downtime

Results 26 - 50 of 359Sort Results By: Published Date | Title | Company Name
Published By: Oracle Linux     Published Date: Oct 29, 2018
Learn how customers are improving security, reducing downtime, simplifying operations, and saving money by switching to Oracle Linux support.
Tags : 
    
Oracle Linux
Published By: Oracle Linux     Published Date: Oct 24, 2018
Learn how customers are improving security, reducing downtime, simplifying operations, and saving money by switching to Oracle Linux support.
Tags : 
    
Oracle Linux
Published By: ServiceNow     Published Date: Oct 22, 2018
A comprehensive service visibility strategy with automated infrastructure discovery and service mapping gives a clear view into business-critical services. Quickly locate potential problems before downtime happens. Learn best practices to develop your service visibility framework. Read this eBook.
Tags : 
service, business, infrastructure, remotely, servicenow
    
ServiceNow
Published By: Carbonite     Published Date: Oct 10, 2018
There are five essential steps to protecting data and applications from the most common causes of data loss and downtime. IT pros who follow these steps can feel confident in their long-term organizational plan. Read this expert guide from Ben Maas, an independent consultant and system architect who has guided many companies through backup and disaster recovery (BDR) deployments.
Tags : 
    
Carbonite
Published By: Zerto     Published Date: Oct 08, 2018
"Confused about RTOs and RPOs? Fuzzy about failover and failback? Wondering about the advantages of continuous replication over snapshots? Well, you’re in the right place. The Disaster Recovery 101 eBook will help you learn about DR from the ground up and assist you in making informed decisions when implementing your DR strategy, enabling you to build a resilient IT infrastructure. This 101 guide will educate you on topics like: How to evaluate replication technologies Measuring the cost of downtime How to test your Disaster Recovery plan Reasons why backup isn’t Disaster Recovery Tips for leveraging the cloud Mitigating IT threats like ransomware Get your business prepared for any interruption, download the Disaster Recovery 101 eBook now!"
Tags : 
disaster recovery, dr strategy, ransomware
    
Zerto
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Ponemon Institute surveyed 538 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet properties. According to respondents, the challenges in identifying who is accessing their websites using stolen credentials complicates the ability to prevent and remediate these attacks. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. These costs are broken out into downtime, lost customers, remediation and fraud-related expenses. The survey also highlights the need for focused accountability and appropriate budget to protect businesses."
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Ponemon Institute surveyed 538 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet properties. According to respondents, the challenges in identifying who is accessing their websites using stolen credentials complicates the ability to prevent and remediate these attacks. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. These costs are broken out into downtime, lost customers, remediation and fraud-related expenses. The survey also highlights the need for focused accountability and appropriate budget to protect businesses."
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Ponemon Institute surveyed 538 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet properties. According to respondents, the challenges in identifying who is accessing their websites using stolen credentials complicates the ability to prevent and remediate these attacks. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. These costs are broken out into downtime, lost customers, remediation and fraud-related expenses. The survey also highlights the need for focused accountability and appropriate budget to protect businesses."
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Ponemon Institute surveyed 538 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet properties. According to respondents, the challenges in identifying who is accessing their websites using stolen credentials complicates the ability to prevent and remediate these attacks. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. These costs are broken out into downtime, lost customers, remediation and fraud-related expenses. The survey also highlights the need for focused accountability and appropriate budget to protect businesses."
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Ponemon Institute surveyed 538 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet properties. According to respondents, the challenges in identifying who is accessing their websites using stolen credentials complicates the ability to prevent and remediate these attacks. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. These costs are broken out into downtime, lost customers, remediation and fraud-related expenses. The survey also highlights the need for focused accountability and appropriate budget to protect businesses."
Tags : 
    
Akamai Technologies
Published By: Zebra Technologies     Published Date: Oct 01, 2018
The Industrial Revolution 4.0 is upon us and manufacturers who want to stay competitive need to adapt or they will inevitably fall behind. However, that’s easier said than done. Updating proprietary legacy systems can be expensive, complicated, and lead to unwanted downtime that can slow production on the plant floor. How do companies accomplish such a critical change without draining budgets and upending workflow? Surprisingly, the answer doesn't always involve completely rebuilding systems from scratch. Instead, removing antiquated equipment and streamlining connectivity without creating new security risks could successfully start organizations on their path to reaping the benefits of Manufacturing 4.0.
Tags : 
    
