Tandemworld eNewsletter for September 2015 Gold Sponsor is Silver Sponsor is
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Tandemworld eNewsletter
for September 2015
Contents
Upcoming Live Webinar
High Tech… Low Tech…. High Tech
comForte was Awarded a Patent on
Tokenization Technology within its SecurData Product for the HP NonStop
Platform
SOAPam®
Client Demo Now
Available
Go Easy on Your CISO – They’re Under a Lot of Pressure
Connect With NuWave at Upcoming Events This Fall
Moving to assemble from build; DataExpress proves
NonStop customers like smart vendors!
New comForte Video - Making Your Valuable Data A
Worthless Treasure
XYPRO looks forward to
seeing you throughout 2015
comForte's Limited Edition 'HP NonStop for Dummies'
Book!
Gravic Publishes New
Article on Advantages of Data Replication
Compared to
Tape/Virtual Tape Backup for Disaster Recovery
comForte at events
near you in 2015
Video – Get Started in 5 Minutes! XML or JSON-Enable COBOL or C Programs
with Canam Software Labs Inc.
Availability Digest
Asks, Will You Be Ready When the “Big One” Strikes?
Musings on NonStop! - September, ‘15
New TANDsoft Customer
Counts on FileSync and AppendOnly for OSS
Looking for Painless, Efficient BASE24
Migration? Look No Further Than OmniPayments!
ATTN: MOMI USERS!
NonStop Technical Boot Camp 2015 Current Subscribers 15067 Upcoming Live Webinar
NuWave Technologies is happy to announce their next webinar, Modernization Through Integration, taking place on October 14, 2015.
On HP NonStop, most mission-critical applications remain in production 24/7/365, with minimal downtime. If your company depends on this platform, then this presentation will show you how to modernize your applications by integrating them with other platforms, applications, and Web services. You will also learn how to drive down costs, improve operating efficiency, and create breakthrough improvements in total user experience.
A technical presentation will also be provided by NuWave's technical team.
There will be three sessions. Please register for the session that is most convenient for you.
Europe/Africa: 9am ET/1500 CET Americas: 11am PT/2pm ET Asia: 9pm ET/900 HKT (Oct. 15th)
Register for the webinar here: https://attendee.gotowebinar.com/rt/3992802078780570881 NuWave Technologies have also opened the vault on their past webinars. Watch them free without having to provide additional information on their YouTube channel
High Tech… Low Tech…. High Tech High Tech In my career I have been flying to meet Customers all over the world for over 30 years. Recently I hit the Million Mile mark with United. There was no special award for this (other than a sore back) but I wanted to make the point that I have had a ride on almost every type of aircraft possible over my career. But with all of these miles and all of these aircraft my flight last week from Houston to London was a new experience. I had my first ride on a Boeing Dreamliner. The aisles are wide. The overhead bin space is larger enough for everyone’s carryon bags. The ceilings are tall enough for a pro basketball player to walk. The windows are at least 3x the size and have electric shades that cause the tinting to react without having to slide up and down a shade that always seems to be broken. They inject moisture into the air so you can take a long flight without getting dehydrated. The engines are massive and you can actually feel the power vibrate thru the airframe as they fire up. The flight deck is a small apartment separated from the main cabin with two crews, beds, and a toilet. Once airborne you fly comfortably at 41,000 feet. All of this high tech stuff was preceded by years of careful planning. Before United took delivery they had to plan the routes, modify the airport jetways, and train the crews. Our aircraft originated in Tokyo, flew 15 hours to San Francisco, spent 3 hours on the ground, flew 3 hours to Houston, spent 1 hour on the ground, then flew 9 hours to London. In London, after a 3 hour servicing, turned around to head back to Houston to repeat the journey to Tokyo. This aircraft spends 19 hours out of every 24 hours in the air, generating revenue. It’s almost as if since the day it was born it was never intended to be on the ground again. This is definitely a vast improvement over the old turbo prop days. Low Tech So this brings me to Ireland where I am this week. I came over to NTI’s offices and to meet with friends. My wife came along with me and we took a day trip to the town of Ballina, County Mayo. About 102 years ago her grandfather, at the age of 26, immigrated to the US in search of work. The family for generations had been dock workers and local work was limited. He headed to the US in search of a better life for his family. In the US he had a son who was fortunate enough to get involved with computers as they evolved from the 1960’s. Now my wife, the granddaughter of the immigrant, who has a career in leading edge technology, has come back to stand on the docks where the American connection began. I found this very cool. As he headed to America he could never have imagined that future generations would return in search of the past.
