outages

Results 76 - 91 of 91Sort Results By: Published Date | Title | Company Name

7 Proven Practices to Strengthen Release Management

Published By: IBM     Published Date: Oct 10, 2014
Business needs, market trends, and customer demands are forcing IT teams to deploy applications at a rapid rate. The frequency of the deployments can invoke human errors, failed deployments, and outages. This paper will guide you through seven best practices that will strengthen the way applications are released to production.
Tags : 
release management, application management, market trends, application deployment, it management, knowledge management, best practices, business intelligence
    
IBM

7 Proven Practices to Strengthen Release Management

Published By: IBM     Published Date: Feb 18, 2015
Business needs, market trends, and customer demands are forcing IT teams to deploy applications at a rapid rate. The frequency of the deployments can invoke human errors, failed deployments, and outages. This paper will guide you through seven best practices that will strengthen the way applications are released to production.
Tags : 
release management, market trends, customer demands, application deployment, ibm, it management, knowledge management, business analytics
    
IBM

Let's Get Social: Best Practices in Utility Outage Communications

Published By: Interactive Intelligence     Published Date: Feb 26, 2013
Utility outages are inevitable. How utilities communicate with the customers who are personally impacted by the outage has the potential to be a relatively positive or an incredibly negative experience. Learn about customer communications via social.
Tags : 
utlity outages, communications, social, best practices, negative experiences, interactive intelligence, knowledge management, enterprise applications
    
Interactive Intelligence

Monitoring Devices Help Protect Princeton Computer Science Facilities Against Intrusion

Published By: Asentria Corporation     Published Date: Sep 04, 2007
More than ever before, IT managers need to secure equipment and facilities against a variety of intrusive conditions that could cripple critical operations, resulting in system malfunctions, loss of data or intellectual property, damage to mission critical hardware or even theft of valuable physical assets. Such conditions often include environmental events, failure of air conditioning systems, power outages, and untoward human actions.
Tags : 
telecom alarms, snmp traps, remote site managers, terminal servers, remote access, snmp monitoring, snmp, contact closures
    
Asentria Corporation

Addressing Network Management Challenges with NETCONF

Published By: Tail-f Systems     Published Date: Sep 16, 2008
This paper reviews the business cost of major outages. It also details some of the reasons that network architecture has become so complex, discusses current approaches to the problem and finally presents NETCONF as a powerful building block solution to the network management problem.
Tags : 
network management, netconf, network architecture, ietf standard, tail-f, tailf, networking
    
Tail-f Systems

Overcoming ISP Network Challenges

Published By: Ecessa Corporation     Published Date: Mar 11, 2009
By redirecting traffic away from ISP outages and WAN link bottlenecks, Ecessa, with its PowerLink and ShieldLink family of affordable WAN Optimization Controllers help avoid critical WAN infrastructure problems. Ecessa optimizes WAN infrastructure as defined by 24/7 availability, high-performance, flexible scalability, and secure operations - while streamlining IT costs. PowerLink and ShieldLink simplify the management of network links, and optimize user access to datacenters and remote sites.
Tags : 
adsl load balancing, vpn load balancing and redundancy, bandwidth aggregation, qos, bandwidth control, bandwidth management, multi-homing, bgp multihoming
    
Ecessa Corporation

How to Protect Your SMB with Proven, Simple, and Affordable VMware Virtualization

Published By: VMware     Published Date: May 02, 2011
The cost of downtime and/or lost data can be devastating. For this reason, business continuity and disaster recovery (BC/DR) is becoming a critical mandate. Virtualization can keep your business running through many types of planned and unplanned IT outages. Download this white paper to learn more.
Tags : 
smb, vmware, virtualization, business continuity, disaster re vsphere, downtime, it failure, vms
    
VMware

Security Beyond the Windows Event Log - Monitoring Ten Critical Conditions

Published By: EventTracker     Published Date: Nov 22, 2010
Ten conditions in Windows to monitor to make your organization more secure, and suffer less operational impact due to unplanned outages.
Tags : 
windows, log management, siem, file changes, registry changes, compliance, software compliance, sarbanes oxley compliance
    
EventTracker

Something is Missing in our IT Infrastructure Approach

Published By: TDi Technologies     Published Date: Aug 29, 2011
It's clear something is wrong. Business interruptions, outages, and other negative consequences happen far too often.
Tags : 
it infrastructure. it management, service levels, systems adminstrator, distributed computing, infrastructure, monitoring, network management, network security
    
