failure

Results 51 - 75 of 303Sort Results By: Published Date | Title | Company Name
By: Anaplan     Published Date: Aug 28, 2018
For many years, large corporations have employed financial planning and analysis professionals to oversee budgeting, planning, forecasting and analysis. But the sea-change in technology, data and the competitive landscape is having a sustained impact on the FP&A function as it transforms from a predominately budgeting function to a forward-focussed strategic contributor. Now, as new cloud technology makes implementing modern FP&A quicker and cheaper, the function has become more accessible to medium-sized, or even smaller, organisations. There is a nascent but growing realisation that this corner of the finance function should be demanding more of an organisationís attention, large or small, because having accurate and timely visibility, further into the future, could mean the difference between success and failure in todayís highly uncertain and volatile business environment.
Tags : rise, fp&a, corporation, professional, landscape, technology
     Anaplan
By: Shell     Published Date: Aug 27, 2018
While simple fixes may cost a few thousand dollars, lost revenue from equipment failures can run into the millions of dollars in lost productivity and replacement costs. There can be longer-term impacts, too, if the downtime inhibits a manufacturerís ability to meet customer needs. Thatís why it is important for companies to think about lubrication and equipment maintenance holistically, recognizing that short term cost savings may be leading to bigger, preventable expenses over the long term. By adopting a total cost of ownership (TCO) program, companies can find efficiencies they didnít even know existed and reap benefits they didnít realize were possible. Download our white paper, ďThe Cost Reduction Game,Ē to learn more about how a TCO program can help increase equipment reliability, extend equipment life, and lower energy costs.
Tags : cost, reduction, equipment, shell, manufacturing, maintenance, reliability, contamination control
     Shell
By: Akamai Technologies     Published Date: Aug 22, 2018
In September 2017, Akamai commissioned Forrester Consulting to examine how companies approach digital experience and digital security. A survey of over 350 IT executives around the world found that: ? Customer trust is at an all-time low and itís hurting growth ? Executives are aware that customer trust is becoming critical to success ? Companies struggle to balance security with digital experience ? Failure to deliver on security impacts brand reputation, customer trust, and revenues This report, Drop A Pin At The Intersection Of Digital Experience And Security, shares insights into these findings and what sets top digital businesses apart.
Tags : customer, trust, company, loyalty, security
     Akamai Technologies
By: TIBCO Software     Published Date: Aug 15, 2018
Produced in collaboration with INFOPRO Digital with participation from Capgemini MAINTENANCE MADE EASY WITH THE HELP OF DATA Predictive maintenance involves gathering targeted data for analysis, the results of which will help anticipate potential failures before they occur. Companies opt for this type of maintenance to avoid predictable incidents and repair equipment, assembly lines, or machinery with minimum impact on their operations.
Tags : 
     TIBCO Software
By: Shell     Published Date: Aug 15, 2018
While simple fixes may cost a few thousand dollars, lost revenue from equipment failures can run into the millions of dollars in lost productivity and replacement costs. There can be longer-term impacts, too, if the downtime inhibits a manufacturerís ability to meet customer needs. Thatís why it is important for companies to think about lubrication and equipment maintenance holistically, recognizing that short term cost savings may be leading to bigger, preventable expenses over the long term. Cheaper oil, for example, may save money initially, but it requires more frequent changes and provides less protection to the equipment, which could shorten component life. For many companies, the short-term savings simply arenít worth the longterm cost risk. ďSome companies donít realize that they may be able to reduce their overall maintenance costs significantly by spending more up front on better quality lubricants,Ē Saffell says. ďTheir equipment may last longer and they are likely to see
Tags : cost, reduction, equipment, shell, manufacturing, maintenance, reliability, contamination control
     Shell
By: Aventri     Published Date: Aug 14, 2018
"Revenue focused executives have four metrics that determine their success or failure: number of opportunities, size of opportunities, win rate, and speed to revenue. All teams work together to make sure that they achieve these goals and that they have the processes in place to optimize around them. Event management software is one piece of the puzzle that is designed to generate revenue. Read this eBook to see how event management software helps to speed up the buying process and win more deals!"
