Find White Papers
Home
About Us
List Your Papers
    

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.

failure

Results 1 - 25 of 229Sort Results By: Published Date | Title | Company Name
Published By: Dell PC Lifecycle     Published Date: Mar 13, 2018
Fresenius Medical Care North America is the premier provider of the highest quality healthcare to people with renal and other chronic conditions. In the US, 640,000 people live their lives with end-stage renal disease. Worldwide, more than three million people suffer from chronic kidney failure. Through its industry-leading network of 2,200 dialysis centers in the U.S., outpatient cardiac and vascular labs, and urgent care centers—as well as North America’s largest practice of hospital and post-acute care providers—Fresenius Medical Care North America provides coordinated care for over 180,000 U.S. patients.
Tags : 
    
Dell PC Lifecycle
Published By: Group M_IBM Q1'18     Published Date: Feb 15, 2018
IBM SPSS predictive analytics solutions help uncover key predictors that lead to online student success or failure. Identifying specific issues early, target intervention measures for at-risk students, and take the appropriate steps to help improve online student graduation rates.
Tags : 
online education, online students, graduation rates, spss
    
Group M_IBM Q1'18
Published By: Magento     Published Date: Mar 28, 2018
International retail sales are expected to increase by 5.5% to $28.3 trillion by 2018. launching an international site can take up valuable time and resources, and missteps can be costly. From web page layout, to word definitions and cultural preferences, countries have widely varying practices and unique online user behaviors. How efficiently you manage changes in culture, language, customs, currency, tax, and laws can make the difference between success and failure. POWER YOUR BUSINESS TO EXPAND RAPIDLY INTO FOREIGN MARKETS: Think Local and Flexible to Act Global Communicate in Other Cultures Design a Flexible and Scalable Global Process Efficiently Manage Multiple International Sites
Tags : 
international, markets, company, globally, competition
    
Magento
Published By: Cisco EMEA Tier 3 ABM     Published Date: Nov 13, 2017
The HX Data Platform uses a self-healing architecture that implements data replication for high availability, remediates hardware failures, and alerts your IT administrators so that problems can be resolved quickly and your business can continue to operate. Space-efficient, pointerbased snapshots facilitate backup operations, and native replication supports cross-site protection. Data-at-rest encryption protects data from security risks and threats. Integration with leading enterprise backup systems allows you to extend your preferred data protection tools to your hyperconverged environment.
Tags : 
hyperflex, systems, data platform, storage efficiency, business, cisco
    
Cisco EMEA Tier 3 ABM
Published By: Hewlett Packard Enterprise     Published Date: Oct 24, 2017
Security is a looming issue for organizations. The threat landscape is increasing, and attacks are becoming more sophisticated. Emerging technologies like IoT, mobility, and hybrid IT environments now open new organization opportunity, but they also introduce new risk. Protecting servers at the software level is no longer enough. Organizations need to reach down into the physical system level to stay ahead of threats. With today’s increasing regulatory landscape, compliance is more critical for both increasing security and reducing the cost of compliance failures. With these pieces being so critical, it is important to bring new levels of hardware protection and drive security all the way down to the supply chain level. Hewlett Packard Enterprise (HPE) has a strategy to deliver this through its unique server firmware protection, detection, and recovery capabilities, as well as its HPE Security Assurance.
Tags : 
cloud optimization, cloud efficiency, cloud management, cloud assurance, cloud visibility, enterprise management, data management
    
Hewlett Packard Enterprise
Published By: Commvault     Published Date: Jul 06, 2016
Snapshot-based data protection solutions were supposed to solve our backup challenges, weren’t they? Then why are your backups still broken? If your snapshots are manually managed or of the “build-it-yourself” variety, there may be several reasons that they aren’t working very well.
Tags : 
commvault, storage snapshot based data protection, data protection, backup and recovery, intellisnap, array snapshot management, single point of failure, it management, network attached storage, best practices
    
