failure

Results 251 - 275 of 284Sort Results By: Published Date | Title | Company Name
By: Magonaga     Published Date: Jan 17, 2007
This white paper examines how the failure to structure equitable relationships, establish ethical foundations for action and correct blinding group think led to the catastrophic death of a specific corporate organism.
Tags : corporate culture, team dynamics, project management, team management, people management, magonaga, it management
     Magonaga
By: Infor     Published Date: Feb 27, 2007
Countless surveys have confirmed that most lean initiatives are abandoned outright or fail to deliver expected and needed results.  One well-known lean business consultant estimates that the failure rate is 98%. What is it the 2% of companies know that the others do not? Download this white paper to learn more.
Tags : supply chain management, best practices, workforce management, productivity, employee performance, lean methods, lean, six sigma, infor
     Infor
By: Asentria Corporation     Published Date: Sep 04, 2007
One of the greatest challenges to any advanced wireless operation is the maintenance of continuous and economical service. Today’s networks have evolved into business-critical services that organizations rely upon every day. However, unplanned remote site downtime due to equipment and power failure, and adverse environmental conditions can severely impair network service.
Tags : telecom alarms, snmp traps, remote site managers, terminal servers, remote access, snmp monitoring, snmp, contact closures, fault management, network management, remote site monitoring, remote site alarms, environmental monitoring, network alarm monitoring, network alarm management, remote telemetry units, alarm management system, network management systems, network monitoring, protocol mediation
     Asentria Corporation
By: Asentria Corporation     Published Date: Sep 04, 2007
More than ever before, IT managers need to secure equipment and facilities against a variety of intrusive conditions that could cripple critical operations, resulting in system malfunctions, loss of data or intellectual property, damage to mission critical hardware or even theft of valuable physical assets. Such conditions often include environmental events, failure of air conditioning systems, power outages, and untoward human actions.
Tags : telecom alarms, snmp traps, remote site managers, terminal servers, remote access, snmp monitoring, snmp, contact closures, fault management, network management, remote site monitoring, remote site alarms, environmental monitoring, network alarm monitoring, network alarm management, remote telemetry units, alarm management system, network management systems, network monitoring, protocol mediation
     Asentria Corporation
By: Asentria Corporation     Published Date: Sep 04, 2007
Organizations today depend upon their networks to increase productivity and reduce network infrastructure and maintenance costs. Accordingly, these networks must be secure and perform reliably in order to accommodate geographically dispersed users. Unplanned remote site downtime due to equipment failure or adverse environmental conditions can severely impair network service.
Tags : telecom alarms, snmp traps, remote site managers, terminal servers, remote access, snmp monitoring, snmp, contact closures, fault management, network management, remote site monitoring, remote site alarms, environmental monitoring, network alarm monitoring, network alarm management, remote telemetry units, alarm management system, network management systems, network monitoring, protocol mediation
     Asentria Corporation
By: BuyDomains     Published Date: Nov 27, 2007
The right domain name can mean the difference between success and failure. Find out how to get it right the first time by following five simple steps.
Tags : domain name, dns, web development, web site, online presence, website, site development, buy domains, buydomains, domains, domain, url, web address
     BuyDomains
By: PdMA Corporation     Published Date: Jun 23, 2008
In this paper we present three case studies using online and offline motor analysis to prevent catastrophic motor failures. The online and offline analysis in our case studies use a battery of standard electrical tests including Current Signature Analysis (CSA) and Demodulated Current Spectrum Analysis (DCSA).
Tags : scm, battery, production, pdma
     PdMA Corporation
By: HP - Enterprise     Published Date: Nov 19, 2008
This webinar explores 12 of the most common security traps in Java by examining the causes of security failures in modern Java–based applications. Approaching security with an “outside in” style, we look at vulnerabilities from a developer’s perspective, focusing on the source code.
Tags : security, application security, java, vulnerabilities, developer, source code, analysis, fortify software, fortify
     HP - Enterprise
By: VMware     Published Date: Feb 20, 2009
According to the National Archives and Records Administration, 93 percent of companies that lost their data center for 10 days or more due to a disaster filed for bankruptcy within one year of the disaster. Don't let that happen to you, learn more today!
Tags : vmware, vmware virtualization, business continuity, it infrastructure, vmware esx platform, distributed resource scheduler, drs, recovery infrastructure, server failures, vmwarehigh availability, overloaded servers, vmware vmotion, rapid recovery, network and storage interface failures, affordable recovery, networking, security, storage
     VMware
By: Ecessa Corporation     Published Date: Mar 11, 2009
Download this white paper to learn how to avoid network failures and evaluate the options available to ensure high-availability, network uptime and optimal network performance. It also shows you solutions that are affordable, and when deployed, are operationally cost-effective.
Tags : adsl load balancing, vpn load balancing and redundancy, bandwidth aggregation, qos, bandwidth control, bandwidth management, multi-homing, bgp multihoming, broadband bonding, broadband failover, disaster recovery, business continuity, wan load balancing, wan failover, dsl failover, dsl load balancing, disaster recovery solutions, dual wan router, wan failover, isp failover
     Ecessa Corporation
By: VMware     Published Date: May 02, 2011
The cost of downtime and/or lost data can be devastating. For this reason, business continuity and disaster recovery (BC/DR) is becoming a critical mandate. Virtualization can keep your business running through many types of planned and unplanned IT outages. Download this white paper to learn more.
Tags : smb, vmware, virtualization, business continuity, disaster re vsphere, downtime, it failure, vms, it managementcovery, bc/dr planning solutions, high availability, taneja group
     VMware
By: SQC     Published Date: Oct 14, 2010
This paper describes why slow system integration is a major cause of project failure, why it happens and how to organize and prepare to avoid suffering the same fate.