Tags : 
     Aventri
By: Oracle     Published Date: Aug 09, 2018
The purpose of IT backup and recovery systems is to avoid data loss and recover quickly, thereby minimizing downtime costs. Traditional storage-centric data protection architectures such as Purpose Built Backup Appliances (PBBAs), and the conventional backup and restore processing supporting them, are prone to failure on recovery. This is because the processes, both automated and manual, are too numerous, too complex, and too difficult to test adequately. In turn this leads to unacceptable levels of failure for todayís mission critical applications, and a poor foundation for digital transformation initiatives. Governments are taking notice. Heightened regulatory compliance requirements have implications for data recovery processes and are an unwelcome but timely catalyst for companies to get their recovery houses in order. Onerous malware, such as ransomware and other cyber attacks increase the imperative for organizations to have highly granular recovery mechanisms in place that allow
Tags : 
     Oracle
By: Oracle     Published Date: Aug 02, 2018
Enterprise data protection has grown unwieldy, with systems from various vendors claiming to protect all of an enterpriseís dataóand none of them doing a particularly good job of addressing mission-critical data recoverability requirements. Itís a situation that introduces risk and raises concerns about ITís ability to recover in a timely manner and without data loss from outages caused by cybercrime, system failures, or human error. An integrated strategy that focuses on the complete data recovery needs of an enterprise can eliminate data loss, cut recovery times, and reduce IT complexityówhile ensuring data security and positioning the enterprise to seamlessly take advantage of the cloud.
Tags : 
     Oracle
By: Oracle     Published Date: Aug 01, 2018
Your enterprise runs its critical applications on Oracle Databases, and as an enterprise IT leader, maintaining the performance and availability of your databases is among your top priorities. Any degradation in performance or loss of data could result in serious business disruption and loss of revenue, so protecting this vital asset is a must. There are many causes of data lossó administration errors, system or media failures, cyberattacks, and moreóbut we often overlook design flaws in the very systems meant to protect data: general-purpose backup systems.
Tags : 
     Oracle
By: Lenovo and Intel     Published Date: Jul 10, 2018
The risk of cyber attacks and the cost of failure are increasing. Penalties associated with failure are only going to increase. And these challenges are compounded by increasing collaboration, use of cloud-based solutions, and an increasingly mobile workforce. Join experts from Forrester, Lenovo and Microsoft as they explore Forresterís newly updated Zero Trust Extended framework. Then Lenovo covers how the four core components of its Data, Identity, Online and Device (DIODe) approach can minimize risk to data and critical IT. By taking these important steps toward a full Zero Trust Extended framework, you can: Protect the business from advanced threats Reduce the impact of breaches Easily support new business and operating models Rise to the challenge of evolving regulations like FISMA, HIPPA, PCI and GDPR
Tags : 
     Lenovo and Intel
By: Tripp Lite     Published Date: Jun 28, 2018
One of the fundamental decisions in the design of data centers, server rooms and network closets is which uninterruptible power supply (UPS) systems to use. You cannot be certain that the power you receive from your local utility will be suitable for your equipment, or that it will always be available. And even when you are receiving good-quality power from the utility, equipment inside your facility (such as electric motors) can introduce power problems. A network/server UPS system conditions input power 24x7 to ensure that your equipment always receives reliable power and protection from damaging and disruptive power problems. A network/server UPS system also supports your equipment during power failures, providing enough battery backup runtime to outlast shorter outages. During longer outages, the UPS system will provide enough runtime to save files and gracefully shut down systems or to ensure that equipment is powered until standby generators are ready to support the load. Choosi
Tags : 
     Tripp Lite
By: LogRhythm     Published Date: Jun 19, 2018
As in years past, 2017 was packed with stories of cyber security failure. Between sophisticated attackers, lack of proper security monitoring and controls implementation, and devastating data breaches that may have arisen from these scenarios, itís easy to see that we still face serious challenges in the security arena, with potentially serious consequences. Why are we continually seeing these issues? Many security professionals readily admit that we donít have the staff, training and breadth of coverage in our security controls to adequately combat the attackers today. How is this happening when weíre spending so much money and time on cyber security?
