Find White Papers
Home
About Us
List Your Papers
    

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.

downtime

Results 1 - 25 of 336Sort Results By: Published Date | Title | Company Name
Published By: Spectrum Enterprise     Published Date: Oct 29, 2018
Network failures are surprisingly common. How can you be sure your enterprise is prepared for unforeseen downtime? Network diversity and redundancy supports business continuity. Learn more about how the right network portfolio can prevent operational interruptions and assist in disaster recovery.
Tags : 
    
Spectrum Enterprise
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Ponemon Institute surveyed 538 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet properties. According to respondents, the challenges in identifying who is accessing their websites using stolen credentials complicates the ability to prevent and remediate these attacks. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. These costs are broken out into downtime, lost customers, remediation and fraud-related expenses. The survey also highlights the need for focused accountability and appropriate budget to protect businesses."
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Ponemon Institute surveyed 538 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet properties. According to respondents, the challenges in identifying who is accessing their websites using stolen credentials complicates the ability to prevent and remediate these attacks. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. These costs are broken out into downtime, lost customers, remediation and fraud-related expenses. The survey also highlights the need for focused accountability and appropriate budget to protect businesses."
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Ponemon Institute surveyed 538 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet properties. According to respondents, the challenges in identifying who is accessing their websites using stolen credentials complicates the ability to prevent and remediate these attacks. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. These costs are broken out into downtime, lost customers, remediation and fraud-related expenses. The survey also highlights the need for focused accountability and appropriate budget to protect businesses."
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Ponemon Institute surveyed 538 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet properties. According to respondents, the challenges in identifying who is accessing their websites using stolen credentials complicates the ability to prevent and remediate these attacks. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. These costs are broken out into downtime, lost customers, remediation and fraud-related expenses. The survey also highlights the need for focused accountability and appropriate budget to protect businesses."
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Ponemon Institute surveyed 538 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet properties. According to respondents, the challenges in identifying who is accessing their websites using stolen credentials complicates the ability to prevent and remediate these attacks. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. These costs are broken out into downtime, lost customers, remediation and fraud-related expenses. The survey also highlights the need for focused accountability and appropriate budget to protect businesses."
Tags : 
    
Akamai Technologies
Published By: Carbonite     Published Date: Oct 10, 2018
There are five essential steps to protecting data and applications from the most common causes of data loss and downtime. IT pros who follow these steps can feel confident in their long-term organizational plan. Read this expert guide from Ben Maas, an independent consultant and system architect who has guided many companies through backup and disaster recovery (BDR) deployments.
Tags : 
    
Carbonite
Published By: TIBCO Software EMEA     Published Date: Sep 12, 2018
By processing real-time data from machine sensors using artificial intelligence and machine learning, it’s possible to predict critical events and take preventive action to avoid problems. TIBCO helps manufacturers around the world predict issues with greater accuracy, reduce downtime, increase quality, and improve yield. Read about our top data science best practices for becoming a smart manufacturer.
Tags : 
inter-company connectivity, real-time tracking, automate analytic models, efficient analytics, collaboration
    
TIBCO Software EMEA
Published By: TIBCO Software EMEA     Published Date: Sep 12, 2018
The Internet of Things (IoT) didn’t just connect everything everywhere; It laid the groundwork for the next industrial revolution. Connected devices sending data was only one achievement of the IoT—but one that helped solve the problem of data spread across countless silos that was not collected because it was too voluminous and/or too expensive to analyze. Now, with advances in cloud computing and analytics, cheaper and more scalable factory solutions are available. This, in combination with the cost and size of sensors continuously being reduced, supplies the other achievement: the possibility for every organization to digitally transform. Using a Smart Factory system, all relevant data is aggregated, analyzed, and acted upon. Sensors, devices, people, and processes are part of a connected ecosystem providing: • Reduced downtime • Minimized surplus and defects • Deep insights • End-to-end real-time visibility
Tags : 
internet of things, connected ecosystem, big data, operations monitoring, process control, analytical techniques
    
