Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

it failure

Results 1 - 25 of 220Sort Results By: Published Date | Title | Company Name
Published By: Group M_IBM Q4'19     Published Date: Sep 26, 2019
In the Garage, you work side by side with IBM experts to create first-of-a-kind MVPs, experiment with emerging technologies and quickly learn from failures. In this webinar hear from Ed Forman, Partner of Cognitive Process Transformation at IBM. Ed has partnered with organizations across industries including automotive, life sciences, financial services and telecommunications. In his work with the IBM Garage he has helped shape an award-winning method for innovation that has transformed business models for Fortune 500 clients. Listen to this 30-minute presentation to find out more. "The mandate for procurement organizations is clear – cost reduction alone no longer ensures success; creating value is equally important. How was Horizon Blue Cross Blue Shield able to achieve their desired future state? In this webinar, we will discuss: • Why procurement needs a strategic makeover, the current adoption of emerging technologies by procurement, and the challenges faced by procurement exec
Tags : 
    
Group M_IBM Q4'19
Published By: Infinidat EMEA     Published Date: Jun 10, 2019
Digital disruption, economic instability, political upheavals and skills shortages have all at some point in the past 24 months been blamed for business failure, or at the very least, lost profitability and earnings. It’s perhaps not a huge surprise that a Gartner CEO survey on business priorities revealed that digital business is a top priority for next year. Survey respondents were asked whether they have a management initiative or transformation program to make their business more digital. The majority (62 percent) said they did. Of those organisations, 54 percent said that their digital business objective is transformational while 46 percent said the objective of the initiative is optimisation.* So, for businesses it’s a case of learning to evolve and be agile, to use technology to help compete more efficiently and not fall victim to inertia. As businesses become increasingly dependent on the insights from data analytics and face-up to competition fuelled by the 24/7 society of in
Tags : 
    
Infinidat EMEA
Published By: Infinidat EMEA     Published Date: Oct 10, 2019
As data becomes not only a business enabler but also the base of the business’s competitive advantage, Always On data availability has become a critical business requirement from its IT organization. With multiple potential points of failure, IT organizations have been struggling for years to design data infrastructure to meet the Always On requirement with a high cost and complexity. For a solution to be truly Always On it needs to have both zero Recovery Point Objective (RPO=0) and zero Recovery Time Objective (RTO=0). These are necessary requirements from an Always On solution but by no means sufficient.
Tags : 
    
Infinidat EMEA
Published By: Amazon Web Services APAC     Published Date: Sep 19, 2019
Amazon Web Services (AWS) offers scalable, cost-efficient cloud services that public sector customers can use to meet mandates, reduce costs, drive efficiencies, and accelerate innovation. The procurement of an infrastructure as a service (IaaS) cloud is unlike traditional technology purchasing. Traditional public sector procurement and contracting approaches that are designed to purchase products, such as hardware and related software, can be inconsistent with cloud services (like IaaS). A failure to modernize contracting and procurement approaches can reduce the pool of competitors and inhibit customer ability to adopt and leverage cloud technology.
Tags : 
    
Amazon Web Services APAC
Published By: AWS     Published Date: Oct 07, 2019
As companies like yours scale their cloud environment, the question has evolved from “what do I need to protect” to “how do I control and monitor what I am responsible for?” Many companies, especially those who are born on the cloud, or who are more cloud-mature understand the Shared Responsibility Model. Now, they are focusing on building a strategy that gives them greater control and visibility of their cloud environment. Gartner reported that “In 2018, the 60% of enterprises that implement appropriate cloud visibility and control tools will experience one-third fewer security failures.” Having the right monitoring strategy is beneficial for multiple reasons, and this eBook will detail how OneLogin implemented it in their AWS environment, and why you should consider implementing it in yours.
Tags : 
    
AWS
Published By: BlackBerry Cylance     Published Date: Sep 18, 2019
“More than 70 percent of cyber attacks target small businesses," according to National Cyber Security Alliance estimates. That’s not surprising when you consider how many small and medium-sized businesses (SMBs) still rely on legacy AV tools despite their repeated failures to stop modern malware, ransomware, and zero-day attacks. Legacy AV is a lose-lose-lose proposition for SMBs. Attacks get through and cause damage. IT staff struggle to keep up with endless signature file updates from their AV vendors. End-users complain about sluggish system performance during scans and signature file updates. Fortunately, next-generation solutions are now available that protect endpoints with artificial intelligence (AI) rather than signatures. Ready to learn more? Then read the new eSecurity Planet executive brief sponsored by BlackBerry Cylance.
Tags : 
    