Commvault
Published By: HP     Published Date: Dec 05, 2014
Do you have your arms around your Windows Server 2003 migration? Sure, your team has probably headed up countless maintenance initiatives in the past - upgrades, refreshes, migrations. But if you make the mistake of thinking your Windows Server 2003 migration is more of the same, you will lose on two fronts. First, you will underestimate the complexity of the effort, thus increasing the chance of failure by overrunning timeline and budget. More importantly, you will miss the opportunity to bring value to your business. This paper introduces five considerations that will change your perspective on the Windows Server migration initiative - and spur technical, finance and line of business employees to jump on board.
Tags : 
server, performance, efficiency, application, infrastructure, information technology, mobility, cloud, storage, data, speed, software
    
HP
Published By: HPE     Published Date: Feb 11, 2015
Do you have your arms around your Windows Server 2003 migration? Sure, your team has probably headed up countless maintenance initiatives in the past - upgrades, refreshes, migrations. But if you make the mistake of thinking your Windows Server 2003 migration is more of the same, you will lose on two fronts. First, you will underestimate the complexity of the effort, thus increasing the chance of failure by overrunning timeline and budget. More importantly, you will miss the opportunity to bring value to your business. This paper introduces five considerations that will change your perspective on the Windows Server migration initiative - and spur technical, finance and line of business employees to jump on board.
Tags : 
    
HPE
Published By: Akamai Technologies     Published Date: Apr 13, 2018
In September 2017, Akamai commissioned Forrester Consulting to examine how companies approach digital experience and digital security. A survey of over 350 IT executives around the world found that: Customer trust is at an all-time low and it’s hurting growth Executives are aware that customer trust is becoming critical to success Companies struggle to balance security with digital experience Failure to deliver on security impacts brand reputation, customer trust, and revenues This report, Drop A Pin At The Intersection Of Digital Experience And Security, shares insights into these findings and what sets top digital businesses apart.
Tags : 
digital, experience, security, executives, customer
    
Akamai Technologies
Published By: Venafi     Published Date: Aug 07, 2015
This paper reveals how not securing all of your keys and certificates enables cybercriminals to bypass controls like threat detection, data protection, firewalls, VPNs, DLP, privileged access, and authentication systems that you expect will mitigate threats.
Tags : 
security, protect keys, security controls, cyber-attacks, cybercriminals, threat detection, data protection, firewalls, authentication, protect digital certificates, reduce risks, access control, anti spam, anti spyware, anti virus, application security, disaster recovery, security management, security policies
    
Venafi
Published By: EMC Converged Platforms     Published Date: Oct 22, 2015
Old Dutch Foods, known for its broad selection of snack foods in the midwest United States and Canada, was struggling to get the right products to the right places at the right time. Its data center included outdated physical servers, and batch processing meant that inventory would not be updated until the end of the day as opposed to real time. In addition, recovering from power outages and disk failures could frequently take up to two weeks. To modernize its data center, Old Dutch Foods invested in EMC Converged Infrastructure. The fast and easy deployment of two VCE VBlock® systems running JD Edwards, MS Exchange, mobile device apps, and operation of a backup site with replicated applications and data. This enhanced the IT department's responsiveness to the business, allowed them to shift to real-time inventory, and reduced CapEx and OpEx costs. Operations were simplified by reducing person-hours needed for infrastructure maintenance by 75 percent.
Tags : 
    
EMC Converged Platforms
Published By: Venafi     Published Date: Mar 26, 2015
Advanced Persistent Threat (APT) operators have proven they can breach enterprises like yours by undermining your critical security controls when you fail to protect digital certificates and cryptographic keys. Not securing all of your keys and certificates enables cybercriminals to bypass controls like threat detection, data protection, firewalls, VPNs, DLP, privileged access, and authentication systems that you expect will mitigate threats.
Tags : 
keys, certificates, security controls, apt, advances persistent threat, cryptographic keys, cybercriminals, cyber attacks, cyber defense, vpn, dlp, privileged access, authentication systems
    
