downtime

Results 101 - 125 of 359Sort Results By: Published Date | Title | Company Name
Published By: Oracle ZDLRA     Published Date: Jan 10, 2018
Business leaders expect two things from IT: keep mission-critical applications available and high performing 24x7 and, if something does happen, recover to be back in business quickly and without losing any critical data so there is no impact on revenue stream. Of course, there is a gap between this de facto expectation from nontechnical business leaders and what current technology is actually capable of delivering. For mission-critical workloads, which are most often hosted on databases, organizations may choose to implement high availability (HA) technologies within the database to avoid downtime and data loss.
Tags : 
recovery point, recovery time, backup appliance, san/nas, service level agreement, oracle
    
Oracle ZDLRA
Published By: Epicor     Published Date: Jan 08, 2018
Like many manufacturers, your shop floor operations may be challenged with inefficient standard processes, unpredictable downtime, and difficulties with machinery maintenance. A manufacturing execution system (MES) can help make the most of your shop floor’s capabilities, with tools that can identify under-performing and high-performance machines, and then optimize asset utilization accordingly. Engineers can design, refine, and implement better work processes, and operations professionals can improve preventive maintenance and response times. The result is less downtime, less scrap, more productivity, and lower cost. With the real-time information of an MES, you can transform the shop floor into an important contributor that drives the strategic direction of your business, differentiates your brand, and positions your company as a market leader.
Tags : 
enterprise resource planning (erp), manufacturing execution system (mes), manufacturing, mattec mes
    
Epicor
Published By: Carbonite     Published Date: Jan 04, 2018
It’s the moment every IT department dreads: A data loss event takes your business offline and the countdown clock begins. Despite spending countless hours safeguarding against and preparing for this moment, the impact of downtime is immediate and all-consuming. While IT pros can’t always avoid data loss events, they can prepare for them to ensure minimal downtime. To better understand the IT experience during a data disaster, EVault commissioned Spiceworks Voice of IT to survey IT pros regarding disaster recovery practices and perceptions. All survey respondents were based in the U.S. and have influence over backup/disaster recovery purchase decisions. This e-book will explore the impact of downtime and data loss on IT departments for small and midsize businesses.
Tags : 
    
Carbonite
Published By: Schneider Electric     Published Date: Jan 02, 2018
If not, you are increasing the risk for costly, unplanned downtime. However, despite the importance of having a reliable flow of electricity, over half of building owners rely on reactive maintenance programs to care for their equipment. This means they wait until equipment fails completely before initiating corrective action, which is typically 3-4 times more costly than taking preventive measures. A good first step to go from being reactive to proactive is having a power system assessment performed. While often deemed expensive or unnecessary, the truth is power system assessments reveal opportunities to modernize, imiprove performance and help protect employees. To learn more, download our checklist, ""Ten Ways a Power System Assessment Can Save You Money"
Tags : 
electrical engineering services, electrical reliability, electrical risk assessment, power system assessment, risk assessment, mps assessment
    
Schneider Electric
Published By: Group M_IBM Q1'18     Published Date: Dec 20, 2017
Hyper-complex production meets cognitive computing. Electronics manufacturing is surrounded by continuous complexity. Executives face rising resource costs in traditionally low-cost production markets. They must address increasing customization, shorter lead times, frequently changing requirements and shrinking order sizes – all while managing a sophisticated supply network. They need to examine automation potential and maintain critical institutional knowledge. Thinner margins and increased competition threaten consistent quality, risk greater downtime and reduce desired flexibility. Investments in new equipment and automation systems are increasing the amount of data available from the shop floor, but most is not used to its full potential. Now, cognitive manufacturing is transforming production to address such complexity.
Tags : 
cognitive manufacuring, electronics manufacturing, production transformation, automation systems, manufacturing
    
Group M_IBM Q1'18
Published By: Mimecast     Published Date: Nov 28, 2017
With the healthcare industry as the #1 target for ransomware attacks, it’s critical to ensure steps are taken to prevent, detect and respond to these attacks without downtime – and without loss of patient data. A multi-layered approach to protective controls – including a Secure Email Gateway (SEG) with advanced threat protection capabilities – will start your healthcare organization on the right path to ransomware resilience. Download and use this top 10 list of how to protect your organization now. Use it as a reference tool for frequent health checks of your own ransomware resilience program.
Tags : 
healthcare, ransomware, ransomware attack, seg, secure email gateway
    