TIBCO Software EMEA
Published By: Tripp Lite     Published Date: May 15, 2018
As organizations pursue improvements in reliability and energy efficiency, power design in data centers gets substantial attention—particularly from facilities and engineering personnel. At the same time, however, many IT professionals tend to spend little time or energy on the specific products they use to deliver and distribute electrical power. In?rack power is often considered less strategically important than which servers or databases to deploy, and it is often one of the last decisions to be made in the overall design of the data center. But choosing the right in-rack power solutions can save organizations from potentially crippling downtime and deliver significant up-front and ongoing savings through improved IT efficiency and data center infrastructure management.
Tags : 
    
Tripp Lite
Published By: Tripp Lite     Published Date: Jun 28, 2018
Cooling tends to take a back seat to other concerns when server rooms and small to mid-size data centers are first built. As computing needs grow, increased heat production can compromise equipment performance and cause shutdowns. Haphazard data center expansion creates cooling inefficiencies that magnify these heat-related problems. End users may assume they need to increase cooling capacity, but this is often unnecessary. In most cases, low-cost rack cooling best practices will solve heat-related problems. Best practices optimize airflow, increase efficiency, prevent downtime and reduce costs.
Tags : 
    
Tripp Lite
Published By: Tripp Lite     Published Date: Jun 28, 2018
When you’re designing a data center, server room or network closet, deciding which racks to deploy and how to configure them should be at the top of your list. Just like building a house, the surface details may steal the spotlight, but it’s the quality of the underlying foundation that makes the difference between success and frustration. Racks organize IT equipment, such as servers and network switches, into standardized assemblies that make efficient use of space and other resources. Depending on the options you choose, they can also improve power protection, cooling, cable management, device management, physical security, mobility, ease of installation and protection from harsh environmental conditions. Choosing the right racks and configuring them to match your needs will ensure that your IT equipment operates reliably and efficiently, saving your organization from costly downtime and other needless expenses.
Tags : 
    
Tripp Lite
Published By: Amazon Web Services     Published Date: Oct 30, 2018
Enhance the Availability & Performance of SAP HANA Apps Abstract: SAP HANA delivers powerful analytics capabilities that can help you improve business performance and drive digital transformation. You can more easily build reliable and performant SAP HANA-powered landscapes with SUSE Linux Enterprise Server for SAP Applications and Amazon Web Services (AWS). That’s because SUSE can help you achieve near zero downtime and sustain high-performance levels, while AWS delivers a broad and deep set of cloud services that are certified to fulfill the compute, memory, and storage requirements of SAP HANA.
Tags : 
availability, performance, sap, hana, apps
    
Amazon Web Services
Published By: Shell     Published Date: Aug 27, 2018
While simple fixes may cost a few thousand dollars, lost revenue from equipment failures can run into the millions of dollars in lost productivity and replacement costs. There can be longer-term impacts, too, if the downtime inhibits a manufacturer’s ability to meet customer needs. That’s why it is important for companies to think about lubrication and equipment maintenance holistically, recognizing that short term cost savings may be leading to bigger, preventable expenses over the long term. By adopting a total cost of ownership (TCO) program, companies can find efficiencies they didn’t even know existed and reap benefits they didn’t realize were possible. Download our white paper, “The Cost Reduction Game,” to learn more about how a TCO program can help increase equipment reliability, extend equipment life, and lower energy costs.
Tags : 
cost, reduction, equipment, shell, manufacturing, maintenance, reliability, contamination control
    
Shell
Published By: Velaro     Published Date: Jul 09, 2014
Application downtime impacts everyone. This paper provides best practices for communicating application downtime to end-users in a manner that maintains - or can even improve- your organization's credibility and brand image. Learn what to do and what not to do in this informative white paper.
Tags : 
    
Velaro
Published By: Vision Solutions     Published Date: Sep 11, 2008
Journaling is a powerful feature, one that IBM has continued to develop and improve over the years. Yet, depending upon your business requirements, you probably still need more protection against downtime than journaling alone can provide. This white paper will cover what you need to know about journaling, what it can do and how it supports and cooperates with high availability software.
Tags : 
vision, high availability, ibm, idata protection, journaling, as/400, database development, data integration, data protection, data replication
    
