Fall2019

5 Tips to Prevent Ransomware Attacks on Backups

Backup and recovery solutions are designed to protect your organization, but sophisticated malware like Locky and Crypto-ransomware are now targeting your backup data. Not surprising, considering the rise in frequency and breadth of ransomware attacks. The first ransomware payment—circa 1989—set the stage for hackers everywhere to begin locking up the data of unsuspecting targets and holding it until owners paid to get it back.
Read more

Accelerate Artificial Intelligence with Transfer Learning

Any article on Artificial Intelligence (AI) will point out that trying to address an AI problem requires large amounts of data to deliver meaningful results. To train the data into a usable AI model, a massive amount of compute capacity is needed. On top of that, it is challenging to find resources from a limited pool of people with skills that are in high demand. Putting all the pieces together is costly and time-consuming.
Read more

Editor’s Letter – Fall 2019

“The lead car is absolutely unique, except for the one behind it which is identical.”
—Murray Walker

Welcome to the Fall edition of Connect Converge

Welcome back, we are glad you are here! With this issue, we are pleased to roll out the new look and feel of Connect Converge. As the Hewlett Packard Enterprise Technology User Community, we aim to bring you topical news that amplifies the message of everything HPE.…

Read more

Big Breaches, Big Data, Big Context How to Empower the Next Generation of Security Threat Detection

It can take months or even years before a data breach is detected. The latest statistics from Ponemon Institute’s 2018 Cost of Data Breach Report outlines that it takes an average of 197 days to identify a breach. That means someone is in your network, on your systems, in your applications for over six months before they’re detected, IF they’re detected. That’s six months! On the higher end of the same report, there are companies that have been breached for years before they realize it. For example, sources indicate the Marriott data breach occurred back in 2014, but it was not disclosed until 2018. The scale of that breach is still being evaluated and it seems to get bigger and more impactful as more information is discovered.
Read more

Around The Storage Block

In this abbreviated article based on an Around the Storage Block blog post, my colleague Simon Watkins looked at what customers said about HPE StoreOnce. There were too many quotes to include in my article so be sure to read the article on ATSB to see everything that was said. Here’s the article from Simon.
Read more

Protecting your most vital applications and data with HPE Mission Critical Software

In our connected 24x7 economy, experiencing downtime for most applications has become cost-prohibitive for business, not only financially but also in loss of reputation. Minimizing downtime has long been a core tenet of IT teams the world over, especially those working with vital applications such as enterprise resource planning, core banking, electronic healthcare and more. In HPE, we have vast experience and proven solutions in the mission-critical computing space. We start at the infrastructure level with our well known mission-critical servers, with a unique and comprehensive set of built-in RAS (reliability, availability, and serviceability) capabilities that result in high levels of single-system uptime. Single-system availability is of great value, and a fundamental component of any mission-critical environment; but it´s not enough when the end result must be maximum application uptime across the IT stack. Ultimately, the business cares about the availability of business functionality, and that comes directly from the applications. And so, application-targeted high availability is paramount for this type of IT deployment.
Read more

HPE and VMware Team Up to Bring You the Full Cloud Experience in Your Data Center

To judge by some of the articles I see in the tech press, you’d think that IT departments these days have to be the technology equivalent of ninjas – able to spin on a dime in combative business environments and wield killer transformations at a moment’s notice. Well, exaggerated as that picture might be (for most companies anyway!), there’s more than a grain of truth there. Most IT shops do want to be a lot more maneuverable and responsive to what the business is asking for, no question. They want to get new apps and services out the door faster and grab new market spaces before competitors can muscle in.
Read more