HPE NonStop News

 
Screen Shot 2019-09-13 at 11.50.50 AM.png
 

The HPE NonStop Division has released a partial list of Technical Breakout Sessions at the 2019 NonStop TBC. HPE sessions include:

  • Stop fumbling your firmware updates - Best Practices for NonStop firmware update procedures

  • What is PL/MX and how can you use it on NonStop?

  • NSDEE - Increasing efficiency for application development

  • An Overview and history of Artificial Intelligence, Machine Learning and Deep Learning

  • Using Measure to manage system performance

  • Analyze your NonStop data

  • What's new in the world of compilers and languages in use on the NonStop system?

  • AND MORE!!!


Stay tuned for more announcements from HPE! To view the sessions, click here.

HPE NonStop Education Marathon pre-conference training

Special pre-TBC19 training event
October 28 – November 1, 2019

NSAcad_Elections2020.png

In this unique 5 day education marathon, 9 primary topics will be covered in ½ day long journeys. The first morning begins with an introduction and NonStop product overview. Then the marathon begins!

There will be a series of interesting topics delivered by experienced NonStop experts/instructors. Select sessions will also be accompanied by key HPE product management and/or development subject matter experts.

Download the Course Flyer

Learn more and register online at https://www.nonstoptbc.com/nonstop-education-marathon.



NEW IN 2019: NonStop Hackathon!

Hackathon.png

The NonStop Under 40s are excited to announce the first ever (and hopefully annual!) NonStop Hackathon event, to be held at this year’s NonStop Technical Boot Camp!

Teams of two will take part in a series of short (“sprint”) coding challenges, honing their skills as developers and showcase the NonStop as a modern, versatile development platform. Prizes will be awarded to the overall winner as well as awards for creativity and performance. A panel of NonStop experts will be on hand to provide guidance throughout the challenges and judge the winners of each prize.

We hope this hackathon will be the first of many, and provide an engaging, enjoyable way for the next generation of NonStop professionals to test their knowledge, and perhaps learn from their fellow, more experienced NonStop peers.

More details will be made available leading up to the event, including information on the challenge parameters and development languages utilized. If you would like to enroll to compete in the hackathon, please CLICK HERE to sign up.

Spots are limited, so act fast!

 

earlybird.png

Early Bird Registration closes on October 1st!

Don’t miss out on the premiere global NonStop event!
Register now to save $300 on TBC19 registration.

Have you reserved your room at the Hyatt Regency SFO yet?

The NonStop TBC 2019 room block closes on October 11, 2019. Secure your room at a discounted rate online now! While you’re at it, check out the airfare discounts on Delta airlines.

Get Connected!

Sign up for updates emailed directly to your inbox here!

Follow along with the latest #NonStopTBC19 announcements on social media.

Thank you to our Partners!

 
TakeTheSurvey.png

Take the survey

Have your say. Take the Connect Worldwide member survey. Register to win an Apple Watch when you do!

Get started


CrystalPoint.png
 

How OutsideView 9.0

Enhances Workspace Efficiency

Click HERE to read more

 
NuWave+logonew.png
 

Summer in the northern hemisphere is coming to end, but NuWave has lots of great memories. Check out their recap of the Summer 2019 HPE NonStop Events to see their photos and hear how the summer shows went!  

tributary-logo-black.png
 

Register as a Follower to become a Leader in Cloud Object Storage!

Follow #hitachicontentplatform on LinkedIn.

If you’re interested in learning how HCP (Hitachi Content Platform) Object Storage will benefit your IT environment, follow this link. Key technologists at Hitachi discuss the merits of HCP, and customers share implementation experiences. It’s well worth the time to sign up and review.

It’s important to remember that Tributary Systems, is a valued Hitachi partner, and as such, Tributary Systems’ STORAGE DIRECTOR, enhances Hitachi Cloud Object Storage (COS) performance in both active backup and archive use cases. STORAGE DIRECTOR increases read and write speeds to HCP by 5X on average when compared to directly connecting a backup application like Commvault, NetBackup or Veeam to ICOS. In addition, by caching backup data, Storage Director also reduces or eliminates ingress/egress charges for public clouds. We are pleased to demonstrate this in customer environments in a proof of concept (POC).

In addition, no one is more concerned about data security than Tributary Systems. STORAGE DIRECTOR provides AES 256 bit data-at-rest and data-in-flight encryption capable of working with both an enterprise key management systems as well as generating its own keys.

Check out our website at www.tributary.com for complete details on Storage Director, Cloud Object Storage, and data security.