High Tech Now let me circle around back to the Dreamliner. When I booked my ticket, the credit card company, and the financial networks, and my bank all used Tandems and DRNet. DRNet replicates their data to backup Tandems to protect against loss. DRNet ensures that United does not lose any revenue and Jim doesn’t get a free ride on their expensive Dreamliner.
That’s all well enough but nowadays credit card fraud is out of control. To counter this our Customers are replicating their Tandem transaction data to Oracle or Microsoft data warehouses to feed fraud scoring engines. DRNet/OPEN is a key component within their sub second fraud detection infrastructure. We intercept, transform, and transmit this data to the scoring engines without interfering with the Tandem transaction flow. It’s cool stuff and as always, is backed by our awesome Engineering team who will walk you through every step of the setup of this complex technology.
From Ireland, where the smile and warmth of an Irishmen is quicker that the slow internet service, I bid you “ go mbeadh lá iontach” (have a wonderful day).
DRNet® is world class NonStop Data Replication technology. · Real-time Active/Active Data Replication · Real-time Tandem to OPEN Data Replication · Real-time File Synchronization · Refreshingly Real-Time Support from Real Engineers
+1 (402) 968 3674
comForte was Awarded a Patent on Tokenization Technology within its SecurData Product for the HP NonStop Platform
comForte 21 GmbH announced that it was awarded patents for a 'Computer-implemented method for replacing a data string' by the German, European and United States Patent Offices.
The respective Patent Numbers are:
In general terms, the invention relates to a method for replacing an unencrypted data string from a data record by a token in a tokenisation device, therefore rendering the sensitive data string unreadable.
The patent applies to the Tokenization of data to protect data at rest from getting into the wrong hands. Tokenization has gained significant traction in the financial and other industries in the past several years. comForte invented the patented underlying algorithm as early as 2011, confirming comForte’s position as a thought-leader in data security, especially for the payment industry. comForte is excited to having been awarded this patent as it is a key technology for its SecurData solution. SecurData can add tokenization capabilities to any payment processing software running on HP NonStop systems.
For more information on SecurData, please visit www.comforte.com/securdata and/or read the latest article on SecurData at www.comforte.com/Tokenization_article. For more information on comForte, visit www.comforte.com.
SOAPam® Client Demo Now Available
You can now view NuWave Technologies' recorded demonstration of SOAPam Client software, for free! In this demo, one of the original developers of the product uses a banking application on a HP NonStop server to retrieve an account balance stored on a disparate platform. This is done quickly and easily using the power of SOAP Web services.
Access the SOAPam Client demo now to learn to access external public and private Web services.
XYPRO – Go Easy on Your CISO – They’re Under a Lot of Pressure
Threats are everywhere. And it’s no secret cybercriminals are getting more organized and working more patiently to accomplish their objective: stealing your data, access to which is provided via an infinite number of channels. There are currently an estimated five billion devices connected to the internet today and Gartner estimates that number to grow to 25 billion + by 2020. That’s almost 4 devices for every man, woman and child on the planet. Look around your desk. How many connected devices do you count? 5? 6? More? Further, just how many of these devices are being brought into and connected to the enterprise at work, exposing not just you, but your company to further risk? A recent article I read described the exponential increase of connected devices - including devices such as smart ice cubes that pulse to the beat of your music and monitor how much you’re drinking and smart diapers that can tell you when the baby needs to be changed! Every one of those devices pose a risk at home and work. This risk increases the strain on security resources that now have to be responsible for plugging up every hole, even ones they don’t know about.