BlackBerry Cylance
Published By: Cisco EMEA     Published Date: Nov 13, 2017
The HX Data Platform uses a self-healing architecture that implements data replication for high availability, remediates hardware failures, and alerts your IT administrators so that problems can be resolved quickly and your business can continue to operate. Space-efficient, pointerbased snapshots facilitate backup operations, and native replication supports cross-site protection. Data-at-rest encryption protects data from security risks and threats. Integration with leading enterprise backup systems allows you to extend your preferred data protection tools to your hyperconverged environment.
Tags : 
hyperflex, systems, data platform, storage efficiency, business, cisco
    
Cisco EMEA
Published By: Hewlett Packard Enterprise     Published Date: May 11, 2018
Security is a looming issue for businesses. The threat landscape is increasing, and attacks are becoming more sophisticated. Emerging technologies like IoT, mobility, and hybrid IT environments now open new business opportunity, but they also introduce new risk. Protecting servers at the software level is no longer enough. Businesses need to reach down into the physical system level to stay ahead of threats. With today’s increasing regulatory landscape, compliance is more critical for both increasing security and reducing the cost of compliance failures. With these pieces being so critical, it is important to bring new levels of hardware protection and drive security all the way down to the supply chain level. Hewlett Packard Enterprise (HPE) has a strategy to deliver this through its unique server firmware protection, detection, and recovery capabilities, as well as its HPE Security Assurance.
Tags : 
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Oct 24, 2017
Security is a looming issue for organizations. The threat landscape is increasing, and attacks are becoming more sophisticated. Emerging technologies like IoT, mobility, and hybrid IT environments now open new organization opportunity, but they also introduce new risk. Protecting servers at the software level is no longer enough. Organizations need to reach down into the physical system level to stay ahead of threats. With today’s increasing regulatory landscape, compliance is more critical for both increasing security and reducing the cost of compliance failures. With these pieces being so critical, it is important to bring new levels of hardware protection and drive security all the way down to the supply chain level. Hewlett Packard Enterprise (HPE) has a strategy to deliver this through its unique server firmware protection, detection, and recovery capabilities, as well as its HPE Security Assurance.
Tags : 
cloud optimization, cloud efficiency, cloud management, cloud assurance, cloud visibility, enterprise management, data management
    
Hewlett Packard Enterprise
Published By: Oracle     Published Date: Aug 01, 2018
Your enterprise runs its critical applications on Oracle Databases, and as an enterprise IT leader, maintaining the performance and availability of your databases is among your top priorities. Any degradation in performance or loss of data could result in serious business disruption and loss of revenue, so protecting this vital asset is a must. There are many causes of data loss— administration errors, system or media failures, cyberattacks, and more—but we often overlook design flaws in the very systems meant to protect data: general-purpose backup systems.
Tags : 
    
Oracle
Published By: Oracle     Published Date: Aug 02, 2018
Enterprise data protection has grown unwieldy, with systems from various vendors claiming to protect all of an enterprise’s data—and none of them doing a particularly good job of addressing mission-critical data recoverability requirements. It’s a situation that introduces risk and raises concerns about IT’s ability to recover in a timely manner and without data loss from outages caused by cybercrime, system failures, or human error. An integrated strategy that focuses on the complete data recovery needs of an enterprise can eliminate data loss, cut recovery times, and reduce IT complexity—while ensuring data security and positioning the enterprise to seamlessly take advantage of the cloud.
Tags : 
    
Oracle
Published By: Oracle     Published Date: Aug 09, 2018
The purpose of IT backup and recovery systems is to avoid data loss and recover quickly, thereby minimizing downtime costs. Traditional storage-centric data protection architectures such as Purpose Built Backup Appliances (PBBAs), and the conventional backup and restore processing supporting them, are prone to failure on recovery. This is because the processes, both automated and manual, are too numerous, too complex, and too difficult to test adequately. In turn this leads to unacceptable levels of failure for today’s mission critical applications, and a poor foundation for digital transformation initiatives. Governments are taking notice. Heightened regulatory compliance requirements have implications for data recovery processes and are an unwelcome but timely catalyst for companies to get their recovery houses in order. Onerous malware, such as ransomware and other cyber attacks increase the imperative for organizations to have highly granular recovery mechanisms in place that allow
Tags : 
    
