German
Welcome
NonStop HotSpot
Conference overview
Schedule at a glance
Information vendors
Information hotel
Registration
Detailed agenda
Agenda IT-Security workshop
Sponsors and Exhibitors
Floorplan Vendors
Presentations
Gallery
Location
Contact us
Legal notice
To download the slides of the presentation, please click the name or title
NonStop presentations
Breidbach, Wolfgang - Bank-Verlag GmbH
NonStop monitoring and automation
Copeland, Karen - Hewlett-Packard
The platform for continuous business
Copeland, Karen - Hewlett-Packard
NonStop Software Update and Roadmap
Depping, Jürgen - commitWork GmbH
300 at one blow! Modernizing a NonStop application at
Elmer Dienstleistungs GmbH & Co. KG
Hadler, Peter - Hewlett-Packard
NonStop into the Cloud (?)
Holenstein, Paul - Gravic Inc.
How One Bank Used a Disaster to Jump-Start its Move into a NonStop Based Active/Active Architecture
Jongma, Frans - Hewlett-Packard
NonStop SQL & Beyond
Kallfass, Tobias - Hewlett-Packard
NonStop as part of a modern state of the art IT Infrastructure
Nitzschke, Dr. Heinz-Michael - Daimler AG
Daimler 2020 - Challenges to HP NonStop Server Infrastructure
Nolte, Chris - BankservAfrica
TANGO - migration project
Pollans, Mark - Hewlett-Packard
NonStop Hardware Roadmap
Pringle, Neil - Hewlett-Packard
Throughout EMEA
Rakoczy, Bob - Bank of Amerika
NonStop Base24 and a Cloud Burst
Smevig, Thore - Helse Midt Norge IT
Implementing User Read- and Write-LOGS in existing Pathway Applications - (without changing the application code)
Non NonStop presentations
Beckers, Jürgen - RAe BDH Darmstadt
IT Projekte erfolgreich managen
Beckers, Jürgen - RAe BDH Darmstadt
Wie wichtig sind Haftungsklauseln in IT-Verträgen?
Brunner, Christian
- Finanz Informatik Technologie Service
Community-Cloud Umgebung für Banken und Versicherungen
Ellerkamp, Lukas & Breulmann, Christian
- Westfälische Wilhelm-Universität Münster
Applikations- & Desktop-Virtualisierung mit Citrix XenApp und -XenDesktop
Habel, Oliver - tecLEGAL Habel Rechtsanwälte
Cloud Computing - die zentralen Anforderungen des Datenschutzes
Jorczik, Thomas - CC Computersysteme und Kommunikationstechnik GmbH
Applikationsschutz für Linux VMs in vSphere 4/5
Rohde, Reiner - DIVENTUS GmbH
Fehlertolerante Windows Server in virtuellen Umgebungen
Wendt, Ralf
- Hewlett-Packard
Storageperformance in virtualisierten Umgebungen
IT-Security Workshop
Breidbach, Wolfgang - Bank-Verlag GmbH
How to control IP connections
Leeb, Thomas - CSP Security.com
IT Security to achieve Compliance - or vice versa ?
Weber, Carl - greenHouse
How to break into a Tandem System
Vendor presentations
Archibald, Ian - Attunity, Inc.
Data movement for Bl. Drag. Drop. Done.
Buckle, Richard - Pyalla Technologies
uLinga: (cloud-enabled) Connectivity to IBM
Burg, Thomas - comForte 21
Where in the World is my Credit Card Data ?
Holenstein, Paul - Gravic Inc.
Shadowbase Data Replication and Data Integration Solutions
Forbes, Barry - XYPRO Technology Corporation
Mission Critical Security for your Mission Critical Applications
Leeb, Thomas & Grainger, Peter -
CSP Security.com
Prevention and Detection
A Risk Based Approach to implementing Security
Lapinskas, Vlada - BPC Europe
SmartVista - Modern payment solution on NonStop
Lussier, Fernand - ETI-NET
Why using Deduplicated-storage
Pettifer, Rick - Merlon Software Corporation
The Complete Database Solution for HP NonStop