Zebra Technologies
Published By: TIBCO Software     Published Date: Sep 12, 2018
By processing real-time data from machine sensors using artificial intelligence and machine learning, it’s possible to predict critical events and take preventive action to avoid problems. TIBCO helps manufacturers around the world predict issues with greater accuracy, reduce downtime, increase quality, and improve yield. Read about our top data science best practices for becoming a smart manufacturer.
Tags : 
inter-company connectivity, real-time tracking, automate analytic models, efficient analytics, collaboration
    
TIBCO Software
Published By: TIBCO Software     Published Date: Sep 12, 2018
The Internet of Things (IoT) didn’t just connect everything everywhere; It laid the groundwork for the next industrial revolution. Connected devices sending data was only one achievement of the IoT—but one that helped solve the problem of data spread across countless silos that was not collected because it was too voluminous and/or too expensive to analyze. Now, with advances in cloud computing and analytics, cheaper and more scalable factory solutions are available. This, in combination with the cost and size of sensors continuously being reduced, supplies the other achievement: the possibility for every organization to digitally transform. Using a Smart Factory system, all relevant data is aggregated, analyzed, and acted upon. Sensors, devices, people, and processes are part of a connected ecosystem providing: • Reduced downtime • Minimized surplus and defects • Deep insights • End-to-end real-time visibility
Tags : 
internet of things, connected ecosystem, big data, operations monitoring, process control, analytical techniques
    
TIBCO Software
Published By: Shell     Published Date: Aug 27, 2018
While simple fixes may cost a few thousand dollars, lost revenue from equipment failures can run into the millions of dollars in lost productivity and replacement costs. There can be longer-term impacts, too, if the downtime inhibits a manufacturer’s ability to meet customer needs. That’s why it is important for companies to think about lubrication and equipment maintenance holistically, recognizing that short term cost savings may be leading to bigger, preventable expenses over the long term. By adopting a total cost of ownership (TCO) program, companies can find efficiencies they didn’t even know existed and reap benefits they didn’t realize were possible. Download our white paper, “The Cost Reduction Game,” to learn more about how a TCO program can help increase equipment reliability, extend equipment life, and lower energy costs.
Tags : 
cost, reduction, equipment, shell, manufacturing, maintenance, reliability, contamination control
    
Shell
Published By: Hewlett Packard Enterprise     Published Date: Aug 23, 2018
In an innovation-powered economy, ideas need to travel at the speed of thought. Yet even as our ability to communicate across companies and time zones grows rapidly, people remain frustrated by downtime and unanticipated delays across the increasingly complex grid of cloud-based infrastructure, data networks, storage systems, and servers that power our work.
Tags : 
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Aug 23, 2018
"This research by Nimble Storage, a Hewlett Packard Enterprise Company, outlines the top five causes of application delays. The report analyzes more than 12,000 anonymized cases of downtime and slow performance. Read this report and find out: -Top 5 causes of downtime and poor performance across the infrastructure stack -How machine learning and predictive analytics can prevent issues -Steps you can take to boost performance and availability
Tags : 
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Aug 23, 2018
Storage is normally the first suspect when identifying the causes of the App-Data Gap, but the facts tell a different story. Flash Alone Isn’t Enough. Infrastructure complexity makes it difficult to pinpoint the real problem, resulting in: • Extended downtime and frustration • Inefficient use of IT resources and budget • Long hours spent resolving cross-vendor issues
Tags : 
    
Hewlett Packard Enterprise
Published By: ServiceNow     Published Date: Aug 20, 2018
A comprehensive service visibility strategy with automated infrastructure discovery and service mapping gives a clear view into business-critical services. Quickly locate potential problems before downtime happens. Learn best practices to develop your service visibility framework. Read this eBook.
Tags : 
    
ServiceNow
Published By: SAP     Published Date: Aug 17, 2018
Learn more about the cost savings and business benefits enabled by SAP S/4HANA - One of the companies reduced inventory carrying costs valued at nearly $6.7 million, reduced staff required to manage ongoing operations for a benefit of over $6 million and avoided downtime inherent in legacy systems that impacted productivity.
Tags : 
    