Oracle
Published By: HP     Published Date: Dec 05, 2014
Do you have your arms around your Windows Server 2003 migration? Sure, your team has probably headed up countless maintenance initiatives in the past - upgrades, refreshes, migrations. But if you make the mistake of thinking your Windows Server 2003 migration is more of the same, you will lose on two fronts. First, you will underestimate the complexity of the effort, thus increasing the chance of failure by overrunning timeline and budget. More importantly, you will miss the opportunity to bring value to your business. This paper introduces five considerations that will change your perspective on the Windows Server migration initiative - and spur technical, finance and line of business employees to jump on board.
Tags : 
server, performance, efficiency, application, infrastructure, information technology, mobility, cloud, storage, data, speed, software
    
HP
Published By: HPE     Published Date: Feb 11, 2015
Do you have your arms around your Windows Server 2003 migration? Sure, your team has probably headed up countless maintenance initiatives in the past - upgrades, refreshes, migrations. But if you make the mistake of thinking your Windows Server 2003 migration is more of the same, you will lose on two fronts. First, you will underestimate the complexity of the effort, thus increasing the chance of failure by overrunning timeline and budget. More importantly, you will miss the opportunity to bring value to your business. This paper introduces five considerations that will change your perspective on the Windows Server migration initiative - and spur technical, finance and line of business employees to jump on board.
Tags : 
    
HPE
Published By: Akamai Technologies     Published Date: Apr 25, 2018
In September 2017, Akamai commissioned Forrester Consulting to examine how companies approach digital experience and digital security. A survey of over 350 IT executives around the world found that: Customer trust is at an all-time low and it’s hurting growth Executives are aware that customer trust is becoming critical to success Companies struggle to balance security with digital experience Failure to deliver on security impacts brand reputation, customer trust, and revenues This report, Drop A Pin At The Intersection Of Digital Experience And Security, shares insights into these findings and what sets top digital businesses apart.
Tags : 
digital, experience, security, executives, customer
    
Akamai Technologies
Published By: EMC Converged Platforms     Published Date: Oct 22, 2015
Old Dutch Foods, known for its broad selection of snack foods in the midwest United States and Canada, was struggling to get the right products to the right places at the right time. Its data center included outdated physical servers, and batch processing meant that inventory would not be updated until the end of the day as opposed to real time. In addition, recovering from power outages and disk failures could frequently take up to two weeks. To modernize its data center, Old Dutch Foods invested in EMC Converged Infrastructure. The fast and easy deployment of two VCE VBlock® systems running JD Edwards, MS Exchange, mobile device apps, and operation of a backup site with replicated applications and data. This enhanced the IT department's responsiveness to the business, allowed them to shift to real-time inventory, and reduced CapEx and OpEx costs. Operations were simplified by reducing person-hours needed for infrastructure maintenance by 75 percent.
Tags : 
    
EMC Converged Platforms
Published By: Akamai Technologies     Published Date: Apr 13, 2018
In September 2017, Akamai commissioned Forrester Consulting to examine how companies approach digital experience and digital security. A survey of over 350 IT executives around the world found that: Customer trust is at an all-time low and it’s hurting growth Executives are aware that customer trust is becoming critical to success Companies struggle to balance security with digital experience Failure to deliver on security impacts brand reputation, customer trust, and revenues This report, Drop A Pin At The Intersection Of Digital Experience And Security, shares insights into these findings and what sets top digital businesses apart.
Tags : 
digital, experience, security, executives, customer
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
In September 2017, Akamai commissioned Forrester Consulting to examine how companies approach digital experience and digital security. A survey of over 350 IT executives around the world found that: Customer trust is at an all-time low and it’s hurting growth Executives are aware that customer trust is becoming critical to success Companies struggle to balance security with digital experience Failure to deliver on security impacts brand reputation, customer trust, and revenues This report, Drop A Pin At The Intersection Of Digital Experience And Security, shares insights into these findings and what sets top digital businesses apart.
Tags : 
digital, experience, security, executives, customer
    
