HPE NonStop News
If you missed the latest Connection read it here
Read the feature:
The State of NonStop - Current and Future - with ATC's Franz Koenig
Registration for the 2019 NonStop Technical Boot Camp is OPEN.
Take advantage of Early Bird savings until October 1st, 2019. Click here to save $300 on #NonStopTBC19 registration now!
The 2019 NonStop Technical Boot Camp will begin with cutting edge deep-dive pre-conference seminars on Sunday hosted by the leaders of NonStop innovations and solutions, and will follow with three days of breakout sessions, keynotes, and networking receptions. Meet and learn from the developers, engineers, and executives that are leading the global NonStop community.
November 3-6, 2019
Hyatt Regency SFO
Burlingame, California USA
Early Bird Registration Open
Take advantage of Early Bird savings! Save $300 on registration until October 1st.
Secure Your Sponsorship Today
This year's event will attract over 400 members of the global NonStop community for four days of networking and learning with NonStop engineers, executives, partners and customers at the Hyatt Regency San Francisco Airport!
Take the survey
Have your say. Take the Connect Worldwide member survey. Register to win an Apple Watch when you do!
Gravic Publishes Article on How to Successfully Host a Hackathon
Gravic recently published an article, From Hacker to Hackathon – History in the Making! in the May/June Issue of The Connection. The article includes highlights from planning, scheduling, coordinating, and hosting our first-ever hackathon, which has now become a highly anticipated annual event. Our employees enjoyed a tremendous team-building experience, were exposed to new ways to solve problems, and learned some exciting concepts. This article also reviews the history of hacking, hacker culture, and how other companies could hold their own hackathons. We would like to thank Gravic’s Learning and Development Committee for organizing this event!
A new how-to video on REST-enabling payment engines is now available from NuWave.
Missed ETBC 2019?
Read CSP's Full Recap of the Event
CSP was proud to be a Gold Sponsor of the 2019 European Nonstop Technical Boot Camp, which took place at the Sheraton Grand Hotel & Spa in Edinburgh, UK from May 13-15.
For complimentary access to CSP-Wiki®, an extensive repository of NonStop security knowledge and best practices, please visit wiki.cspsecurity.com
We Built the Wiki for NonStop Security ®
The CSP Team +1(905) 568 - 8900
Gravic Publishes Technical Article on Reliability, Availability, and Scalability
Gravic recently published an article, A Modern Look at Reliability, Availability, and Scalability, in the May/June Issue of The Connection. Availability and reliability are complimentary measures, and they each deserve equal consideration for mission-critical applications. Enterprises want both 100% availability and 100% reliability but can never achieve 100% for either. Availability is the proportion of time that an application or system is running and properly operating, and is measured in “9’s.” This article explores data integrity as a measurement of reliability, what affects data integrity, and what level of data integrity is needed. In short, businesses with mission-critical applications must seek to drive their Recovery Point Objective (RPO), Recovery Time Objective (RTO), Integrity Point Objective (IPO), and Integrity Time Objective (ITO) all to zero. Next, this series will explore ways to improve reliability, measure IPO and ITO, and explore several new architectures that will yield superior results for mission-critical systems.
Finding a Needle in a Haystack:
Protect Your Business by Detecting Security Breaches Before Real Damage is Done
It can take months or even years before a data breach is detected. The latest statistics from Ponemon Institute's 2018 Cost of Data Breach Report outlines that it takes an average of 197 days to identify a breach. That means someone is in your network, on your systems, in your applications for over six months before they’re detected, IF they’re detected. On the higher end of the same report, there are companies that have been breached for years before they realize it. For example, sources indicate the Marriott data breach occurred back in 2014, but it was not disclosed until 2018. The scale of that breach is still being evaluated and it seems to get bigger and more impactful as more information is discovered.
Why is this the case? Most companies have all the hardware and data they need to detect a breach. All of the attackers’ activities are in the audit files, log files and other sources of data required by security frameworks and compliance policies to gather and store. Yet it still takes six months to detect. It all comes down to the data.
In 2019, data is being generated at a volume and velocity never seen before. Some have estimated that we will generate more data this year alone than in the past 5,000 years combined. To put this into perspective, on a daily basis:
500 million tweets are sent
294 billion emails are sent
4 petabytes of data are created on Facebook
4 terabytes of data are created from each connected car
65 billion messages are sent on WhatsApp
5 billion searches are made
Chief Product Officer & CISO
XYPRO Technology Corporation
NonStop Systems Monitoring
Reflex: THE most user-friendly, low footprint, performance, event management, and monitoring solution for the NonStop arena. Monitor your MultiBatch, NetBatch batch schedules, files, processes, applications, events, and performance metrics, across your Expand network. Fully secure, easy to use and tells you everything you need to know about your NonStop systems; all via a single interface.