The odds are against your successSecurity professionals in today's landscape have to be right 100% of the time to stop criminals, whereas the criminals only need to be right once. Those are pretty scary odds considering all the different devices they need to take into account. You would get better odds if you were to wager that I'd end up being the President of the Moon. I kind of like the sound of that. I’ve been in the security space for nearly my entire career. Back in the old days, security was nothing more than installing a small firewall in a locked room that also housed the cleaning supplies because someone said a firewall was the right thing to do. Back then, the only time sensitive part of the job was ensuring the antivirus software on everyone’s system was up to date. Synching your phone was simply putting your Palm Pilot or Windows CE on its cradle to sync your contacts and calendar and working from home meant printing out your spreadsheets to take with you. As a CISO now, the number and magnitude of security risks that have to be factored into the day-to- day monitoring and overall corporate strategy are mind blowing. BYOD, IoT, VPN, ISO, PCI are all acronyms CISO’s lose sleep over. As a profession, we not only need to worry about the outside attackers intentionally threatening everything in our organizations, but we also have to make sure our legitimate inside users are informed enough so they're not going to accidently open our systems to a vulnerability or circumvent security controls because “It gets in the way of doing real work”. We have all received those tempting emails offering an all-expenses paid trip to Tahiti or texts saying that we are entitled to a ten million dollar Nigerian inheritance; all we have to do is send them our SSN and corporate password to collect our riches. How do you ensure your users are armed with enough information so they know not to click or respond to obvious phishing scams as well as the more sophisticated ones designed to look perfectly legit? Couple all that with the 100 different security tools we need to deploy from 50 different security vendors all with their own proprietary implementation and it’s a mystery to me why anyone would want to willingly work in the cybersecurity space. Don’t even get me started on physical security and regulatory compliance. Good luck getting any sleep at night! (Have I mentioned I’m thinking about switching careers to become a fisherman?)
You’re only as strong as your weakest linkYou can spend millions of dollars on the fanciest security hardware with cool flashing lights and engage every vendor for their “Next Gen Security Whatever” solution, but all that aside, one gigantic vulnerability still exists in every organization. PEOPLE. Users are the single largest vulnerability when it comes to cybersecurity. In fact, studies show that 95% of successful security attacks are the result of human error - that is a scary number. Users can be manipulated into giving up sensitive information. Users can forget proper protocols and passwords, they can even forget that they're not supposed to click that link! A proper security awareness program with frequent reinforcement messages that advocate vigilance will help arm your users with the knowledge needed to protect your organization. Most regulatory compliance and security frameworks incorporate and in fact require a security awareness program for users. There is no use locking all the doors and windows when the users are going to continuously open them again. Informing your users why and how they should keep windows and doors locked empowers them with the information they need to turn them from our biggest vulnerability to our greatest asset. Security is no longer an IT problem, it is a business problem and security professionals at all levels need to work together to minimize the risk of the "people factor" and maximize the success of their security posture. As such, consider the following points to assist in the success of your security program.
1. Executive Support – A security awareness initiative without executive support will not get much traction with the rest of the organization. If the executives don’t see the value, other key departments you need to work with won’t either. Getting this level of support can be difficult, even though there is a correlation between compliance and awareness efforts and reducing corporate risk. 2. Peer and Interdepartmental Support – Everyone is busy, but just as important as getting executive support is getting departmental support. If people don’t see the direct value of your program, it’s not likely to succeed. Tailor your message to the specific department. Partner with them. Make key departments such as legal, HR and finance understand they have a vested interest. As security practitioners, we know we have to work up, down and sideways to get the support needed for our initiatives to be successfully implemented. 3. Walk before you run - When it comes to security awareness, there isn’t a one size fits all solution. Depending on your industry and company culture, you will need to evaluate your audience and their level of expertise and cater your program to allow your audience to extract the most value out of your message. 4. Have a Plan – I cannot stress this enough. After getting everyone to support your program, you need a way to execute and measure the success of the initiative. Compliance programs, such as PCI have their suggested methods, but these should be used as a baseline or framework to build on and customize for your organization. Create a 90 day plan and identify key performance indicators to keep your program successful and progressing. 5. Reinforce, Reinforce, Reinforce – It doesn’t have to be weekly stern emails telling people not to click on links in emails sent from Romania or not write their corporate passwords on a sticky-note and place it under their keyboard. Be creative and be consistent. Make people want to join and engage in the program. Create a cybersecurity week and celebrate a theme. Have others share experiences. Give out prizes for participation. Create posters. Get everyone engaged. Employees feel engaged in the program if they can relate personal experiences to the message.
