality is tangible. It is possible to look at the specific characteristics of requirements documentation and determine if it is sufficiently clear, accurate and complete to lead to a successful project. Since flawed requirements trigger about 70% of all project failures,1 this paper will present some hard and fast rules for looking at requirements documents, in any format, and being able to determine if they are reasonably well constructed. It will outline the key points to look for in a requirements document, and why this can save a company hundreds of thousands of dollars. Finally, it will offer five straightforward questions to address when evaluating requirements quality. The paper is not intended to be a full audit of requirements, but rather act as a guide and checklist for evaluation.
Tags : 
iag, project management, project management, maturity, consulting, business requirements
    
IAG Consulting
Published By: Vision Solutions     Published Date: Jun 10, 2009
Journaling? RAID? Vaulting? Mirroring? High availability? Know your data protection and recovery options! Download this information-packed 29-page report that reviews the spectrum of IBM i (i5/OS) and AIX resilience and recovery technologies and best practices choices, including the latest, next-generation solutions.
Tags : 
aix, i5/os, vision, resilience, recovery, recovery solutions, os/400, ibm i
    
Vision Solutions
Published By: Vision Solutions     Published Date: Jun 10, 2009
For IT departments looking to bring their AIX environments up to the next step in data protection, IBM’s PowerHA (HACMP) connects multiple servers to shared storage via clustering. This offers automatic recovery of applications and system resources if a failure occurs with the primary server.
Tags : 
aix, i5/os, vision, resilience, recovery, recovery solutions, os/400, ibm i
    
Vision Solutions
Published By: CompareERP.com     Published Date: Jun 24, 2009
ERP failure is a very real concern for companies of all sizes. Our buying checklist helps you avoid common ERP mistakes. You learn how to buy the right system for your needs, how to negotiate a great deal, experience a smooth implementation and gain user acceptance. Learn more today!
Tags : 
erp, midmarket, assessment, vendor, demo, trial, compare erp, enterprise resource planning
    
CompareERP.com
Published By: HP Virtualization     Published Date: Mar 22, 2010
Virtually every organization understands that its successful operation depends on the continuous availability of its applications. Most companies rely on internal applications-ranging from enterprise resource planning to payroll systems-to keep the wheels of their enterprise turning. They also depend on external-facing applications for everything from selling products to their customers to automating the supply chain with suppliers and partners. The failure of any of these mission-critical applications could be catastrophic to a business.
Tags : 
business continuity
    
HP Virtualization
Published By: IBM     Published Date: Apr 10, 2013
Your goal is clear—produce high-quality goods while optimizing resources at every step of production. And in today's uncertain economy, cost-control efforts may never have been more important. Unscheduled downtime because of equipment failure can have a serious impact on your organization's bottom line. Download this white paper from IBM, and learn the basics of predictive maintenance, the benefits it provides manufacturing operations and the underlying technologies that make it possible. Predictive analytics helps you in a number of ways: identify when equipment is likely to fail or need maintenance and take action to maximize up time and reduce future warranty claims costs; optimize allocated labor resources and spare part inventories, helping eliminate undue maintenance, prevent downtime and reduce inventory costs; and determine why certain production runs fail more often than others, identify the cause and analyze whether those runs warrant a recall.
Tags : 
predictive, maintenance, manufacturing, productivity, minimize, downtime, reduce, cost-control
    
IBM
Published By: IBM     Published Date: Apr 10, 2013
Companies are pressured more than usual to get the most out of their current asset base. Read this Analyst Insight from Aberdeen Group to learn how companies are using analytics to predict asset failure to avoid costly downtime and reduce maintenance cost.
Tags : 
aberdeen, analytics, drive, predictive, maintenance, reduce, maintenance
    
IBM
Published By: ActionCOACH     Published Date: Apr 17, 2013
How can you avoid failure while employing the proper tools to gain experience? you can do it by avoiding big mistakes and learning as you go. Download this eBook to learn some of the biggest mistakes that business owners make and how you can avoid them.
Tags : 
social media, actioncoach, social marketing campaign, social marketing best practices
    
ActionCOACH
Published By: OutSystems     Published Date: Jul 15, 2014
Anyone with a mobile device these days knows all about the seemingly never-ending procession of new applications for smartphones, tablets and anything else people can carry in their pockets, purses or bags. And while apps are extremely popular, there’s also been failure with millions of attempts to build mobile applications for both business and consumer use. How can the mistakes be avoided? We asked several experts in the eld to outline some of the top pitfalls of mobile application development and how teams can avoid them to build a useful, innovative app that enables and empowers as many potential end-users as possible.
Tags : 
outsystems, applications, strategic business, innovation, app development, mobile
    
OutSystems
Published By: Cisco     Published Date: Dec 21, 2016
Identifying a shortcoming and labeling it a “failure” might be a bit of hyperbole, but it still leaves enterprises wondering if there is a place for private cloud in their strategy. This paper will attempt to answer this question, and will focus on the role of OpenStack in particular as a private cloud solution.
Tags : 
    