Tags : software delivery, software management, integration, software integration testing, system integration
     SQC
By: Prinzo Group     Published Date: Dec 01, 2010
Preempting enterprise resource planning (ERP) project failure could well become the Holy Grail for organizations seeking to improve their technology infrastructure, organizational efficiency, and competitiveness.
Tags : erp, software implementation, project assurance, software project management, enterprise software, enterprise resource planning, implementation
     Prinzo Group
By: SalesForce4Hire     Published Date: Feb 11, 2011
Performing marketing due diligence in M&A involves validating which products to be acquired will fit into an existing core sales channel and deciding how to optimally integrate these products. This white paper discusses four
Tags : medical device, aquisitions, mergers, salesforce4hire, sales strategy
     SalesForce4Hire
By: IBM Corporation     Published Date: Jun 01, 2011
Gartner has identified five key failures in crucial interactions between security and risk professionals and their client.
Tags : ibm, gartner, communication, security message, enterprise risk management, jeffrey wheatman, chief information security officer, ciso, business leaders, security program
     IBM Corporation
By: AtTask     Published Date: Feb 11, 2012
To protect their investment in a project, an organization needs to engage in a three step process to put a reasonable and viable risk management plan in place. This free guide walks you through the process.
Tags : project risk management, risk management tools, it project risk management, enterprise risk management, risk management plan, business risk management, knowledge management
     AtTask
By: AtTask     Published Date: Feb 11, 2012
It really doesn't matter if you are leading an army into battle or a product into market, sometimes the best solutions seem counter-intuitive. The same is true with project management. This document will safeguard your success.
Tags : project management mistakes, project management failures, it project failures, project failure statistics, project failure reasons, project failure examples, reasons for project failure, project failure rates, project failure case study, project estimation techniques, knowledge management
     AtTask
By: Kaseya     Published Date: Mar 12, 2015
Providers who add BDR to their offerings can enjoy substantial profit margins and incremental monthly recurring revenue. BDR, therefore, is ideal for solution providers, especially as a first step to a managed services practice.
Tags : backup, data loss, risks, recovery services, humor error, program deletions, hardware failures, system crashes, application freezes, software bugs, data management
     Kaseya
By: NETIQ     Published Date: Mar 12, 2013
Compliance mandates are changing, and collecting logs is not enough. To reduce the risk of audit failure, you must be able to produce reports that both help you review anomalies, and demonstrate to ever-more attentive auditors that you’re doing so.
Tags : security intelligence, compliance, log management, user activity monitoring, security, business technology
     NETIQ
By: NETIQ     Published Date: Sep 09, 2013
Compliance mandates are changing, and collecting logs is not enough. To reduce the risk of audit failure, you must be able to produce reports that both help you review anomalies, and demonstrate to ever-more attentive auditors that you’re doing so.
Tags : security intelligence, compliance, log management, user activity monitoring, security
     NETIQ
By: NETIQ     Published Date: Dec 03, 2013
This flash point paper discusses system and application management and the struggle against service outages. With data overload and data isolation often being the root cause, a services-level approach can reduce the potential of impacting events.
Tags : netiq, service outages, monitoring strategy, system failure, single management view, business technology
     NETIQ
By: HireRight     Published Date: May 01, 2013
There are a number of reasons why shrewd staffing agencies run background checks on potential employees before inviting them in to their business and, in turn, into their customers’ businesses. Background screening may be required by law for certain placements and industries, or, the customer may require screening. In all instances, failure to properly screen employees can have serious business and financial consequences. This industry brief outlines the risks that can arise from bad hires and how careful background screening can help mitigate those risks.
Tags : staffing, hireright, human resources, hr department, clients, potential employees, human resource technology
     HireRight
By: HireRight     Published Date: May 01, 2013
Franchise owners have the benefit of brand recognition and a proven business model and plan. It is up to you, as a franchisee, to make your location successful and this success lies heavily on the staff you hire. Background screening may be required by law for certain franchise employees, depending upon the nature of the business. In all instances, failure to properly screen employees can have serious business and financial consequences. This industry brief outlines the risks that arise from bad hires and how careful background screening can help mitigate those risks.
Tags : hireright, human resources, hr department, investments, properly screen employees, franchise owners, human resource technology
     HireRight
By: HireRight     Published Date: May 01, 2013
Do no harm and help heal are some of the top responsibilities for health care providers. The first step in meeting these requirements is to make sure your employees are worthy of your trust and that of your patients. Background screening is required by law for health care providers in many instances. In all instances, failure to properly screen health care employees can have serious business and financial consequences. This industry brief outlines the risks that arise from bad hires and how careful background screening can help mitigate those risks.
Tags : background screening, health care providers, responsibilities, hireright, risks of bad hires, human resource technology
     HireRight
By: Globalscape     Published Date: Mar 21, 2014
This whitepaper provides guidance on common high-availability and scale-out deployment architectures, and discusses the factors to consider for your specific business environment. Three basic models are described for deploying an on-site managed file transfer (MFT) solution. The attributes of each option are described; each has pros and cons and offers a different balance of cost, complexity, availability, and scalability. The paper explains that, no matter how reliable each model is, any deployment can experience outages. The recommendation is to use clustering services to protect your data when the inevitable hardware, software, or network failures occur.
Tags : clustering, uptime, failover, mft, network failure, high volume, scale-out configuration, sla, ha cluster, high availability, load balancer, mission-critical transfers, active/passive, edi, it management
     Globalscape
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com