SAP Computing In-Memory

SAP has announced its release schedule of a new generation of in-memory applications that help customers achieve their business operating in real time. On the basis of these initiatives is the SAP In-Memory Computing technology, and these launches the company plans to offer a new reality for enterprise software consists of three key dimensions: generation analytics, development of new applications and the renovation of existing ones, and simplifying IT scenarios customers.

New applications driven by SAP In-Memory Computing will allow professionals to simulate outcomes, plan faster and view business problems in a more integrated way. Thus, business plans can be developed in real time, based on dynamic transactional data. SAP applications will be released during the third and fourth quarters of this year, and fall into the areas of sales and operations planning, intelligent payment systems or intelligent analytical measurement. They also emphasize the SAP Trade Promotion Management, applications to ensure that the process of trade promotion and making forecasts based on solid historical facts; and SAP Cash and Liquidity Management, which predicts incoming and outgoing flows of cash and conduct important activities such as collections, risk management and short-term loans.

VMware View new version

VMware brings to market its solution for desktop virtualization View 5, which provides several benefits over the previous version. Specifically, this update of the application provides remote access via View Security Server for PCoIP, enabling a simple and secure connection with the user authentication for desktop, thanks to the elimination of SSL VPN requirements.

VMware View thus offers more options when you log in from end to end with PCoIP protocol. The result is an array of integrated, efficient and with lower costs providing simple authentication for remote users desktop. With version 4.6 of the solution, VMware combines ICT control and freedom for the user in terms of mobility. In this way, companies can improve safety, reduce operating costs and simplify desktop administration and management by establishing a modern architecture for the end user.

Consequences of not having a backup strategy

Any organization that does not back up your information is exposed to serious problems that will be safe, at one time or another. Loss of data, it is extremely easy (an interruption of electrical current that causes equipment failure, a faulty hard drive or simply a human error).

However, recover lost data when something like this happens, it is almost mission impossible if not done properly the necessary backups. We analyze then the risks that companies lack a clear strategy for achieving their backups are exposed.

Today, there should be no company without a clear strategy to make the necessary backups to protect your information and that, should any incident occur, that information could recover quickly and easily. An organization that lacks strategies of this kind is like the Titanic going in full swing towards a sea of ​​icebergs. A team that allows this to happen should be fired immediately when not directly arrested for negligence.
It is true that all this may seem exaggerated, but only for a moment imagine that one day, we arrived at our job and discovered that all company data – including our e-mail, Word and Excel documents, pdfs, bases data, contact lists, financial data, billing information, etc., that is all – simply has vanished in space forever. This means that everything that makes the company what it is, and that has allowed it to operate and grow, simply gone.

How a company can recover from something like that? Without backups, it is very difficult to recover years of work and trying to manage at the same time, the day to day business. For most organizations, regardless of size, whether large, small or medium, a disaster of this magnitude, it is unbearable. In fact, 90% of companies suffering losses of large-scale data, go out of business in less than two years.
Permanent loss of information, on the other hand, it is easy to prevent disaster, all the company needs is to apply an appropriate strategy for backup and recovery of data, if necessary.

However, the irony of all this is that most businesses recognize the importance of backups. In fact, a recent study conducted in the US small and medium enterprises by Rubicon Consulting, showed that the backup is the second major concern of these organizations on their information systems, after the defense against viruses and other malware, and ahead of issues such as reducing the costs or the purchase of new computers. Still, more than a third of the surveyed SMEs does nothing to secure their data.
At the same time, and while struggling with an almost exaggerated growth of data involved, many of the backup process launched in SMEs often create a false sense of security, threatening the future information and The company in general.

Beware data loss
According to the study by Rubicon Consulting, although 92% of SMEs surveyed had deployed some form of technology to run backups, 50% of them had still suffered the loss of data. Of the companies that had experienced such losses, about a third of them experienced a decrease in sales, 20% lost customers and 25% said the loss of information had been a really serious for the normal running of the company disorder.
So when something happens, we can ask the question, are we talking about a case of incompetence or of a case of criminal negligence? Although once again, the question seems exaggerated, the fact is that when a company closes its doors because fails to provide a quality service to its customers, or bill or conduct normal business processes because their information has disappeared , difference does it really matter?