Tags : logrhythm, sans, cloudai, ueba
     LogRhythm
By: DigiCert     Published Date: Jun 19, 2018
Code signing is at a crossroads. In many enterprises, the traditional approach remains standard procedure: you purchase a code-signing certificate, download it, and deploy it locally for all your code-signing needs. When carefully managed, this approach can still be very effective in guarding against malware. But recent events have shown that many companies are finding it a challenge to manage their code signing certificate deploymentsóand failures in certificate management can have serious consequences. To discover how our Secure App Service solution can help you manage your codesigning efforts and provide enterprise-level support, all at a predictable cost, download this whitepaper today and find out more.
Tags : 
     DigiCert
By: Applause Israel     Published Date: Jun 19, 2018
obile Payments have emerged as a catalyst for transactions across all markets. In underdeveloped markets, mobile payment technology is enabling businesses to sell products and services to consumers that had previously been out of reach. In developed markets, it has made the process of purchasing products and services even simpler. PayPal, one of the most popular digital payment solutions on the market, facilitated $66 billion in payment volume throughout 2015, and now has 188 million active registered user accounts across the US. Furthermore, Statista projects that mobile payments will account for more than $210 billion in transactions by 2019. Mobile payment technology is a step forward in the process of connecting businesses to the people they are serving. However, some merchants will find themselves miles behind their competitors by the time the transition to mobile payments is complete. The reason? A failure to implement the correct mobile payment strategy. An ever-increasing numbe
Tags : 
     Applause Israel
By: Hewlett Packard Enterprise     Published Date: May 11, 2018
Security is a looming issue for businesses. The threat landscape is increasing, and attacks are becoming more sophisticated. Emerging technologies like IoT, mobility, and hybrid IT environments now open new business opportunity, but they also introduce new risk. Protecting servers at the software level is no longer enough. Businesses need to reach down into the physical system level to stay ahead of threats. With todayís increasing regulatory landscape, compliance is more critical for both increasing security and reducing the cost of compliance failures. With these pieces being so critical, it is important to bring new levels of hardware protection and drive security all the way down to the supply chain level. Hewlett Packard Enterprise (HPE) has a strategy to deliver this through its unique server firmware protection, detection, and recovery capabilities, as well as its HPE Security Assurance.
Tags : 
     Hewlett Packard Enterprise
By: Schneider Electric     Published Date: May 07, 2018
Industry demands can punish older physical infrastructure. Low agility and high maintenance costs can be prevented
Tags : modernization, data center lifecycle services, refresh-ups, mprs, assessment services, old ups, aging infrastructure
     Schneider Electric
By: Zebra Technologies     Published Date: May 02, 2018
Up to 14% of medical records include inaccurate, potentially dangerous patient data as a direct result of failures in patient identification. Often, errors can be attributed to outdated manual processes, such as oral verification or written wristbands, which can impact the standard of care delivered. In this white paper Zebra Technologies outlines the benefits of an automated barcode wristband solution, including insight into: Reducing common Patient ID errors The advantages of automated Patient ID processes over manual The best automated barcoding options
Tags : patient, identification, streamline, hospital, processes, optimization, zebra
     Zebra Technologies
By: WorkBook from Deltek     Published Date: Apr 26, 2018
The key to delivering profitable projects right from the start is being able to quote them accurately. Bidding on, and deploying scarce resources to a project that could not be delivered profitably is a recipe for failure. Through PSA solutions, top performing consulting firms can more accurately estimate job costs to determine profitability. Using analytics and lessons from past projects, this will enable smarter decisions on which projects should be bid on so that the project portfolio can be fully optimized. Further, this information can be refreshed mid-project so that changes can be made in an agile manner, and projects that are going off the rails can be steered back towards profitability.
Tags : management, delivery, professional, services, automation, project, management
     WorkBook from Deltek
By: Akamai Technologies     Published Date: Apr 25, 2018
In September 2017, Akamai commissioned Forrester Consulting to examine how companies approach digital experience and digital security. A survey of over 350 IT executives around the world found that: Customer trust is at an all-time low and itís hurting growth Executives are aware that customer trust is becoming critical to success Companies struggle to balance security with digital experience Failure to deliver on security impacts brand reputation, customer trust, and revenues This report, Drop A Pin At The Intersection Of Digital Experience And Security, shares insights into these findings and what sets top digital businesses apart.