Cisco
Published By: Active Power     Published Date: Nov 17, 2014
This paper provides a quantitative analysis of the in-service reliability of Active Power’s CleanSource 750HD UPS (uninterruptible power supply) system versus a double-conversion UPS with batteries.
Tags : 
active power, data center power, data center batteries, power and cooling, energy, data center energy, power source
    
Active Power
Published By: Clicktale     Published Date: Oct 14, 2015
As marketers, we rely on metrics to measure our success or failure. But how effective are traditional analytics? When metrics can’t see beyond the mouse click, how can we understand what the people behind the screen are experiencing? How can we know what happened before the click, or what happens after? ClickTale’s newest eBook will show you how Digital Customer Experience metrics help you look past the numbers, and understand what your customers and visitors are really experiencing on your website. Download Digital Customer Experience Metrics: Uncovering the Behavior behind the Numbers now, and start turning metrics into actionable understanding!
Tags : 
engagement metrics, engagement optimization, website optimization, web analytics, website analytics, website engagement, user experience, user interface
    
Clicktale
Published By: Clicktale     Published Date: Feb 25, 2016
As marketers, we rely on metrics as basic tools for assessing success and failure. But marketers are also website visitors who instantly recognize poor customer experiences when they occur. Perhaps you tried to purchase a sweater online, book an urgent flight or send a bouquet of flowers, but the website was not up to par.
Tags : 
marketing, business development, website development, sales, business practices
    
Clicktale
Published By: BlackBerry Cylance     Published Date: Sep 18, 2019
“More than 70 percent of cyber attacks target small businesses," according to National Cyber Security Alliance estimates. That’s not surprising when you consider how many small and medium-sized businesses (SMBs) still rely on legacy AV tools despite their repeated failures to stop modern malware, ransomware, and zero-day attacks. Legacy AV is a lose-lose-lose proposition for SMBs. Attacks get through and cause damage. IT staff struggle to keep up with endless signature file updates from their AV vendors. End-users complain about sluggish system performance during scans and signature file updates. Fortunately, next-generation solutions are now available that protect endpoints with artificial intelligence (AI) rather than signatures. Ready to learn more? Then read the new eSecurity Planet executive brief sponsored by BlackBerry Cylance.
Tags : 
    
BlackBerry Cylance
Published By: IBM     Published Date: Apr 06, 2015
How effective is your mobile app development process when it comes to meeting customer needs and business objectives? IBM commissioned Forrester to identify the key drivers of successful mobile apps and the costs of failure -- for both customer-facing and enterprise applications. Watch the webcast to understand the key cost drivers and why it’s more important than ever to get this right due to what Forrester calls the “mobile mind shift.” IBM customer, Bank of Montreal, also shares their mobile app dev story. A good app can increase traffic, sales, productivity and brand satisfaction. And a bad app will do the opposite (you could risk doubling your costs if you’re not mindful of the key cost drivers).
Tags : 
mobile app development, customer-facing applications, enterprise applications, ibm, mobile moments, traffic, sales, productivity
    
IBM
Published By: Jive     Published Date: Apr 10, 2014
Different types of businesses will have different use cases for Social Business. In this whitepaper, we cover four different use cases at four very different types of businesses. But in each instance, the company's IT staff followed some key rules to minimize chances of failure and make it easier to convince employees and managers alike to dive into an enterprise social environment.
Tags : 
reachmail, customer relationships, engagement, customer support, best practices
    
Jive
Published By: Cisco     Published Date: Jan 05, 2016
Not long ago Gartner released an oft-quoted statistic: 95% of private clouds fail. According to Tom Bittman, VP Distinguished Analyst at Gartner, of 140 customers polled, 95% reported “something was wrong” with their private cloud. Identifying a shortcoming and labeling it a “failure” might be a bit of hyperbole, but it still leaves enterprises wondering if there is a place for private cloud in their strategy. This paper will attempt to answer this question, and will focus on the role of OpenStack in particular as a private cloud solution.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Apr 15, 2016
Not long ago Gartner released an oft-quoted statistic: 95% of private clouds fail. According to Tom Bittman, VP Distinguished Analyst at Gartner, of 140 customers polled, 95% reported “something was wrong” with their private cloud. Identifying a shortcoming and labeling it a “failure” might be a bit of hyperbole, but it still leaves enterprises wondering if there is a place for private cloud in their strategy. This paper will attempt to answer this question, and will focus on the role of OpenStack in particular as a private cloud solution.
Tags : 
cloud management, cloud services, cloud management, best practices, cloud computing
    
Cisco
Published By: Idera     Published Date: Mar 13, 2014
Recent headlines tout backup’s many failures and the struggles that organizations have with successfully executing on their backup strategies. Download this free white paper to learn how you can make backup a profitable service offering for your company.
Tags : 
idera, storage, backup, server backup, sql, microsoft
    
Idera
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.