
HPE User Community
Jan-Feb 2021
Jan-Feb 2022
Jan-Feb 2023
Jan-Feb 2024
Jan-Feb 2025
Jan-Feb 2020
July-August 2021
July-August 2022
July-August 2023
July-August 2024
July-August 2019
July-August 2020
March - April 2021
March - April 2022
March - April 2023
March-April 2024
March- April 2025
March-April 2020
May - June 2021
May - June 2022
May-June 2023
May - June 2024
May-June 2019
May-June 2020
Nov-Dec 2020
Nov - Dec 2021
Nov-Dec 2022
Nov-Dec-2023
Nov - Dec 2024
Nov-Dec 2019
Sept - Oct 2021
Sept – Oct 2023
Sept - Oct 2024
Sept-Oct 2020
Sept-Oct 2019


NonStop Trends & Wins
Justin Simonds
PCI DSS V4.0 ADDS NEW PAN DATA DISCOVERY REQUIREMENT
Daniel Lewis
Reimagining a Simple Way for Re-Engaging Hybrid Work Teams
Gaye Clemson
Best practices for Managing your NonStop database
Frans Jongma
NSFTI for the impatient: A 2-minute introduction to NSFTI
Suveer Nagendra
The emergence of multiple software ecosystems
Richard Buckle
Enhance your NonStop application with modern analytics
Paul Denzinger
Don’t Ignore Your NonStop OS Upgrades
Ron Wetzel
uLinga for Kafka – Support for Custom Code via USEREXITS
Andrew Price
Use HPE Shadowbase Essentials Software for Data Management, Monitoring, and Control
Gravic, Inc.
How to Protect Your Online Presence and Critical Infrastructure from Emerging Cyber Threats
Ugan NaidooThe COVID-19 pandemic led to increased digitization of businesses and as a result, created new opportunities for cybercriminals who actively exploited the health crisis and weak links in enterprises who were trying to adjust to the new reality. The Russian invasion of Ukraine has also triggered an escalation in the number of state-sponsored actors targeting critical infrastructure with DDoS attacks. Criminal syndicates, smaller players, and opportunistic criminals – all benefited from the turmoil.

News from HPE’s NonStop Division
Roland Lemoine
NonStop Trends & Wins
Justin SimondsI’ve been doing a lot of research recently based on an article I read online. It was discussing human trafficking and that there were patterns in the transaction flow that could identify this activity. I was intrigued. I was quite surprised to learn that, depending on the poll, human trafficking was either the second or third largest revenue source for criminals.

Discover Las Vegas 2022 Recap
Richard Buckle
BITUG Back in the Real World
Iain Liston-Brown
Building Blocks for Effective Cross-Functional Hybrid Work
Gaye Clemson
This is what you need to know about the new changes to PCI-DSS 4.0
Henry Fonseca
NuWave Prizm Gateway™ is now Generally Available for the HPE NonStop!
Dave Belliveau
Ransomware Recovery Proposed
Richard Conine
Accelerate and Automate SAP HANA Security Compliance with Workload Aware Security Layer (WASL) from HPE and XYPRO
Steve TcherchianIn most mission critical environments, SAP HANA is the lifeblood of an organization. SAP HANA (High-performance ANalytic Appliance) is a highly performant, highly scalable in-memory database that serves as a platform for enterprise resource planning (ERP) applications and other business workloads that need to analyze data in real time.

Data Replication Solution Migration – Discovery
Paden R. Holenstein
Future of Money – Part 2
Idelji CorporationThis is the second part of “Future of Money”. The first part was published in the previous issue, where we covered topics regarding the definition of money and its position vs. currency. We also discussed the emergence of crypto and stable currencies, their relevance, and how they’ve established themselves within our societies worldwide.

Top 5 sources of data breaches
Dan Simmons