Mimecast
Published By: Schneider Electric     Published Date: Nov 21, 2017
If not, you are increasing the risk for costly, unplanned downtime. However, despite the importance of having a reliable flow of electricity, over half of building owners rely on reactive maintenance programs to care for their equipment. This means they wait until equipment fails completely before initiating corrective action, which is typically 3-4 times more costly than taking preventive measures. A good first step to go from being reactive to proactive is having a power system assessment performed. While often deemed expensive or unnecessary, the truth is power system assessments reveal opportunities to modernize, imiprove performance and help protect employees. To learn more, download our checklist, ""Ten Ways a Power System Assessment Can Save You Money""."
Tags : 
reliable power system, electrical assets, power system assessment, modernization, electrical workplace safety
    
Schneider Electric
Published By: Akamai Technologies     Published Date: Nov 10, 2017
Ponemon Institute surveyed 569 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet properties. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. According to respondents, these attacks cause costly application downtime, loss of customers, and involvement of IT security that can result in a cost of millions of dollars. The survey highlights the challenges in identifying who is accessing their websites using stolen credentials, as well as the difficulty in preventing and remediating these attacks.
Tags : 
poneman, credential stuffing, it security, damage mitigation, research report
    
Akamai Technologies
Published By: Oracle     Published Date: Oct 20, 2017
Virtually every business-oriented conversation Wikibon has with senior IT leaders includes a discussion of digital transformation. The relevance to this research is the increasing interdependency between organizations and the data they use, create, access, share and store. Digital means data and lots of it; and this data must be protected. The data requirements facing organizations today as a direct result of digital initiatives are unprecedented and require new approaches for protecting and enabling recovery for high value data assets. Governments around the world are trying to keep pace with the digital tsunami and new/evolving regulations will further pressure data protection and recovery requirements. For example, the EU’s General Data Protection Regulation (GDPR) states that organizations must take appropriate measures to ensure the ability to restore personal data “in a timely manner in the event of a physical or technical incident.” Beginning in May of 2018, penalties for non-co
Tags : 
    
Oracle
Published By: Carbonite     Published Date: Oct 05, 2017
Not long ago, the biggest concern for IT decision makers considering moving workloads to the cloud was security. That’s no longer the case. Today, the main obstacle to cloud adoption is different but familiar: the pain of migrating data. Traditional data migration causes major headaches: • Hours or days of downtime while servers replicate and stakeholders verify functionality • Data loss and migration failures due to inadequate tools and inability to test • Key internal resources diverted from strategic initiatives
Tags : 
data migration, cloud security, carbonite, data security, cloud platform, cloud adoption
    
Carbonite
Published By: Druva     Published Date: Sep 27, 2017
A massive migration is taking place fueled by strategic digital transformation initiatives focusing on increasing workload mobility while delivering scalable applications that reduce downtime and increase user productivity. Learn why organizations are now looking to the cloud as it represents an appealing option for managing VMware enterprise environments.
Tags : 
vmware, digital transformation, workload mobility
    
Druva
Published By: Mimecast     Published Date: Aug 22, 2017
Navigating a turbulent cybersecurity climate can be hard – especially as threats like Petya and WannaCry continue to cripple organizations. Business disruption, downtime, technical failure and data loss are all real risk factors that can’t be ignored. The power of preparedness is in your hands. Get expert insight, tips and guidance from industry thought leaders on how to build a cyber resilience plan for email in this e-book.
Tags : 
cyber resilience, petya, wannacry, cybersecurity
    
Mimecast
Published By: Mimecast     Published Date: Aug 22, 2017
Regulatory fines for violations of HIPAA in the US, DPA in the UK and GDPR can cost organizations millions of dollars. And providers can’t afford the costs of cyber security incidents which can range from prolonged downtime, not being able to care for patients, to paying a ransom to unencrypt important data. Learn the biggest threats to your organization and how to improve protection against: • Ransomware such as WannaCry and Petya • Malicious URLs that entice users to click • Bad Attachments that can infect your network • Business email compromise that siphons information or cash from your organization • Internal employees and the potential for malicious intent or careless mistakes
Tags : 
cyberthreat, healthcare, gdpr, ransomware
    
