It’s here – meet the next-generation HPE Superdome Flex
Hit new heights
The next-generation Superdome Flex™ is here, extending HPE´s mission-critical market leadership, furthering system flexibility and building on the path to Memory- Driven Computing. It’s powered by the second generation Intel® Xeon® Scalable processors, which are highly competitive against non-Intel alternatives – providing even more compelling reasons to migrate your workloads away from old UNIX systems to industry-standard Superdome Flex. We’ve refreshed our web page to tell you more about the next-gen Superdome Flex – just click below to get started.
IDC whitepaper: Mission-Critical Infrastructure for the Data-Driven Enterprise
Data is the new basis of competitive advantage – so why not inform your next server decision with the data in this new IDC whitepaper? Analyzing features like scalability, performance and availability, IDC concludes that “Superdome Flex sets a high standard for mission-critical servers”. Click below to read their findings in full.
High performance for your SAP HANA deployment: #1 for 8-processor Superdome Flex
No other server scales like Superdome Flex – or delivers better SAP HANA performance. New results published April 2019 detail how new Superdome Flex, featuring 8 second-generation Intel Xeon Platinum 8280L processors, breaks records in the SAP BW on SAP HANA benchmark. Click below for all the details.
Cambridge University’s Centre for Theoretical Cosmology tests theories about extreme events like The Big Bang – requiring data analytics workloads “on the galaxy scale”. In this new podcast, Dr James Ferguson explains the Centre’s exciting work and how in-memory computing with Superdome Flex is advancing discoveries in new ways.
What if you could process and analyze all your data instantly? New Superdome Flex servers advance in-memory computing with an unmatched combination of flexibility, performance and extreme Superdome RAS. Powered by new Intel Xeon Scalable processors, they’re optimized for mission critical workloads like SAP HANA®, Oracle® and Microsoft SQL® Server– and this brochure is your perfect, handy introduction.
Hybrid cloud continues to be a hot trending phrase on any of the search engines you use today, especially as many businesses are trying to balance workloads across private and public clouds. I think this has created more challenges for IT, as workload traditionally running and managed from a datacenter are now scattered across multiple clouds. We have recently been running a successful hybrid cloud roadshow with Microsoft in different countries promoting a comprehensive Hybrid Cloud solution. I have attached to articles that may be interested to anybody that is starting to head in this direction:
Lastly, I hope to see some of you at this HPE’s Discover event in Las Vegas June 18th through 20th. If you are heading in that direction I have attached a link to the Discover site for more information.
Don’t forget to register for the Connect Tech Forum: Software Defined and Cloud Roundtable on Wednesday, June 19th at noon in the Connect HPE User Community booth inside the Transformation Showcase. This is a greet opportunity to say hello to Gary Stevens and me, and get to know more about what’s in store for HPE users. Register online here.
HPE Education Services News
Need training on HPE products? Reserve your seat in our Technical Training sessions, on offer during and before HPE Discover 2019.
Choose from 18 different technical training sessions both hands-on training and lecture only, led by our expert instructors. Download session details here.
Meet with our Training experts to discuss how we can help you with your learning journey
Get certified and take advantage of two free technical exams (a $460 value)
Take advantage of full day training sessions scheduled before HPE Discover (Sunday, June 16 and Monday, June 17th)
HPE Nimble Storage introduction and administration
HPE Synergy composability hands-on training workshop
HPE ProLiant Gen10 iLO5 and security training seminar
HPE NonStop News
Registration for the 2019 NonStop Technical Boot Camp is OPEN.
Take advantage of Early Bird savings until October 1st, 2019. Click hereto save $300 on #NonStopTBC19 registration now!
The 2019 NonStop Technical Boot Camp will begin with cutting edge deep-dive pre-conference seminars on Sunday hosted by the leaders of NonStop innovations and solutions, and will follow with three days of breakout sessions, keynotes, and networking receptions. Meet and learn from the developers, engineers, and executives that are leading the global NonStop community.
This year's event will attract over 400 members of the global NonStop community for four days of networking and learning with NonStop engineers, executives, partners and customers at the Hyatt Regency San Francisco Airport!
Published six times per year and available only to Connect members, The Connection is the premier NonStop user-oriented technical magazine. It offers articles and columns about technical issues and new industry developments as well as the latest information on Connect activities.
The year 2019 is our 40th year of business and we reflect on the past and look forward to the future. We are making progress toward our core purpose of Improving, and our ability to improve society is manifest in the numerous industry-leading and household-name companies that rely on HPE Shadowbase software. Please visit ShadowbaseSoftware.com for additional information on how our enterprise data replication solutions can solve your company’s business continuity, data integration and synchronization, application integration, and real-time business intelligence challenges. Here’s to the next 40 years!
Multi-Factor Authentication on Nonstop Made Easy with CSP AUTHENTICATOR+™
Multi-factor authentication has become vital in ensuring secure access to systems. It provides superior safety measures over easily compromised single password methods and is also an important requirement to comply with regulations such as PCI 8.3 and GDPR.
Any remote user or non-console admin user that has access to the cardholder environment must include multi-factor authentication. From legacy Pathway applications to the latest RESTful interfaces, effective MFA must be provided for users and applications that have the potential to access sensitive data.
The new CSP Authenticator+™ supports both primary and secondary authentication for NonStop. It provides a RESTful interface which supports multi-factor authenticated logins on NonStop systems. CSP Authenticator+ resides on the NonStop Platform and uses an OSS “bridge” to connect to the RESTful interface of the CSP Authenticator+ web server.