SAP
Published By: Shell     Published Date: Aug 15, 2018
Shell Lubricants believes companies can achieve significant cost savings by upgrading their lubrication processes. Taking better care of equipment can contribute to savings from lower maintenance costs, reduced unplanned downtime and improvements in productivity. These potential savings go far beyond what can be achieved by selecting lubricants on the basis of lowest price per litre. There are two key elements to seizing this opportunity. The first is selecting the right lubricant; the second is effective lubrication management.
Tags : 
productivity, savings, lubricants, shell, maintenance, construction, equipment protection, hydraulic system, quarry, quarries
    
Shell
Published By: Shell     Published Date: Aug 15, 2018
While simple fixes may cost a few thousand dollars, lost revenue from equipment failures can run into the millions of dollars in lost productivity and replacement costs. There can be longer-term impacts, too, if the downtime inhibits a manufacturer’s ability to meet customer needs. That’s why it is important for companies to think about lubrication and equipment maintenance holistically, recognizing that short term cost savings may be leading to bigger, preventable expenses over the long term. Cheaper oil, for example, may save money initially, but it requires more frequent changes and provides less protection to the equipment, which could shorten component life. For many companies, the short-term savings simply aren’t worth the longterm cost risk. “Some companies don’t realize that they may be able to reduce their overall maintenance costs significantly by spending more up front on better quality lubricants,” Saffell says. “Their equipment may last longer and they are likely to see
Tags : 
cost, reduction, equipment, shell, manufacturing, maintenance, reliability, contamination control
    
Shell
Published By: Oracle     Published Date: Aug 09, 2018
The purpose of IT backup and recovery systems is to avoid data loss and recover quickly, thereby minimizing downtime costs. Traditional storage-centric data protection architectures such as Purpose Built Backup Appliances (PBBAs), and the conventional backup and restore processing supporting them, are prone to failure on recovery. This is because the processes, both automated and manual, are too numerous, too complex, and too difficult to test adequately. In turn this leads to unacceptable levels of failure for today’s mission critical applications, and a poor foundation for digital transformation initiatives. Governments are taking notice. Heightened regulatory compliance requirements have implications for data recovery processes and are an unwelcome but timely catalyst for companies to get their recovery houses in order. Onerous malware, such as ransomware and other cyber attacks increase the imperative for organizations to have highly granular recovery mechanisms in place that allow
Tags : 
    
Oracle
Published By: Oracle     Published Date: Aug 02, 2018
Oracle Database powers your business’s mission-critical applications. Their downtime and data loss can have a devastating impact on your company’s bottom line and productivity—not to mention the damage to your company’s (and your) reputation, because outages and data losses make headlines.
Tags : 
    
Oracle
Published By: Microsoft     Published Date: Jul 20, 2018
When it comes to performance, Azure SQL Database is built for you, the developer. Azure SQL Database is designed to make your work easier and let you focus on other priorities. It scales on the fly, without downtime, with capabilities that make it great for building multitenant software as a service (SaaS) apps. Plus, it learns and adapts to your database workload, whatever that may be, using built-in intelligence to continually adjust and improve over time. That said, there’s more to a successful app than impressive performance. That’s why we built Azure SQL Database to be just as intelligent in other areas, such as availability and security, so that you won’t need to worry about those essentials either. Finally, we built Azure SQL Database to let you work the way you want, using the tools and platforms you prefer. It’s why we call Azure SQL Database the intelligent database for developers. Read on to learn more, and we’re sure you’ll agree.
Tags : 
    
Microsoft
Published By: Hewlett Packard Enterprise     Published Date: Jul 19, 2018
"This research by Nimble Storage, a Hewlett Packard Enterprise Company, outlines the top five causes of application delays. The report analyzes more than 12,000 anonymized cases of downtime and slow performance. Read this report and find out: Top 5 causes of downtime and poor performance across the infrastructure stack How machine learning and predictive analytics can prevent issues Steps you can take to boost performance and availability"
Tags : 
cloud, nimble storage, infrastructure
    
Hewlett Packard Enterprise
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

We use technologies such as cookies to understand how you use our site and to provide a better user experience. This includes personalizing content, using analytics and improving site operations. We may share your information about your use of our site with third parties in accordance with our Privacy Policy. You can change your cookie settings as described here at any time, but parts of our site may not function correctly without them. By continuing to use our site, you agree that we can save cookies on your device, unless you have disabled cookies.
I Accept