We all wear multiple hats when it comes to cyber protection and security awareness. We must protect ourselves against both internal and external threats, inform our legitimate users about what not to do, sniff out those looking to harm the rest of us. It’s an ongoing effort that requires teamwork. Make sure your team is educated, motivated and armed with the knowledge and tools necessary to do their part and they will. Steve Tcherchian, CISSP, CISO
Facebook
Connect With NuWave at Upcoming Events This Fall
The NuWave team will be traveling to key events throughout the world this fall to build on our relationships in the NonStop community and to speak about how we can help you modernize your applications through simple integration with other platforms. Want to connect with us? Check out our schedule of upcoming events and presentations, and click here to find more information about each summit. Email Ernie at eguerrera@nuwavetech.com, Gabrielle at gguerrera@nuwavetech.com, or Dave at davidross@nuwavetech.com to schedule a time to meet for dinner or drinks.
Moving to assemble from build; DataExpress proves NonStop customers like smart vendors!
In the Rust Report feature of September 7, 2015, Modernization and digital transformation projects are behind growth in enterprise application software market editor Len Rust opens with, “‘The majority of spending is going towards modernizing, functionally expanding or substituting long-standing business and office applications with cloud-based software-as-a-service’, said Bianca Granetto, research director at Gartner.” Furthermore, under the sub-heading, Modernization of Core Enterprise Applications, Rust writes of how, “In a recent Gartner survey, 45 percent of respondents with knowledge of their organization’s software strategy indicated that one of the current top five IT project priorities is ‘application modernization of installed on-premises core enterprise applications’ and a further 41 percent indicated that ‘extending capabilities of core enterprise applications’ is a top five priority.” Part of the reasoning for the increased uptick in spending on modernization is the drive to breaking down the application siloes developed over the past couple of decades and to some extent, this came about following research published by Gartner and others that strongly recommended enterprise application software be purchased on the basis of best-of-breed. With little consideration for the likely end-game of such a strategy, the results are now very clear to see – additional layers of expensive middleware is being introduced to move data, and sometimes business logic, to multiple systems in order to ensure consistency. The popularity of SOA and Web services, off the back of universal presence of the Internet, supporting the externalizing business logic as a service was seen as a quick-fix for presenting a mixed bag of applications and systems in a consistent and readily consumable manner, whereby today, it’s perhaps the most recognized solution to the problem of breaking down application silos. However, what happens when we do get past the breaking down of these silos? What will application modernization mean, once we have completed the quick fixes – is the world of applications about to change again? Surely enterprises have all the business logic they need in order to succeed in business! In reality, industry trends suggest that this is not the case as technology supports a movement towards a more insightful and predictive model, drawing heavily on data analytics for better understanding of behavior – the transition from simply being able to make actions visible and respond accordingly to where eventual actions can be influenced and indeed steered towards outcomes more advantageous to the enterprise. When you consider the NonStop vendor community today and how they go about developing solutions, there’s a lot more building going on than creating. The “smarts” of any implementation are in the design and the decisions taken to populate functions with appropriate routines – “assembling a solution” has now become the norm, rather than cutting code. Utilizing open source frameworks, populating with trusted code stubs and indeed complete code routines is accelerating the development of solutions even as it aids in overall quality and reliability (when the right sources are selected), and the NonStop community is not immune to such actions, as isn’t most of the industry. “There’s no question that the pervasive nature of the Internet has changed much of our thinking when it comes to secure, managed, file transfer such as we provide today with DataExpress,” said DataExpress CEO, Billy Whittington, “Nor is there any question about the impact that SOA has had on application modernization but as we look further afield then the movement to open source