Vision Solutions
Published By: Vision Solutions     Published Date: Feb 18, 2008
Continuous member service is an important deliverable for credit unions, and. the continued growth in assets and members means that the impact of downtime is affecting a larger base and is therefore potentially much more costly. Learn how new data protection and recovery technologies are making a huge impact on downtime for credit unions that depend on AIX-hosted applications.
Tags : 
vision, high availability, ibm, aix, cdp, core union, as/400, data protection, database security
    
Vision Solutions
Published By: APC by Schneider Electric     Published Date: Feb 09, 2011
In the broadening data center cost-saving and energy efficiency discussion, data center physical infrastructure preventive maintenance (PM) is sometimes neglected as an important tool for controlling TCO and downtime. PM is performed specifically to prevent faults from occurring. IT and facilities managers can improve systems uptime through a better understanding of PM best practices.
Tags : 
absolute, data protection, maitenance, ups, physical infrastructure, infrastructure, data loss protection, dlp, ponemon, it security, sensitive data
    
APC by Schneider Electric
Published By: Intel Corp.     Published Date: May 15, 2018
Intel's factories rely on thousands of PCs for manufacturing automation; keeping these PCs up and running can prevent expensive downtime. To manage these systems, Intel IT is using the Intel vPro platform's hardware- based feature, Intel Active Management Technology (Intel AMT), to help reduce production downtime caused by PC incidents by 87.5 percent.
Tags : 
    
Intel Corp.
Published By: Hewlett Packard Enterprise     Published Date: Aug 15, 2016
Download this white paper to learn more about these notable findings from IDC's study of HP DC Service customers. HP Datacenter Care Service can reduce the costs of delivering mission-critical business processes by 23%. HP's Datacenter Care Service solution is able to reduce downtime by 88%, adding five hours of uptime annually to each internal user and $835,000 in revenue to each organization. Increasingly, x86 servers will need a higher level of operational support. On average, companies in this study were able to recognize an average ROI of 456% and pay back the initial investment in HP DC Service in six months.
Tags : 
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Mar 26, 2018
Business users expect immediate access to data, all the time and without interruption. But reality does not always meet expectations. IT leaders must constantly perform intricate forensic work to unravel the maze of issues that impact data delivery to applications. This performance gap between the data and the application creates a bottleneck that impacts productivity and ultimately damages a business’ ability to operate effectively. We term this the “app-data gap.”
Tags : 
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Mar 26, 2018
Businesses in every sector are increasingly reliant on applications to handle everything from back-end operations to the delivery of new products, services, and customer experiences. That is why infrastructure system availability and the elimination of unplanned downtime are more important than ever before. Recent research has shown that the average cost of an hour of downtime is about half-a-million dollars,1 and this will only increase with the continued digitization of industries.
Tags : 
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Apr 20, 2018
In an innovation-powered economy, ideas need to travel at the speed of thought. Yet even as our ability to communicate across companies and time zones grows rapidly, people remain frustrated by downtime and unanticipated delays across the increasingly complex grid of cloud-based infrastructure, data networks, storage systems, and servers that power our work.
Tags : 
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Jul 19, 2018
"This research by Nimble Storage, a Hewlett Packard Enterprise Company, outlines the top five causes of application delays. The report analyzes more than 12,000 anonymized cases of downtime and slow performance. Read this report and find out: Top 5 causes of downtime and poor performance across the infrastructure stack How machine learning and predictive analytics can prevent issues Steps you can take to boost performance and availability"
Tags : 
cloud, nimble storage, infrastructure
    
Hewlett Packard Enterprise
Published By: Akamai Technologies     Published Date: Nov 10, 2017
Ponemon Institute surveyed 569 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet properties. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. According to respondents, these attacks cause costly application downtime, loss of customers, and involvement of IT security that can result in a cost of millions of dollars. The survey highlights the challenges in identifying who is accessing their websites using stolen credentials, as well as the difficulty in preventing and remediating these attacks.
Tags : 
poneman, credential stuffing, it security, damage mitigation, research report
    
Akamai Technologies
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search