For complimentary access to CSP-Wiki®, an extensive repository of NonStop security knowledge and best practices, please visit wiki.cspsecurity.com
We Built the Wiki for NonStop Security ®
The CSP Team +1(905) 568 - 8900
The pre-eminent HPE NonStop Batch Scheduler
MultiBatch version 9.5 is now available; part of a continuous development cycle for just one of our NonStop, Enterprise and Payments monitoring solutions.
For 30 years, our customers have utilised this pre-eminent batch scheduler to improve their SLAs and batch scheduling run times, in some cases, reducing their overnight batch schedule run time by up to 6 hours!
This customer, along with all of our other banking, central bank, securities customers have complex and serious mainframe-class schedule requirements. Therefore, not for them the requirement and skillsets to maintain expensive JCL and TACL configurations when they can use the MultiBatch Pathway and/or GUI.
Fully secured, easy to use, variety of scheduling mechanisms and powerful parallel processing. Importantly, batch recovery in seconds (when site-swap situation occurs) enabling the MultiBatch schedule to be recovered up to the point of failure. No need to wonder where the batch schedule is up to, nor maintain TACL scripts, spreadsheets, SQL tables to record the batch status – all provided for you in a single GUI interface, recording batch schedules in real-time, ready for any site-swap and recovery.
So, with the old…
…and in with the new (real-time batch status, being a small but important part of the MultiBatch GUI)…
For further information, please contact Insider Technologies at:
Proactive Security and Threat Detection - it’s not That SIEMple
Real-time threat detection is an indisputably critical element for maintaining operational integrity across a rapidly changing mission critical environment. Knowing when your system has been compromised quickly can make the difference between a controllable incident and a headline grabbing, catastrophic data breach.
Most organizations cannot assign the time necessary to proactively monitor their environment. Investigating potential incidents is a manual and time-consuming process requiring resources to collect, correlate and search through multiple, disparate logs looking for the answer to whether something is a real incident. It’s looking for a needle in a haystack while more hay is piling on. To do this very heavy lifting, most rely on Security Incident Event Management (SIEM) systems - such as SPLUNK or IBM QRadar.
The truth is, a SIEM-only reliant security strategy is unsustainable and leads to a false sense of security that your SIEM is the ultimate authority on security threat detection and alerts. Unfortunately, SIEM technology is limited by the types of data and devices it is aware of on which it can alert. More…
In this informative peer review, the author is quoted “(The Hitachi Content Platform Object Storage Environment) Is quick to stand up, fantastically versatile, and performs exactly as advertised”. Very flattering commentary indeed! In fact this particular reviewer gave HCP an overall rating of 5 out of 5, read the text to find out why.
It’s important to remember that Tributary Systems, is a valued Hitachi partner, and as such, Tributary Systems’ STORAGE DIRECTOR, enhances Hitachi Cloud Object Storage (COS) performance in both active backup and archive use cases. STORAGE DIRECTOR increases read and write speeds to HCP by 5X on average when compared to directly connecting a backup application like Commvault, NetBackup or Veeam to ICOS. In addition, by caching backup data, Storage Director also reduces or eliminates ingress/egress charges for public clouds. We are pleased to demonstrate this in customer environments in a proof of concept (POC).
In addition, no one is more concerned about data security than Tributary Systems. STORAGE DIRECTOR provides AES 256 bit data-at-rest and data-in-flight encryption capable of working with both an enterprise key management systems as well as generating its own keys.
Check out our website at www.tributary.com for complete details on Storage Director, Cloud Object Storage, and data security.
Living on the Edge (of computing and security)
With the advent of Edge computing, where computing is largely or completely performed on distributed device nodes, the ubiquitous question about security and compliance is becoming a central focus of the debate. In particular for Internet of things (IoT) devices, data comes in from the physical world via various sensors, which creates its own unique set of security and compliance challenges.
Big Data Analytics: the Top 3 Security and Compliance Challenges of 2019There is an incredible number of people, devices, and sensors that generate, communicate, and share data. Analysing this data enables organisations to gain customer insights, develop better applications, and improve efficiency and effectiveness – or simply make better decisions.
While these insights are bringing many benefits to companies, there are also increasing concerns over the trustworthiness of this data as well as the security and compliance challenges regarding the way it is used.
We need more data. Or do we? Almost everything we use today creates data – from our smartphones to connected TVs, to our smartwatches.
At the organisational level, this also includes a large amount of data that was accumulated internally as well as that which comes from complex infrastructure.
Much of this data, such as emails, spreadsheets, and word documents, is held in unstructured form. Also, a lot of data is created in an ad hoc manner which causes significant problems because it is hard for an organisation to know what exists and where it is stored.
And looking at the term big data from a broader perspective, much more potential comes from utilising data from external sources like social media, publicly available data from government databases, and data from other organizations.
The combination of data sets holds a lot of value when gaining insights or trying to make decisions based on consumers preferences.
Challenge 1 – Ethics and Compliance. Organisations have to comply with regulations and legislation when it comes to collecting and processing data to protect PII.
Challenge 2 – Poor Data Management. Caused by a lack of clear ownership for big data and poor control over its lifecycle.
Challenge 3 – Insecure Infrastructure. Security by design is required to avoid additional vulnerabilities from IoT devices.
N2TUG Save the Date!
N2TUG presents Devops for CI/CD: Deliver Changes with Confidence Thursday, June 27th, 2019.
To Register now, click here to open your email client, and create an email to send to us so we can register you. Please follow the instructions at the bottom of the email before hitting ‘Send’. If your email client doesn’t support ‘mailto’ links, please reply to firstname.lastname@example.org with