downtime

Results 276 - 300 of 378Sort Results By: Published Date | Title | Company Name
Published By: HP     Published Date: Mar 31, 2015
When was the last time you thought about your disaster recovery plan? Natural disasters, such as earthquakes, tsunamis, hurricanes, fires, or floods can occur anytime and disable your data center, with little to no warning. Hacker activities like a denial of service attack can also take down your systems unexpectedly. Then you have the more mundane risks such as human error and hardware or software failures. The only predictable thing to say about these risks is that at some point, on some scale, you’ll have to recover your data center from downtime. When it comes to disaster readiness, proactive planning is the key to success. Every business, regardless of size, needs to have a well-tested disaster recovery plan in place. Every minute your systems are down, the financial implications grow. Take the assessment to see where your disaster recovery plan ranks. Then learn about next steps and more information.
Tags : 
disaster recovery, natural disasters, data center, hackers, hardware failure, software failure, planning, disaster readiness, networking, security, it management, data management
    
HP
Published By: HP     Published Date: Mar 31, 2015
No business is immune to the threat of IT downtime caused by natural and manmade disasters. Natural disasters—such as earthquakes, tsunamis, hurricanes, fires, and floods—can happen with little to no advanced warning. But the bigger risk is often human-induced events—from simple IT configuration errors to significant data center problems. If you lack a rock-solid disaster recovery (DR) plan, any of these unpredictable events—natural or manmade—could bring your business and its revenue streams to a halt. Yet many organizations are not well prepared for the unknown. The randomness of such events lulls people into a sense of false security—“That’s not likely to happen here.” While you can hope to avoid events that threaten the continuity of your business, the reality remains unchanged: Disasters happen—so you need to prepare for them. Are you prepared? Please download this eBook to find out!
Tags : 
disaster recovery, natural disasters, data center, hackers, hardware failure, software failure, planning, disaster readiness, security, it management, data management
    
HP
Published By: CloudEndure     Published Date: Mar 23, 2016
In January 2016, 141 professionals — directors, CIOs and managers of large, small and mid-sized companies — were surveyed for a comprehensive disaster recovery (DR) survey. The results of this survey reveal some important truths about DR, backup, availability goals, downtime costs, and responses. For instance, did you know the top risk to system availability continues to be human error? This benchmark survey report reviews the challenges and best practices of companies using or looking to implement DR solutions. Read this report to compare your DR experiences with those of your peers.
Tags : 
cloudendure, disaster recovery, best practices, disaster recovery survey
    
CloudEndure
Published By: Group M_IBM Q1'18     Published Date: Dec 20, 2017
Hyper-complex production meets cognitive computing. Electronics manufacturing is surrounded by continuous complexity. Executives face rising resource costs in traditionally low-cost production markets. They must address increasing customization, shorter lead times, frequently changing requirements and shrinking order sizes – all while managing a sophisticated supply network. They need to examine automation potential and maintain critical institutional knowledge. Thinner margins and increased competition threaten consistent quality, risk greater downtime and reduce desired flexibility. Investments in new equipment and automation systems are increasing the amount of data available from the shop floor, but most is not used to its full potential. Now, cognitive manufacturing is transforming production to address such complexity.
Tags : 
cognitive manufacuring, electronics manufacturing, production transformation, automation systems, manufacturing
    
Group M_IBM Q1'18
Published By: Schneider Electric     Published Date: May 09, 2016
In the broadening data center cost-saving and energy efficiency discussion, data center physical infrastructure preventive maintenance (PM) is sometimes neglected as an important tool for controlling TCO and downtime. PM is performed specifically to prevent faults from occurring. IT and facilities managers can improve systems uptime through a better understanding of PM best practices. This white paper describes the types of PM services that can help safeguard the uptime of data centers and IT equipment rooms. Various PM methodologies and approaches are discussed. Recommended practices are suggested.
Tags : 
schneider electric, edge computing, data center, energy efficiency, data center energy, preventive maintenance, tool for controlling, tco
    