Venafi
Published By: Prophix     Published Date: Jun 03, 2016
Prophix and IMA hosted a webcast, titled “Overcoming Barriers to Implement CPM Methods”, featuring subject matter expert Gary Cokins, the CEO, at Analytics-Based Performance Management. The adoption rate of business analytics and corporate performance management (CPM) methods has been slowed by various barriers. Gary Cokins outlines the causes of this lag, as well as lessons learned about how to overcome obstacles, and obtain buy-in to manage and improve performance. He describes techniques such as strategy maps, balanced scorecards with key performance indicators (KPIs), channel and customer profitability reporting, and driver-based budgeting that can prevent failure when implementing CPM methods.
Tags : 
prophix, best practices, performance management, business analytics, productivity, information management
    
Prophix
Published By: MarkLogic     Published Date: Jun 09, 2017
Your high-stakes data projects don’t have to end – as analysts predict – in failure. Don’t just rely on legacy technology and outdated thinking - the key is to start your next data project armed with the right technology and mindset to succeed. This paper will give you insights and guidelines to help you learn how to leverage all of your data to reach your data integration objectives with less time and expense than you might imagine. Change is good, and in this paper we’ll give you real-world examples of organizations that embraced change and found success.
Tags : 
    
MarkLogic
Published By: Workforce Software     Published Date: Jun 04, 2015
In the case of a technology project seeking to hit its mark—from staying on budget to achieving the desired results—these failures can be traced back to shortcomings in how the human element of the project was managed. Download to learn more!
Tags : 
workforce software, workforce management, pay slip, government regulations, compliance, labour regulations
    
Workforce Software
Published By: Puppet     Published Date: Mar 09, 2017
System administrators and other IT practitioners spend as much as 50% of their time on routine, repetitive tasks. Does the following apply to your organization? • You go from one server to the next, installing the same package on all of them. It works nine times out of 10, but the tenth time causes a failure ... and you can't identify what went wrong. • You can't scale. When the business wants to move to the cloud, or asks for faster provisioning of development and test environments, you only have so many hours in the day — and you can't meet everyone's needs. • You don't have time to get to the work that matters. You spend too much time on routine system management, and can't prepare for the projects that will bring real business value to your team — and customers. With growing demands from all corners of your organization, you simply can't keep doing it all manually. Download this paper to learn how you can benefit from automation, and how IT infrastructure can become a strategic ass
Tags : 
    
Puppet
Published By: CA Technologies     Published Date: Sep 25, 2017
Agile may be simple, but it still takes work. Often, organizations fail to adopt agile methods for similar reasons, and many of these reasons are cultural. From checkbook commitment and lack of executive support to ineffective retrospectives and bad product ownership, this e-book describes the 12 agile failure modes to avoid so you can succeed with your own agile transformation.
Tags : 
leadership, workflow, congruence, transition, ca technologies
    
CA Technologies
Published By: CA Technologies     Published Date: Sep 25, 2017
CA has reevaluated the design methodology behind its PPM tool to deliver an end-user-driven solution that better reflects the goals and motivations of the entire team, helps to ensure project confidence and removes the stress associated with the possibility of project failure. At the core of this new design methodology is our proprietary research, which unquestionably points to the need for an outcome-driven approach to innovation, chiefly concerned with understanding and measuring the customer’s success criteria.
Tags : 
project management, company optimization, execution, product development, research report, web based, business impacts
    
CA Technologies
Published By: Datto Inc.     Published Date: May 08, 2013
TAG Computer Services shares why a golf course and real estate office need business continuity. This success story outlines what happens after two of their clients experienced server failure, yet TAG was able to minimize downtime and ensure business continuity.
Tags : 
datto, virus protection, msp, managed service provider, backup and recovery, disaster recovery, business continuity
    