looks to be unstoppable as even major vendors like IBM and HP have become strong proponents of open source. There is definitely a trend developing whereby the creative process of vendors has more to do with assembling than coding along similar lines as to what users face when it comes to build versus buy. For DataExpress, plugging the gaps in our feature list allows us to consider pulling from the open source but, like many of our customers, we still have to be judicious about the code we chose to include in DataExpress. The upside however is that we can respond faster to customer requirements even as we have the opportunity to share features between our NonStop and Open Platform instances of DataExpress.”] As Rust concluded in his op-ed column, “Gartner predicts that by 2020, 75 percent of application purchases supporting digital business will be ‘build,’ not ‘buy.’ Gartner’s research shows that many organizations already favor a new kind of ‘build’ that does not include out-of-the-box solutions, but instead is a combination of application components that are differentiated, innovative and not standard software or software with professional services (for customization and integration requirements), or solutions that are increasingly sourced from startups, disrupters or specialized local providers.” For the NonStop community to shy away from such developments, or discount in any way NonStop vendors “building” new solutions in this manner, is both short-sighted and to some degree, naïve. We all want to see NonStop systems thriving in enterprises today and be the focal point for running mission-critical solutions so when it comes to modernization think not only of what needs to happen now (and to continue to pursue modernization of current business logic) but look further out and consider how best to embrace insightful and predictive computing every enterprise will want in the coming years.
New comForte Video - Making Your Valuable Data A Worthless Treasure
This video discusses recent massive data breaches and strategies to protect your valuable enterprise, credit card and personal private data, making it a "Worthless Treasure" to hackers.
Click here to watch the full video.
Ban Bottlenecks® Goes Weekly!
It’s here! 100% detailed coverage of the performance of your system. Every processor, IPU, disk, IP and legacy comm interface, process, application, etc. Complete detailed charts covering each week. Charts showing the month and the last 24 months, and historical averages for the last 2 years. Charts and reports showing availability, year-to-date and month-to-month growth for system and application factors. A suite of In-Depth reports covering peaks and problems for the week. Reports providing a 24-month history of “usage per transaction” for processing effectiveness management and capacity modeling. It’s automatic. No need to manually collect and transmit huge measurement files. No need to learn and manage complex system management or performance tools. No need to send someone for training. No need to pay expensive fees for licenses. No need for us to login to your systems. “I don’t even need to know the questions to ask!” All of the above is in addition to our monthly customized personal expert analysis of your system(s). While you may not have the time or expertise to understand all of the data from your systems, we do. In fact, that’s the principal reason for Ban Bottlenecks. We will review your system each month, grade a dozen or so factors A-F, and discuss corrective actions with you. If your shop doesn’t have the time or training to proactively manage the performance/capacity of your systems, or you’re simply buried in data, we’ll show you how to stay out of trouble. Cost? Less than what you’re currently paying for software alone. For the last 25 years Ban Bottlenecks has been successful in collecting, integrating, and analyzing all the factors affecting application availability and performance. We have shown our clients where their systems will be heading into trouble. They have fixed the issues before there were problems, before there was a service disruption. If this is your goal, give us a call. Contact us for a free proof of concept!1.415.256.8369
XYPRO looks forward to seeing you throughout 2015
September 29 - October 1, 2015 – North American PCI SSC Community Meeting Vancouver, BC, Canada
October 5-6, 2015 – Payments Knowledge Forum 2015 One Great George Street, London
October 14-15, 2015 – Asia Pacific PCI SSC Community Meeting Tokyo, Japan
Oct. 19, 2015 – NENUG Boston, MA
October 21- 22, 2015 – CTUG Mississauga, Ontario
November 3-5, 2015 – EMEA PCI SSC Community Meeting Nice, France
November 15-18, 2015 – Connect NonStop Boot Camp San Jose, CA
December 4, 2015 – BITUG BIG SIG Trinity House, London
comForte's Limited Edition 'HP NonStop for Dummies' Book!