Mimecast
Published By: CyberX     Published Date: Aug 21, 2017
Today, a range of diverse cyber-adversaries — including nation-states, cybercriminals, competitors, hacktivists, and insiders/contractors — pose financial, reputational and regulatory risk to industrial and critical infrastructure organizations. The business impact can include costly production downtime, safety failures, and environmental release of hazardous materials, as well as theft of corporate secrets such as sensitive information about formulas and proprietary manufacturing processes. The challenge is compounded as organizations adopt digitization initiatives and IT/OT convergence to support the business — removing any “air-gaps” that may have existed in the past. To help security and operations teams stay ahead of the latest ICS/SCADA threats, CyberX — the industrial cybersecurity company founded by military cyber experts with nation-state experience securing critical infrastructure — has partnered with SANS to create educational content about emerging ICS threat vectors and
Tags : 
ics, scada, cyberx, cyber security, hacking, randomware
    
CyberX
Published By: Carbonite     Published Date: Aug 02, 2017
The risk and downtime of server migration have locked many IT teams into platforms that are no longer ideal. Migrations are often delayed or avoided—whether it’s moving data to the cloud or back on premises, or upgrading the hardware of the database software. This results in lost opportunities, unnecessary costs, and a lack of agility that today’s IT teams can no longer afford. Carbonite Move Powered by DoubleTake quickly and easily migrates physical, virtual, and cloud workloads over any distance with minimal risk and near-zero downtime. Using efficient real-time, byte-level replication technology, Carbonite Move creates a replica of the data, application, database, or entire server being migrated and keeps it in sync with the production system. The migrated data can be validated without disrupting business operations, and downtime is limited to the seconds or minutes required for cutover to the new server.
Tags : 
carbonite, doubletake, risk mitigation
    
Carbonite
Published By: Carbonite     Published Date: Aug 02, 2017
The risk and downtime associated with server migration have prevented many IT organizations from making the move to cloud. Some have valid concerns about cloud lock-in. Still, without cloud, IT teams are less agile, less flexible and less able to meet the demands of their business. With so much C-suite awareness of the cloud competitive edge, IT can no longer avoid taking this step. Carbonite DoubleTake™ Cloud Migration Center quickly and easily migrates physical, virtual and cloud workloads over any distance with minimal risk and near-zero downtime. The streamlined process automates 100 manual steps into five easy steps, automating everything from server discovery to target VM provisioning to the ultimate cutover. Using efficient real-time, byte-level replication technology, Cloud Migration Center creates a replica of the entire server being migrated and keeps it in sync with production systems. The migrated data can be validated without disrupting business operations, and downtime is
Tags : 
carbonite, cloud migration, automation, virtual workload, cloud workload
    
Carbonite
Published By: Epicor     Published Date: Aug 01, 2017
Like many manufacturers, your shop floor operations may be challenged with inefficient standard processes, unpredictable downtime, and difficulties with machinery maintenance. A manufacturing execution system (MES) can help make the most of your shop floor’s capabilities, with tools that can identify under-performing and high-performance machines, and then optimize asset utilization accordingly. Engineers can design, refine, and implement better work processes, and operations professionals can improve preventive maintenance and response times. The result is less downtime, less scrap, more productivity, and lower cost. With the real-time information of an MES, you can transform the shop floor into an important contributor that drives the strategic direction of your business, differentiates your brand, and positions your company as a market leader.
Tags : 
enterprise resource planning (erp), manufacturing execution system (mes), manufacturing, mattec mes
    
Epicor
Published By: Oracle APAC ZO OD Prime Volume CX ABM Leads June 2017     Published Date: Jul 18, 2017
By creating a connected field service ecosystem, organizations can increase their response time, reduce mean time-to-resolution and eventually, power a more predictive service model. This will enable a new level of field service productivity and cost-savings from increased efficiencies. Organizations will also be able to provide exceptional customer experiences consistently. Customer disruption and asset downtime will be minimized, and organizations will be able to empower their field service resources with insight into the issue before they arrive at the customer site. All thanks to a unified field service and IoT strategy.
Tags : 
internet of things, iot, daily activity, industry innovation, field service, organization management, device efficiency, telecommunications
    