Datto Inc.
Published By: CA Technologies     Published Date: Aug 21, 2017
By necessity, every company is now a software company. By 2017, two-thirds of customer service transactions will no longer require the support of a human intermediary. That means that if you haven’t already done so, you must adapt your business model to meet the needs of online customers. Failure to do so will put you at a severe competitive disadvantage. And chief among those demands is that you provide an exceptional user experience. App speed, reliability and ease of use are the new currency in this fast-changing landscape. In fact, app characteristics such as convenience and the ability to save users time can enhance brand loyalty by 60 percent or more.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 21, 2017
Agile may be simple, but it still takes work. Often, organizations fail to adopt agile methods for similar reasons, and many of these reasons are cultural. From checkbook commitment and lack of executive support to ineffective retrospectives and bad product ownership, this e-book describes the 12 agile failure modes to avoid so you can succeed with your own agile transformation.
Tags : 
    
CA Technologies
Published By: Dyn     Published Date: Nov 03, 2016
Global DNS performance and availability are critical to user experience. According to Gartner, “DNS is mission-critical to all organizations that connect to the internet. DNS failure or poor performance leads to applications, data and content becoming unavailable, causing user frustration, lost sales and business reputation damage.” But many businesses still rely on a single, often in-house DNS solution that lacks global scale and resiliency. This white paper reviews the business advantages of implementing a high availability DNS architecture using redundant DNS services. You will learn: - The critical role DNS plays in the user experience. - The risks of relying solely on a single DNS solution. - The added performance and reliability benefits of a high availability DNS architecture with a redundant managed DNS service. - Criteria for evaluating a managed DNS service provider.
Tags : 
dyn, dns, downtime risk, end-user experience, networking, enterprise applications
    
Dyn
Published By: Proofpoint     Published Date: Aug 10, 2017
With data breaches at an all-time high, the time is now for organisations to identify and protect all personal EU data, and drive towards compliance to the GDPR–failure to do so will lead to significant disruption of business. What’s more, adhering to a compliance and standards based framework can ultimately help the business attract and retain more customers. In the case of the GDPR, compliance demonstrates the organisation’s investments in security, privacy, and customer care.
Tags : 
data audit, eu data, vendor risk, organisation, technology, archive management, messaging, content protection
    
Proofpoint
Published By: HP - Enterprise     Published Date: Jun 05, 2013
As the networks become ever more essential to business processes, they are also increasing rapidly in size and complexity. Many factors can affect network availability and performance—increasing traffic, configuration problems, failed network elements, changes, and more. Since not all of these problems are hard failures, managing the network to detect and correct business-impacting problems requires new tools, strategies, and initiatives. To deliver the availability and performance business demands, network management teams need to optimize fault management and ensure availability, unify fault and performance management, automate change and configuration management to ensure compliance, and automate IT processes. This integrated approach is called Automated Network Management (ANM).
Tags : 
network management, network, infrastructure, network architecture, network performance, network performance management, network security
    
HP - Enterprise
Published By: HP - Enterprise     Published Date: Jun 05, 2013
Traditional project management techniques are not working as well as expected. According to research, an average organization has at least $74 million USD (yearly) in at-risk projects. And, even when projects are executed successfully, all too often they still fail to deliver business benefits. So, how do you get started? How do you prioritize which issues to address first? What are the risks and potential rewards? What can you do yourself and where can you need help? This paper helps you answer those questions. It provides important insights into the root causes of project failures and misalignment with business unit expectations, along with possible solutions. It illustrates the path to optimized project and portfolio management from four different starting points, and provides step-by-step advice to help you reach new milestones quickly. It is intended to help you make the transition from managing IT projects to managing business outcomes.
Tags : 
it project, portfolio management, infrastructure, network management, project management
    
HP - Enterprise
Start   Previous   1 2 3 4 5 6 7 8 9 10    Next    End
Search