This book is for anyone with an interest in HP NonStop systems. This book is for you if you're new to the platform, have spent many years working with it, if you manage people or IT systems, or if you're a system operator or developer on/for the HP NonStop platform.
If you would like to receive a free copy of the 'HP NonStop for Dummies' book please register at … http://www.comforte.com/ns4dummies
Gravic Publishes New Article on Advantages of Data Replication Compared to Tape/Virtual Tape Backup for Disaster Recovery
Gravic published the article, Tape Backup for Disaster Recovery? Really? in the September-October issue of The Connection. Tape or virtual tape backup/restore for periodic backups is prudent (after all, it is easy to sometimes purge the ‘wrong’ file). However, when used for disaster recovery, in the always-on, never-stop world we live in, it often doesn’t make sense. Unfortunately, some businesses are using this technique for mission-critical applications. This article discusses why tape backup/restore for business continuity is a risky approach for many businesses, and how they should shed these risks by beginning the move to continuous availability. Data replication is an ideal solution for ensuring business continuity, as it eliminates many risks and costs associated with tape backup/restore, significantly reducing outage times and amounts of lost data in the event of a failure. For additional information, please download our white paper, Choosing a Business Continuity Solution to Match Your Business Availability Requirements.
For more information on Shadowbase data replication solutions, please visit: www.gravic.com/shadowbase. To speak with us about your data replication and data integration needs, please visit us at www.gravic.com/shadowbase, email us at SBProductManagement@gravic.com, or call us at +1.610.647.6250.
HP directly sells and supports Shadowbase Solutions under the name HP Shadowbase. For more information, please contact your local HP account team.
Gravic Shadowbase Presents at MATUG Fall Meeting
Gravic helped organize the Mid-Atlantic Tandem User Group (MATUG) Meeting held on September 17 at the Hewlett-Packard EDS HQ in Herndon, VA USA. Gravic presented on Winning the Battle Against Internet Banking Fraud by Leveraging HP Shadowbase Streams Real-Time Data and Application Integration. Please contact us if you are interested in discussing our presentation’s content or having us present it to you or your colleagues. The successful meeting was comprised of over 50 attendees drawn from local customers, HP NonStop personnel, vendor companies, and consultants. Plans for next year’s meeting were discussed, including possible locations. Please let us know if your company can host next year’s fall meeting in the greater Philadelphia, PA to Washington, DC corridor area. Please Visit Gravic at these Upcoming 2015 Events
Please Visit Gravic at these Sites
comForte at events near you in 2015
Please get in touch if you would like to arrange meetings with our team at any of these events.
Video – Get Started in 5 Minutes! XML or JSON-Enable COBOL or C Programs with Canam Software Labs Inc.
Thunder by Canam Software Labs takes the complexity out of JSON or XML-enabling COBOL and C programs, freeing up developers’ time to focus on a program’s business logic.
Check out this quick tutorial to see just how easy it is to get started with Thunder.
Still curious about the power of Thunder? Download a free 30-day trial of Thunder Lite and experience it for yourself.
________________________________________________________________________
CSL will be at the following upcoming conferences. You are invited to stop by our booth to learn more about Canam Software solutions including Thunder to XML and JSON-enable COBOL and C programs.
CTUG – October 21, 2015 NonStop Technical Boot Camp – November 15-18, 2015 BITUG – December 4, 2015
Availability Digest Asks, Will You Be Ready When the “Big One” Strikes?
Musings on NonStop! September, ‘15
The
opinions expressed here are solely Well, what may have initially
been whispers has grown into a full-blown yell! HP CTO, Martin Fink,
will be attending this year’s NonStop Technical Boot Camp. More of that
in an upcoming post to the NonStop community blog, Real Time View, even
as this publication reaches you. We all should be familiar with Martin’s
history with NonStop so that we appreciate where he is now headed. His
efforts inside HP Labs is leading us closer to The Machine, but it’s not
a straight forward, drop everything, rip it all out and replace kind of
initiative, but rather, one I suspect we will see eased into the
marketplace and so I for one am keen to hear exactly what he says at TBC
and what will then follow in Randy Meyer’s presentation immediately
after Martin’s talk.