Tags : digital, experience, security, executives, customer
     Akamai Technologies
By: Akamai Technologies     Published Date: Apr 25, 2018
In September 2017, Akamai commissioned Forrester Consulting to examine how companies approach digital experience and digital security. A survey of over 350 IT executives around the world found that: Customer trust is at an all-time low and itís hurting growth Executives are aware that customer trust is becoming critical to success Companies struggle to balance security with digital experience Failure to deliver on security impacts brand reputation, customer trust, and revenues This report, Drop A Pin At The Intersection Of Digital Experience And Security, shares insights into these findings and what sets top digital businesses apart.
Tags : digital, experience, security, executives, customer
     Akamai Technologies
By: Akamai Technologies     Published Date: Apr 25, 2018
In September 2017, Akamai commissioned Forrester Consulting to examine how companies approach digital experience and digital security. A survey of over 350 IT executives around the world found that: Customer trust is at an all-time low and itís hurting growth Executives are aware that customer trust is becoming critical to success Companies struggle to balance security with digital experience Failure to deliver on security impacts brand reputation, customer trust, and revenues This report, Drop A Pin At The Intersection Of Digital Experience And Security, shares insights into these findings and what sets top digital businesses apart.
Tags : digital, experience, security, executives, customer
     Akamai Technologies
By: Akamai Technologies     Published Date: Apr 25, 2018
In September 2017, Akamai commissioned Forrester Consulting to examine how companies approach digital experience and digital security. A survey of over 350 IT executives around the world found that: Customer trust is at an all-time low and itís hurting growth Executives are aware that customer trust is becoming critical to success Companies struggle to balance security with digital experience Failure to deliver on security impacts brand reputation, customer trust, and revenues This report, Drop A Pin At The Intersection Of Digital Experience And Security, shares insights into these findings and what sets top digital businesses apart.
Tags : digital, experience, security, executives, customer
     Akamai Technologies
By: TrendKite     Published Date: Apr 25, 2018
Sometimes a perfect storm comes together to signal a radical shift or rebirth of an industry. But itís not enough to say public relations is in flux or rapidly changing. Itís more impactful to discuss the evolution of the change, understand the potential gaps, and be early to capitalize on opportunities created by these gaps. The path for change in the PR industry has been tumultuous. And understandably so. The irrationality of basing performance on vanity metrics is so ingrained in the profession that the left-brain, rational piece has been pushed aside. This has created a culture of estimating based on vanity metrics like AVE (ad value equivalency), leading to a dynamic where the C-suite craves that WSJ or TechCrunch story, yet doesnít believe PRís reporting on the value of that coverage. When everyone in the marketing stack is crunching numbers and showing real, tangible value, PR is holding onto air. Why keep setting the profession up for failure by perpetuating the cycle of abstr
Tags : ave, trendkite, marketing
     TrendKite
By: Rackspace     Published Date: Apr 17, 2018
Read this blog to see how larger enterprises are modernizing their infrastructure. Specifically, three tips to reduce risk and complexity that accompanies such efforts: Adopt tooling and prioritize automation Make sure operations has a seat at the table Adapt and update IT policies While those might sound obvious, itís remarkable how many organizations attempt short cuts that almost inevitably lead to early failure. Read this blog to learn more!
Tags : 
     Rackspace
By: Akamai Technologies     Published Date: Apr 13, 2018
In September 2017, Akamai commissioned Forrester Consulting to examine how companies approach digital experience and digital security. A survey of over 350 IT executives around the world found that: Customer trust is at an all-time low and itís hurting growth Executives are aware that customer trust is becoming critical to success Companies struggle to balance security with digital experience Failure to deliver on security impacts brand reputation, customer trust, and revenues This report, Drop A Pin At The Intersection Of Digital Experience And Security, shares insights into these findings and what sets top digital businesses apart.
Tags : digital, experience, security, executives, customer
     Akamai Technologies
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com