 
Xyprologo.png
 

Strategies for Capturing and Creating Value from your Security Data

Every business wants more data. Data on their customers, competition, operations, processes, employees, inventory and more. Data can be used to make better-informed business decisions and provide strategic insights that give your company a competitive advantage in terms of efficiencies, enhancing the customer experience, or refining market strategy. Its uses are limitless. Over the last decade, computing power has advanced to the point where generating and storing massive amounts of data has become highly cost efficient.

Amassing business data is similar to a dog successfully chasing a car – now that we’ve caught it, what do we do with it? With all that data available, most businesses struggle to figure out how to take advantage of it. According to Forrester, up to 73% of data within an enterprise goes unused for analytics. We are so used to extracting targeted information from data that we simply ignore what we don’t understand and throw it away as noise. This problem is prevalent in every industry, but especially in the security world. Security teams are overwhelmed with the vast amounts of data generated from firewalls, intrusion detection systems, network appliances and other devices. It’s impossible to expect security teams to interpret all this data. We unintentionally end up focusing on what we already know how to analyze and ignoring what we don’t.

xypropicture.png

Typical alerting systems are configured to raise alarms, but only when they encounter a defined binary event or a threshold being reached. For example, if three or more failed authentication attempts performed in succession are detected, the system is configured to generate an alert. Yet successful authentication attempts are mostly categorized as business as usual and ignored, even if they’re occurring at off times or from unexpected locations The current mean time to detect a breach is over six months. Most organizations have all the data they need to identify a breach much faster than that, yet they are still unable to detect and react to a breach in even a semi-reasonable amount of time. This is due to:

  • The volume and velocity of the data being generated

  • Not looking for patterns in all of the data available – the unknown unknowns

  • Not having the proper context for the data available

If your system is ever breached, you don’t need to look at the failed authentication events – you need to look for anomalies in the successful ones!

Click here to continue reading.

Gravic-40th-logo.jpg
 

What is Business Continuity?

Business continuity encompasses the activities that an enterprise performs to maintain consistency and recoverability of its data, operations, and services. Application availability depends upon the ability of IT services to survive any fault, whether it is a server failure, a network fault, or a data center disaster. Data availability depends on the existence of up-to-date backup data copies. Data replication is an enabling technology for achieving high or continuous availability for application services and the timely backup of important data. HPE Shadowbase solutions offer a range of data replication capabilities to meet every application availability and data recoverability need.  For more information, please visit our website or see our white paper, Choosing a Business Continuity Solution to Match Your Business Availability Requirements.

 
cfo-logo-black.png
 

CASE STUDY / SUCCESS STORY

Major Oil Company Chooses Tokenization to Achieve PCI Compliance

This oil company is one of the largest in the world and ranks among the top 10 companies in
the Fortune Global 500. In the United States, they run a vast POS network on mission-
critical systems that includes nearly 14,000 gas stations. At peak levels, this system
processes 225 transactions per second. They also run a customer rewards program that
requires the scanning and authorization of customer cards. The rewards program keeps
track of every time a customer uses one of their gas stations, which over time has generated
a large volume of data.

What were the key challenges?
PCI compliance without compensating controls
The main goal was to tokenize cardholder data throughout the payments network in
accordance with PCI requirements. Up until this point, the company had been relying on
compensating controls, which were becoming costly and impractical.
PCI Requirement 3.4 stipulates that payment account numbers (PANs) must be rendered
unreadable anywhere they are stored and, according to Requirement 4.1, cardholder data
must also be protected when transmitted. This means the data has to be protected while in
motion and at rest.


Maintain service levels on high volume network
An additional challenge was that the system had to stay online throughout implementation
and without impacting service levels. At peak service levels the system handles up to 225
transactions per second and up to 100 million USD in a single day. In an average month, the
system manages approximately 2-4 billion dollars’ worth of transactions. Any interruption of
service would be extremely costly.


Deploy on a highly complex environment
The company uses a combination of ACI’s Base24 Classic and BASE24-eps on its mission-
critical systems. Implementation on BASE24 Classic was especially complicated in this
situation as the company had extensively modified their BASE24 Classic configuration to
accommodate their specific business needs. In addition, the servers are in active/active
mode so that traffic is constantly balanced across both systems and freely bouncing back
and forth. This meant deployment had to be done in a running, truly NonStop production
environment.

Click below to download the case study to find out how this HPE NonStop user successfully
mastered these challenges.

Download Case Study
 
mextug.jpg
 

MEXTUG - Mexico Tandem User Group Annual Meeting
October 4, 2018
Sheraton Maria Isabel Hotel and Towers, Mexico City
Event Info: Calendar Page

 
ATUG-Logo-300x294.jpg
 

ATUG - Atlanta Tandem User Group Chapter Meeting
September 18, 2019
HPE Alpharetta Solution Center
Event Information:
Registration Page