C2 Winter 2021

Editor’s Letter

Welcome to The Best of Hewlett Packard Enterprise 2021

In this issue’s cover feature, “Maximize your cloud experience everywhere,” Alexey Gerasimov shares what hybrid cloud means to HPE and, most importantly, how HPE GreenLake helps customers innovate faster and wiser on their transformation journey. With so much at play in the transformation journey, learn how the Edge-to-Cloud Adoption Framework helps customers understand how to get the best value and accelerate cloud success.
Read more

A Note from Connect Leadership

Greetings fellow community members,

The year is coming to a close and that means it is time for our “Best of HPE 2021” issue. It is jam-packed with great content (as are all of our issues!) that should help you do your job better as you learn about new happenings in the HPE world.

As I look back on the year, I reflect upon how challenging it was, but I am happy to say that our user community remains strong.…

Read more

Maximize your cloud experience everywhere

I often get asked if people really care about Hybrid Cloud. Of course, customers do. Not only do they care, but it’s also the reality. According to the latest State of the Cloud report from Flexera, 80% of customers agree that they will operate in a Hybrid Cloud going forward. I think customers realize that it’s not all-or-nothing when it comes to cloud, and they start to pay a lot more attention to placing their workloads in the most appropriate locations.
Read more

XYPRO – Best of NonStop 2021

Have we become numb to the news of security breaches? Unfortunately, the attacks on our businesses, personal lives and even global infrastructure are not slowing down. Cybercrime is up over 600% during the pandemic. According to Verizon’s 2021 Data Breach Investigation Report, 61% of cyberattacks targeted credential theft. This far surpasses personal, banking and payment card information which have been primary targets for years. The cybersecurity industry has responded with a variety of ways to protect sensitive data with regulations, technology, and awareness, which has forced attackers to look for easier targets, such as usernames and passwords.
Read more