Do the right thing
How to get an effective backup strategy? The first is to determine what information is necessary to ensure, including data affected by national and international regulations (such as Sarbanes-Oxley, HIPAA, etc.) that include specific requirements regarding backups. The following is whether the data should be copied or archived. In most cases both tasks are performed. Backups are actually copies of active data, for use during a limited period of time and usually are overwritten with the updated versions. Files, on the other hand, contain static data, and inactive files, e-mails old, etc.
Any business that cares about the safety of your data, you need to have an effective backup strategy to deal with the inevitable loss of information. Considering the serious and lasting impact that could cause data loss in business, may cause to its bankruptcy, it is increasingly essential availability of a policy for copying and retrieval of information to really effectively and safe.

HP launches new network infrastructure solutions

During the celebration of the greatest entertainment event, Hewlett Packard has introduced a complete range of solutions within its integrated network architecture FlexNetwork, aiming to compete directly with Cisco in this market segment. In fact, Antonio Onis, commercial director of HP Networking, believes that “in the world of networking has been a weariness about the tyranny of Cisco, and now there is an alternative,” he says.

Simplified infrastructure
The proposed HP is a comprehensive simplification of the network architecture, both equipment and management. From the standpoint of the first presented the FlexCampus range. Within it highlights the HP A10500 switch line, which provides optimal support for multimedia services such as high definition video; a latency of three microseconds; and it supports up to 128 10GbE ports without oversubscription. For larger environments, you may group two switches A 10500 using HP Intelligent Resilient Framework (IRF) HP to provide a super core with 208 ports of 10GbE technology without oversubscription. According Onis in this market segment are very strong with a share of around 20%; while its main competitor, Cisco, has dropped from 80 to 50%, according to the manager says. “Having all homemade, unlike buying technologies and then paste them leads us to believe that we are on the right track,” he says.
In the access layer of FlexCampus, highlights new line cards for the HP E5400 and E8200 switches; as well as wireless access points, E-MSM460 and E-MSM466, with capacity to support up to 15 simultaneous streams of HD video per access point.

As for the management of the network infrastructure within the HP FlexNetwork architecture, it stands the proposal FlexManagement HP network management that combines physical and virtual level from a single panel called Inteligent Management Center IMC), and a new system optimized for virtual environments cloud intrusion prevention networks increases security in data centers. To Onis, here lies another important difference from its competitor: “While Cisco can require up to 30 different tools to manage data center networks, campus and offices, HP provides a single pane of management with the Intelligent Management Center for the modular blocks of the HP FlexNetwork architecture, “he says. Moreover, direct said: “What we are proposing to market is a cleaner solution than is Cisco. We proved with innovation. There are teams of five years trying to keep them alive. ” The new version of HP IMC 5 manages the entire HP Networking portfolio, as well as more than 2,600 network devices from over 35 suppliers.

On the other hand, and in order to focus on the safety of workloads virtualized applications of data centers, the company has also launched the new HP TippingPoint S6100N IPS device, which provides a unique scalable security framework automatically increases protection for virtualized environments, from the time that virtual machines are created or are transported to a different physical server.

The example of the Campus
To show the simplicity in installation and operation of these network architecture solutions, HP has managed internal communications of the Campus Party. “This is ten times faster than last year, with WiFi wireless network using the IPv6 protocol and network,” explains Onis. The deployment has been done in less time, with one team in each building, but acting as one, “avoiding the complexity of networks from the point of view of loops that can be created,” adds the executive. In total, in five days, the company has installed two cores and network switches 180 to 6,500 “buffs” although the network was prepared to support up to 9,000 users.

Panda Cloud Office Protection

Panda Security has announced the release of version 6 of its cloud-based Panda Cloud Office Protection, available in http://cloudprotection.pandasecurity.com solution. This new edition, which offers companies anti-malware and firewall protection, now includes integration with remote control tools as LogMeln, RealVNC, TeamViewer, TightVNC and UltraVNC. So, you can access a computer from the Web console with a single click for troubleshooting purposes or to install security software, among others.

Chat with Panda Cloud Office Protection is not necessary to have an antivirus server in the company, because the infrastructure is 100% hosted in the cloud. Installation is done remotely, either through a distribution tool or by sending an email to the PC where you want to install. Teams can be configured through Group Policy, and has unified all detections for malware and network threats reports.