www.itug-connection.blogspot.com
N2TUG in Dallas and MATUG in the
suburbs of Washington D.C. were events I drove to in the company command
center and having run up some 8,000 plus miles as I turned into the
driveway, I have used up my time away from the office. From here on it’s
going to be time spent behind the desk, writing and presenting
(webinars) as TBC approaches. With one eye on the weather as winter is
near and with the likelihood of snow arriving, it’s also pretty much the
end of the road trips as far as 2015 is concerned for the company
command center I rely upon so much; it will be a case of back to driving
the company SUV instead of the RV.
What should really please the
NonStop community is that by my back of the envelope calculation, over a
very short time period, as a solutions provider OmniPayments has been
responsible for the sale of some 4 or 5 (maybe even 6) new NonStop X
systems, including the latest entry, the NonStop X NS3 systems. These
numbers also include some additional NonStop X systems deployment
in-house at OmniPayments in support of OmniCloudX on NonStop X, where
OmniPayments product offerings are provided on the basis of a SaaS from
out of a cloud built on top of NonStop X.
Richard Buckle Pyalla Technologies, LLC Following my blogs? My web publications? My discussion Groups?
Check out (or
copy and paste to your
browser): …. And check out the Group on LinkedIn, Real Time View comForte at http://blog.comforte.com/ …. And check out the Group on LinkedIn, comForte Lounge ir.com Payments and Infrastructure at http://www.ir.com/blog-pay/ …. And check out the Group on LinkedIn, realtime.ir WebAction.com at http://webaction.com/blog/
…. And check out the group on
LinkedIn, Data Driven Apps … And check out the Group on LinkedIn, ATM Industry Association buckle-up at http://www.buckle-up-travel.blogspot.com/ …. And check out the SubGroup on LinkedIn, Pyalla Track Days
New
TANDsoft Customer Counts on FileSync and AppendOnly for OSS
Looking for Painless,
Efficient BASE24 Migration? Look No Further Than OmniPayments!
ATTN: MOMI USERS!
If you have not RSVP’d for our MOMI Education Class on November 14th (the day before the Boot Camp), please do so ASAP. Space is limited for this all-day FREE event: Breakfast, Lunch and snacks included. Join us for Customer-driven training as we show the latest release of MOMI, explain characteristics of MOMI, and educate you on recent MOMI features. Since 1999, BlackWood Systems’ MOMI has been the superior Real-Time tool for NonStop monitoring, diagnosing and troubleshooting System operations: User Friendly Budget Friendly Resource Friendly Reliable, Technical Excellence and Strong Customer Support! MOMI runs on all NonStop platforms including the new x86! When Your System Demands Quick Attention...®
Kathy Wood BlackWood Systems, Inc. www.momi.com 602-569-8766
NonStop Technical Boot Camp 2015
Registration is open! www.etouches.com/nonstopTBC2015 2015 NonStop Technical Boot Camp Attendee Registration: $1295
Pre-Conference Seminar Registration: $150
SPECIAL EVENT!
Guest/Spouse Pass for Evening Events and Receptions: $200
Hotel info: Fairmont San Jose 1-800-346-5550
Now available online! (see Travel link) The cutoff date for our special room rate is Friday, October 23, 2015. Please reserve your room before 10/23/15 to secure the special room rate.
Call For Papers for the
2015 NonStop Technical Boot Camp
The Partner SIG looks forward to reuniting with Customers and HP this fall!
Kathy Wood NonStop Partner SIG/Vendor Chair kwood@blackwood-systems.com
Find out more about us at www.tandemworld.net
|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
+44 (0) 20 8304 7979 We would like to thank the sponsors of the September 2015 eNewsletter
Gold Sponsor Silver Sponsor To enquire about Sponsorship opportunities for the Tandemworld Newsletter please click here. Current Subscribers 15067 Our company, Tandemworld, accepts no
liability for the content of this email, or for the consequences of any
actions taken on the basis of the information provided. |