Class-Leading Batch Scheduler
MultiBatch: THE class-leader in batch scheduling solutions for the NonStop platform, incorporating
extremely fast batch schedule recovery, site-swap and system load functionalities. Utilise GUI or Pathway interfaces; no JCL or TACL expertise. MultiBatch is continually maintained and enhanced and is utilised by the UK’s leading retail banks and the UK Central Bank.
Monitoring the Enterprise
Sentra: THE Single Pane of Glass solution for your entire monitoring and tracking requirements, incorporating NonStop, Windows, Linux, Solaris systems. Simultaneously monitor your BASE24, NCR Authentic, Atlas, Lusis payments systems and the underlying infrastructure. Utilise unique and in-depth querying mechanisms for payments, events, transactions, messaging.
If you would like further information on how our products can provide your monitoring, enterprise and mainframe-class batch scheduling requirements, then please contact Insider Technologies Limited:
+44 161 876 6606
On-premise, in the cloud or both - How do you best Secure Big Data Analytics?
The term “big data” has been around for a while (almost 15 years now) and the hype seems almost over. So, has it become irrelevant? Not quite!
Looking at emerging technologies like IoT, this trend won’t stop. We have to find ways to make use of it.
Big data provides big insights, with seemingly endless use cases and benefits — from improving how companies market to customers to stopping attempted financial fraud, from tailoring cancer treatment for better outcomes to reducing the number of traffic accidents.
How to handle this huge amount of data
It’s not only the use cases that are expanding, but the infrastructure and the environment where big data is collected and analysed too. In fact, big data is literally everywhere today - streaming from sensors and devices, moving across the Internet and of course in your data centres.
Many organisations are striving to find the right way to use and store data. While many started with on-premises systems, more and more cloud providers have started offering comprehensive solutions. Today, many organizations have already shifted parts of their big data projects to the cloud.
The cloud is one of the best things that ever happened in terms of advancing and accelerating innovation across nearly every industry – no dispute there! For big data analytics, cloud storage and computing give organizations a flexible, scalable and cost-effective way to store and analyse massive volumes of data.
Keeping in mind that big data also contains valuable, often very sensitive data – organizations endeavour to use the cloud for “everything”. Consequently we see many hybrid environments, where some of the data are on-premise and others in the cloud.
Another concern is that many organizations don’t want “vendor lock-in”. Imagine a retailer using AWS for cloud projects, which also happens to be the service of one of its strongest competitors in the market. With that, we see a lot of companies using multiple cloud services to make sure they avoid some of these traps.
But that’s not the only challenge with adopting the cloud for big data analytics...
While cloud computing comes with many benefits, it also dramatically increases companies’ attack surfaces. In the end, it’s just someone else’s data centre – and you have to be very cautious when trusting cloud services vendors. Far too much of the data which organizations send to cloud providers ends up in the hands of attackers, who sell it for use in malicious activities.
Data is constantly moving between different environments, databases, and applications, which can be on-premises, in the cloud or a combination of both. Often, data is not protected well and too frequently, it’s not protected at all. Using hybrid or multi-cloud environments only complicates your infrastructure. The more complex the infrastructure becomes, the more difficult it is to protect.
Many enterprises are realizing that ultimately and legally they must take greater steps to protect their data in the cloud. Turning on the minimum viable security provided by cloud vendors and other third parties is rapidly proving to be woefully inadequate.
No matter where the data goes or resides, its security represents one of the most challenging obstacles to companies looking to reap the benefits of big data analytics. When enterprises cannot reliably, and consistently secure sensitive data used in big data analysis, it often leads to refused access, risk of non-compliance or even breaches.
This is where HPE NonStop comes into play. Its “tried and tested fundamentals” like linear scalability, high availability, fault tolerance and high performance are complemented by the support of multi-cloud and hybrid environments. As a result, HPE NonStop brings mission-critical availability to cloud-based applications and aligns seamlessly with enterprise cloud strategies.
With rapidly increasing volumes of data and the need for compliance with data privacy regulations, the protection of mission-critical and PII data is paramount to protect your business and future growth prospects.
Like the song says: “I want it all”…
There's no need to compromise between data analytics and security. You can have it all. To secure their growth, enterprises have to make data available to data scientists and other businesses, but it’s equally important to comply with privacy regulations and protect sensitive, confidential information from prying eyes. Now you can have the best of both worlds with data-centric security. Read our white paper to find out how.
Is it Time to Upgrade?
OutsideView 9.0 - Our Best Release
Latest security protocols
Increases User Productivity
Ready to Order?
For the President?
N2TUG Save the Date!
N2TUG presents Devops for CI/CD: Deliver Changes with Confidence
Thursday, June 27th, 2019.
To Register now, click here to open your email client, and create an email to send to us so we can register you. Please follow the instructions at the bottom of the email before hitting ‘Send’. If your email client doesn’t support ‘mailto’ links, please reply to firstname.lastname@example.org with
Subject: Registration for N2TUG 2019: Devops for CI/CD: Deliver Changes with Confidence
Book now at The Gaylord Texan Resort: https://book.passkey.com/go/hpetugmeeting