Schneider Electric
Published By: Schneider Electric     Published Date: May 09, 2016
IT virtualization, the engine behind cloud computing, can have significant consequences on the data center physical infrastructure (DCPI). Higher power densities that often result can challenge the cooling capabilities of an existing system. Reduced overall energy consumption that typically results from physical server consolidation may actually worsen the data center’s power usage effectiveness (PUE). Dynamic loads that vary in time and location may heighten the risk of downtime if rack-level power and cooling health are not understood and considered. Finally, the fault-tolerant nature of a highly virtualized environment could raise questions about the level of redundancy required in the physical infrastructure. These particular effects of virtualization are discussed and possible solutions or methods for dealing with them are offered.
Tags : 
schneider electric, edge computing, data center, energy efficiency, data center energy, optimized power, virtualization
    
Schneider Electric
Published By: Double-Take Software     Published Date: Jul 27, 2010
Application and data availability can make or break a business. These days backing up to the Cloud is a simple, cost effective way to get the advantages of a datacenter without the expense of creating and managing a physical center. Double-Take Cloud is a simple way to migrate, backup and restore data and applications to the cloud with minimal downtime and complete control over your expenses.
Tags : 
doubletake, cloud, backup, disk-to-disk, failure, recovery, physical center, rto, rpo
    
Double-Take Software
Published By: Symantec     Published Date: Jul 01, 2010
Protect Against Business Downtime and Disaster with Rapid, Reliable Backup and Recovery
Tags : 
symantec backup exec, system recovery, disaster, windows systems
    
Symantec
Published By: uptime software     Published Date: Dec 06, 2007
Discover the three key reasons how enterprise IT dashboards can deliver highly valuable information to your organization in an easy to use format and provide simple processes that will turn dashboard data into actionable IT decisions.
Tags : 
server monitoring, monitoring tool, capacity planning, performance monitoring, service level management, service level agreement, sla, infrastructure, systems management, network management, uptime, server uptime, downtime, dashboarding, reporting, it management
    
uptime software
Published By: uptime software     Published Date: Dec 06, 2007
You’ll learn what the 12 pitfalls of IT Systems Management really are, as well as the bridges you need to cross them. Learn what the big framework solutions don't want you to know, and why they might not be the answer for your IT Department. Learn to leverage what you have and your limited budget to get you the Systems Management tools and Solutions you need.
Tags : 
high availability, systems management, server management, network management, server, servers, it management, spending, cost, cost effective, agent, agentless, monitoring, uptime, uptime software, downtime
    
uptime software
Published By: uptime software     Published Date: Dec 06, 2007
Monitoring servers, applications, and services has become an essential part of the IT department over the past 10 years. However, it can be a daunting task to find the right solution for your Enterprise. This brief paper will examine the differences between Agent and Agentless monitoring, so you can make the right decision based on your company's needs, the metrics you need, your budget range, your resource availability, and your management's reporting needs.
Tags : 
server monitoring, monitoring tool, capacity planning, performance monitoring, service level management, service level agreement, sla, infrastructure, systems management, network management, uptime, server uptime, downtime, it management
    
uptime software
Published By: Vision Solutions     Published Date: Jul 27, 2010
Double-Take Cloud is a simple way to migrate, backup and restore data and applications to the cloud with minimal downtime and complete control over your expenses.
Tags : 
doubletake, cloud, backup, disk-to-disk, failure, recovery, physical center, rto, rpo, vision
    
Vision Solutions
Published By: BlackBerry     Published Date: Jul 23, 2009
Over the last fifteen years, mobility solutions have evolved from cell phones and pagers to platforms for wireless email and mobilizing business applications. Today's road warriors depend on their mobile devices for fast, reliable, easy access to applications and corporate data. Mobile solution downtime can adversely affect customer service, productivity, sales, and revenues.
Tags : 
blackberry, mobile applications, cio, availability, pim, voip, smartphones, it communication, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing
    
BlackBerry
Published By: APC     Published Date: Apr 08, 2010
Many of the mysteries of equipment failure, downtime, software and data corruption, are the result of a problematic supply of power. There is also a common problem with describing power problems in a standard way. This white paper will describe the most common types of power disturbances, what can cause them, what they can do to your critical equipment, and how to safeguard your equipment, using the IEEE standards for describing power quality problems.
Tags : 
apc, power, cooling, it wiring, heat removal, green computing, ieee, equipment failure
    
