CSP
Scenes from NonStop TBC 2023
Connect WorldwideNews from HPE’s NonStop Division
Roland LemoineCSP: Keeping NonStop community’s secrets safe
Henry FonsecaNonStop TBC 22 has wrapped up. See what you’ve missed!
Richard BuckleWith his opening words, “It’s not where we are headed but how fast we will get there,” the boss of all things NonStop, Jeff Kyle, set the tone for the latest NonStop Technical Boot Camp (NonStop TBC 22). “We are a platform and not a server; the platform we are perfecting for mission critical applications. We create the data and we transact the data!”
Securing The Future Of NonStop
Henry FonsecaIt’s hard to believe that 2021 is almost over. Most of us are still getting used to our post-pandemic lives. And as life slowly returns to normal, we should take a moment to reflect on the challenges and successes of the past year. The end of the year is always a great opportunity to look ahead and set goals for the future. And I am not just talking about those pesky New Year’s resolutions that we quickly forget once February comes along.
PCI DSS 4.0 is Coming Here is What You Need to Know
Henry FonsecaThe Power of NonStop Data Analytics
Joel SandbergTwenty years ago, data analytics was a field reserved for geeks and academics, something discussed during breaks in lectures on chaos theory. The idea was to take a very random system, with lots of seemingly disparate data, and be able to tie that tangled web of data together so that meaningful outcomes could be predicted. The most obvious example is weather forecasting, which involves analyzing all the earth’s atmospheric randomness in terms of ever-changing temperature, moisture, and wind, somehow using that data to tell people to bring an umbrella to that 1 pm picnic a week from Saturday.
Improve Compliance with File Integrity Monitoring
Henry FonsecaFile integrity monitoring (FIM) exists because change is inescapable for most organizations. From variations in a company’s hardware assets, software programs, configuration states, permissions, and personnel, it is the one constant within IT environments. Some of these modifications may be authorized, while others will cause concern by their unexpected nature. Because of this, FIM is considered a vital requirement for security compliance frameworks to help identify unexpected or malicious activity across critical system files and protect business assets.