TDi Technologies

The Business Value of DDoS Protection

Published By: Arbor     Published Date: Sep 20, 2013
Today’s hosting provider can increase revenue by capitalizing on the growing demand of business customers for hosted online operations—provided, of course, that it can safeguard these critical operations against DDoS-related outages. Using the simple, step-by-step approach described in this paper, providers can model the financial impact of a DDoS attack on their operations and calculate the ROI of an effective DDoS defense solution.
Tags : 
distributed denial of services, defense solutions, security, financial management, ddos attacks, ddos protection, ddos defense system, ddos protection solutions
    
Arbor

Service Outages: Is Your Monitoring Strategy Working?

Published By: NETIQ     Published Date: Dec 03, 2013
This flash point paper discusses system and application management and the struggle against service outages. With data overload and data isolation often being the root cause, a services-level approach can reduce the potential of impacting events.
Tags : 
netiq, service outages, monitoring strategy, system failure, single management view, policy based management, security management, business technology
    
NETIQ

IBM Power Systems and Their Support for Business Resiliency in Challenging IT Environments

Published By: IBM     Published Date: Jan 09, 2014
IBM Power Systems provide a comprehensive approach designed to protect the continuity and availability of business-critical applications and services. Deploying integrated disaster recovery allows companies to deliver new services faster, with higher quality, and with superior economics. Downtime can be highly disruptive and expensive to an organization, with cost drivers including lost revenue, reduced employee productivity, reputational damage, and the cost of resources required to address and avoid outages. Most organizations in IDC surveys indicate that even one hour of downtime can have a severe business impact or greater and businesses are investing in highly available servers and systems. Hear from leading industry analysts as they share top resiliency trends and top practices. Also see how Power Systems can build a highly stable infrastructure
Tags : 
    
IBM

Maximizing Uptime for Mission-Critical File Transfers: Availability and Scalability for Managed File

Published By: Globalscape     Published Date: Mar 21, 2014
This whitepaper provides guidance on common high-availability and scale-out deployment architectures, and discusses the factors to consider for your specific business environment. Three basic models are described for deploying an on-site managed file transfer (MFT) solution. The attributes of each option are described; each has pros and cons and offers a different balance of cost, complexity, availability, and scalability. The paper explains that, no matter how reliable each model is, any deployment can experience outages. The recommendation is to use clustering services to protect your data when the inevitable hardware, software, or network failures occur.
Tags : 
clustering, uptime, failover, mft, network failure, high volume, scale-out configuration, sla
    
Globalscape

Conversational Office 365 Cyber Resilience – A Conversational Geek eBook

Published By: Mimecast     Published Date: Oct 02, 2019
If you are an moving to or already using Office 365 then it’s essential for you to formulate a plan toward a risk-free cyber resilience experience. Cyber resilience requires you to prepare for the before, during and after an attack/outage/incident. Doing so will protect your organization from security threats, compliance concerns, unplanned outages and more. To mitigate concerns and form a resilient strategy you have to first KNOW the risks. The right third-party solution can ensure email is protected against advanced cyberattacks and guarantee service availability SLA – all while leveraging your investment in Microsoft Office 365™. But, what are the key areas of concern around Office 365 email you should be aware of? Read what Microsoft Office Apps and Services MVP J. Peter Bruzzese has to say about the key features and functions you need to address security, data assurance and continuity for Office 365 email – and what to look for in a single solution that does it all.
Tags : 
    
Mimecast

The Essential Guide to Avoiding Networking Outages

Published By: Avaya     Published Date: Mar 10, 2016
When an outage does occur, rapid service recovery is priority one, of course. Still, as the recovery effort is under way, a question lingers: could the problem have been avoided in the first place?
Tags : 
network performance, network management, outages, network optimization, solutions, business results, network performance management, best practices
    
Avaya

8 Benefits of SSL/TLS Automation

Published By: DigiCert     Published Date: Jun 19, 2018
1. Avoid Outages. 2. Save Time, Money, And Resources. 3. Manage Certificates at Scale. Download this infographic today to find out about the remaining benefits of using SSL/ TLS Automation in your business.
Tags : 
    
DigiCert
Start   Previous    1 2 3 4     Next   End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.