Akamai Technologies
Published By: Prophix     Published Date: Jun 03, 2016
Prophix and IMA hosted a webcast, titled “Overcoming Barriers to Implement CPM Methods”, featuring subject matter expert Gary Cokins, the CEO, at Analytics-Based Performance Management. The adoption rate of business analytics and corporate performance management (CPM) methods has been slowed by various barriers. Gary Cokins outlines the causes of this lag, as well as lessons learned about how to overcome obstacles, and obtain buy-in to manage and improve performance. He describes techniques such as strategy maps, balanced scorecards with key performance indicators (KPIs), channel and customer profitability reporting, and driver-based budgeting that can prevent failure when implementing CPM methods.
Tags : 
prophix, best practices, performance management, business analytics, productivity
    
Prophix
Published By: Workforce Software     Published Date: Jun 04, 2015
In the case of a technology project seeking to hit its mark—from staying on budget to achieving the desired results—these failures can be traced back to shortcomings in how the human element of the project was managed. Download to learn more!
Tags : 
workforce software, workforce management, pay slip, government regulations, compliance, labour regulations
    
Workforce Software
Published By: Akamai Technologies     Published Date: Apr 25, 2018
In September 2017, Akamai commissioned Forrester Consulting to examine how companies approach digital experience and digital security. A survey of over 350 IT executives around the world found that: Customer trust is at an all-time low and it’s hurting growth Executives are aware that customer trust is becoming critical to success Companies struggle to balance security with digital experience Failure to deliver on security impacts brand reputation, customer trust, and revenues This report, Drop A Pin At The Intersection Of Digital Experience And Security, shares insights into these findings and what sets top digital businesses apart.
Tags : 
digital, experience, security, executives, customer
    
Akamai Technologies
Published By: Puppet     Published Date: Mar 09, 2017
System administrators and other IT practitioners spend as much as 50% of their time on routine, repetitive tasks. Does the following apply to your organization? • You go from one server to the next, installing the same package on all of them. It works nine times out of 10, but the tenth time causes a failure ... and you can't identify what went wrong. • You can't scale. When the business wants to move to the cloud, or asks for faster provisioning of development and test environments, you only have so many hours in the day — and you can't meet everyone's needs. • You don't have time to get to the work that matters. You spend too much time on routine system management, and can't prepare for the projects that will bring real business value to your team — and customers. With growing demands from all corners of your organization, you simply can't keep doing it all manually. Download this paper to learn how you can benefit from automation, and how IT infrastructure can become a strategic ass
Tags : 
    
Puppet
Published By: CA Technologies     Published Date: Sep 25, 2017
Agile may be simple, but it still takes work. Often, organizations fail to adopt agile methods for similar reasons, and many of these reasons are cultural. From checkbook commitment and lack of executive support to ineffective retrospectives and bad product ownership, this e-book describes the 12 agile failure modes to avoid so you can succeed with your own agile transformation.
Tags : 
leadership, workflow, congruence, transition, ca technologies
    
CA Technologies
Published By: CA Technologies     Published Date: Sep 25, 2017
CA has reevaluated the design methodology behind its PPM tool to deliver an end-user-driven solution that better reflects the goals and motivations of the entire team, helps to ensure project confidence and removes the stress associated with the possibility of project failure. At the core of this new design methodology is our proprietary research, which unquestionably points to the need for an outcome-driven approach to innovation, chiefly concerned with understanding and measuring the customer’s success criteria.
Tags : 
project management, company optimization, execution, product development, research report, web based, business impacts
    
CA Technologies
Published By: Pure Storage     Published Date: Sep 27, 2019
In today’s environment, business continuity is a necessity. As organizations embrace digital transformation and turn to IT for almost all most critical operations, downtime can be crippling. Those that are able to tolerate technology failures transparently—so the business remains up and running— can drive dramatic gains in competitive advantage, customer engagement and business innovation. However, achieving the highest levels of business continuity, with zero recovery point objectives (RPOs) and recovery time objectives (RTOs), has been possible only for the largest companies and their most business-critical applications. The associated costs and complexity have simply been too much for most organizations to achieve those levels. That is no longer the case. This white paper discusses a new active/active stretched cluster technology that allows companies of all sizes to achieve the highest levels of business continuity without the costs and complexities that have typically marked thi
Tags : 
    
Pure Storage
Start   Previous   1 2 3 4 5 6 7 8 9    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.