Oracle APAC ZO OD Prime Volume CX ABM Leads June 2017
Published By: Oracle     Published Date: Jul 05, 2017
Improve the performance, security and reliability of your DNS infrastructure by adding a supplemental DNS service to your IT environment. Best-of-breed managed DNS service providers have the global DNS infrastructure and deep DNS network operations expertise to ensure your success. Adding a secondary DNS service can help you deliver consistent, high-quality user experiences across the world and mitigate outage risk. To learn more read our white paper: High Availability DNS Reduces Downtime Risk and Improves End-User Experience
Tags : 
dns, service, serve traffic, corporate firewall, service features, api daemon
    
Oracle
Published By: Oracle     Published Date: Jul 05, 2017
Your company’s website is up. Servers are churning transactions. The network is pumping data. Life is good. But everything in IT can change quickly. Today’s slightly sluggish network could become tomorrow’s downtime disaster. No matter what challenge may arise, you don’t get extra time, staff, or budget to deal with it. Plus, since the whole company relies on IT, everyone notices when you’re underwater.
Tags : 
revenue loss, tarnish brand, consumer confidence, dns services, high performing networks, workflow, dns
    
Oracle
Published By: Oracle + Dyn     Published Date: Jun 29, 2017
Global DNS performance and availability are critical to business continuity, security and end-user experience. With online applications, content, data and services often scattered across the internet and housed in your own DCs, your CDN or in your cloud instances; it’s more important than ever to have a robust, redundant DNS solution making sure your assets get delivered as quickly and reliably as possible. This whitepaper reviews the business advantages of implementing a high availability DNS architecture using redundant DNS services. You will learn: The critical role DNS plays in the user experience The failure and outage risks of relying on a single DNS solution The major resiliency and performance differences between unicast vs anycast addressing Criteria for evaluating a managed DNS service provider Download Now!
Tags : 
    
Oracle + Dyn
Published By: Oracle + Dyn     Published Date: Jun 27, 2017
"Global DNS performance and availability are critical to business continuity, security and end-user experience. With online applications, content, data and services often scattered across the internet and housed in your own DCs, your CDN or in your cloud instances; it’s more important than ever to have a robust, redundant DNS solution making sure your assets get delivered as quickly and reliably as possible. This whitepaper reviews the business advantages of implementing a high availability DNS architecture using redundant DNS services. You will learn: • The critical role DNS plays in the user experience • The failure and outage risks of relying on a single DNS solution • The major resiliency and performance differences between unicast vs anycast addressing • Criteria for evaluating a managed DNS service provider Download Now! "
Tags : 
    
Oracle + Dyn
Published By: Schneider Electric     Published Date: Jun 06, 2017
If not, you are increasing the risk for costly, unplanned downtime. However, despite the importance of having a reliable flow of electricity, over half of building owners rely on reactive maintenance programs to care for their equipment. This means they wait until equipment fails completely before initiating corrective action, which is typically 3-4 times more costly than taking preventive measures. A good first step to go from being reactive to proactive is having a power system assessment performed to determine the current state and reliability of your electrical system. For more information on Power System Assessments, download our white paper, "Assessing the Health of a Facility's Electrical Power Distribution System".
Tags : 
electrical engineering services, electrical reliability, electrical risk assessment, power system assessment, risk assessment
    
Schneider Electric
Published By: Cox Business     Published Date: May 31, 2017
Does IT get a lot of questions from users these days? For starters, maybe they want to know why their applications don’t run faster, why they’re having downtime, why their favorite enhancements aren’t top priorities, on and on--why, why, why? Tough questions. You’d love to have the resources to give them positive answers. Of course, that would require beefing up bandwidth and modernizing the network architecture. But the truth is, your paltry budget barely keeps the lights on.
Tags : 
    
Cox Business
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

We use technologies such as cookies to understand how you use our site and to provide a better user experience. This includes personalizing content, using analytics and improving site operations. We may share your information about your use of our site with third parties in accordance with our Privacy Policy. You can change your cookie settings as described here at any time, but parts of our site may not function correctly without them. By continuing to use our site, you agree that we can save cookies on your device, unless you have disabled cookies.
I Accept