APC
Published By: Arcserve     Published Date: Apr 22, 2015
Review this analysis to get a better understanding of how you can eliminate application downtime.
Tags : 
disaster recovery, security, business continuity, data loss
    
Arcserve
Published By: Arcserve     Published Date: Jul 15, 2015
Review this analysis to get a better understanding of how you can eliminate application downtime.
Tags : 
    
Arcserve
Published By: VMware     Published Date: Mar 08, 2012
The benefits of server virtualization extend far beyond infrastructure savings and server consolidation. An emerging technology trend is for IT managers worldwide to deploy virtualization to keep applications online and protect their businesses.
Tags : 
wmware, server virtualization, workload consolidation, simplified management, disaster protection, spending, data backup, recovery, data growth
    
VMware
Published By: Splunk     Published Date: Apr 16, 2012
This analyst ROI case study reveals how Ongame, a leading online gaming platform, used Splunk to gain greater visibility and efficiency from their application production process. Discover how Ongame improved DevOps collaboration and reduced downtime.
Tags : 
splunk, ongame, gaming, gaming platform, devops, collaboration, downtime, efficiency, data, analyzying, decision making, ime-series data, log management, log management software, manage logs, analyze logs, log analyzer, security log analysis, log management intelligence, log management compliance
    
Splunk
Published By: Dell Software     Published Date: May 28, 2013
It only takes a few hours downtime to cripple your organization. Business partners and customers rely on IT services such as email and database applications, making operational continuity critical. Find out how you can be prepared: Building Higher IT Business Continuity in the Face of Disaster.
Tags : 
dell quest, dell appassure, it recover, it business continuity
    
Dell Software
Published By: Plex Systems     Published Date: Feb 21, 2014
With Plex ERP they realized a 50% improvement in inventory turns – allowing them to beat the PMA index and completely changing the way they do business can now report production at a high level, increase equipment uptime, prevent quality issues & production delays and ensure high-quality output.
Tags : 
cloud, plex, erp, cloud computing, manufacturing, management, best practices, productivity, high level production
    
Plex Systems
Published By: Imperva     Published Date: Jun 14, 2012
This paper describes the financial implications of Web attacks, DDoS attacks, and other Web-based threats. It shows how the SecureSphere Web Application Firewall provides a Return on Security Investment of 2090% by preventing data breaches and Website downtime.
Tags : 
imperva, application security, security costs, roi, firewall, ddos, web attacks, it spending, business technology
    
Imperva
Published By: Noction     Published Date: Feb 17, 2015
In this white paper you will learn how BGP performance automation ca help you boost network availability, minimize latency and packet loss as well as reduce operational costs by intelligently rerouting traffic across the Internet.
Tags : 
network performance, congestion, outages, downtime, hosting, bgp, router, ip network, network latency, network congestion, network downtime, ip performance, networking
    
Noction
Published By: Code42     Published Date: Feb 28, 2018
Disaster Recovery Plan Roadmap Learn how automatic backup delivers guaranteed business data protection and recovery—no matter the threat. When ransomware hits, the average small business experiences two full days of downtime. One-third of businesses lose revenue and all experience brand and loyalty damage that’s harder to quantify. To stop the bleeding, most small businesses end up paying at least $2,500 to get their data back. But paying the ransom doesn’t guarantee anything. Plenty of businesses have fully complied with the ransom demands, only to have the ransomer increase the ransom request—or simply take off with the ransom and the data.
Tags : 
    
Code42
Published By: Group M_IBM Q2'19     Published Date: Jun 10, 2019
In the era of individual-centered economy, customers are demanding faster, more personalized services. To deliver these services, successful organizations realize the benefits of accurate and trusted master data. And in today's always on society, companies can no longer afford to allow downtime for maintenance and scheduled upgrades for these services and the supporting applications. With low latency capabilities in IBM InfoSphere Master Data Management designed to easily connect to applications in a zero-downtime environment, the highest demands for user interactions can now be realized. As a result, businesses can therefore take the next step in their digital transformation initiatives to truly drive personalized differentiated customer experiences to separate themselves in today's crowded marketplace. View this webinar to discover how IBM MDM puts these capabilities within easy reach. The webinar will: Reveal how these capabilities are being delivered on-premise and on t
Tags : 
    
Group M_IBM Q2'19
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee