HP’s Information Supply Chain - Optimizing Information, Data and Storage for Business Value


The need for organizations and business enterprises to gain control of their burgeoning data volumes is now a strategice imperative. And it's not just the amount of stored data, increasing at an average CAGR of 50% that needs to be managed. Muliple data sources including databases, image repositories, mobile devies and the web are now being converged and leveraged as new sources of information for business value.

IT administrators have traditionally considered the tiering of data, data protection, and archiving as independent processes - narrowly focused and specific to a particular application or storage objective. The reality is that these topics are all related. Buying more primary storage will eventually force the need for more backup storage capacity. The need to add capacity to accommodate application growth will eventually increase the amount of data that needs to be retained for compliance and risk managment.

These three processes - tiering, data protection, and archiving - are part of a bigger picture. They all relate to managing data in an enterprise data center environment and effectivley utilizing storage systems. To not understand their interrelationships in that bigger picture can lead to sub-optimal operations and complexity that is difficult to make more efficient as time goes on.

Economics and the need to meet specific requirements drive enterprise-level data management. The requirements fit into two categories:

  • Operation requirements that reflect both evolving and ongoing business needs.
  • Information governance requirements that respond to internal and external business controls or regulatory requirements.

Mobile Printing The Next Stage in Road-Warrior Productivity

Executive Summary

Smartphones and tablet computers are ubiquitous in business today. Virtually every executive and individual contributor uses one or more of these devices to access email and websites while away from their desk. However, printing is not something that can be done easily from most smartphones or tablets. Even when there is a tool to help people print from a mobile device, it is generally limited in what it offers, or it requires an external server or PC to complete the printing task.

The Samsung MobilePrint app gives business professionals the ability to print and scan directly to and from any Samsung printer on a local-area network with a secure WiFi access point using their Android, Windows Mobile or Apple iOS smartphones or tablets (without the need for an external server or PC). This allows busy professionals to review, sign and share printed documents while working away from their desks.


The two biggest trends in business IT today are consumerization and mobilization. You can see both in action in virtually every conference room around the world: busy professionals responding to email on their smartphones or using tablets to take notes and multitask. With 470 million smartphones (according to IDC) and 55 million tablets (Morgan Stanley) sold in 2011, virtually every business IT group has to deal with these devices at some level. Often these devices — especially tablets — are consumer devices being adapted for use in business settings. As such, many are not set up to run business applications, offer business capabilities or help business professionals truly maximize their productivity. 

HP StoreOnce Catalyst and Symantec Backup Exec OpenStorage


In today’s business environment, customers rely on the most efficient, high performing, and reliable backup systems to protect critical business information. Customers need to protect increasing levels of data while keeping costs under control. HP StoreOnce Backup systems provide a disk-based data protection platform while addressing data growth by applying HP StoreOnce deduplication software for efficient, longer term data retention.

HP StoreOnce Catalyst software was developed to dramatically improve the performance, function, and integration with backup applications such as Symantec Backup Exec. StoreOnce Catalyst delivers deduplication where it has most value—be on an appliance server, media server, or dedicated appliance. Since it uses the same deduplication algorithm globally, data can be moved between Catalyst Stores on different platforms using bandwidth optimized transfers. StoreOnce Catalyst allows better utilization of advanced, disk-based storage solutions while increasing efficiency and performance.

This document describes the benefits of using HP StoreOnce Backup systems combined with HP StoreOnce Catalyst software and Symantec Backup Exec to back up important enterprise data. This document also recommends backup and recovery implementations.

The following are key recommendations for backing up data to an HP StoreOnce Backup system utilizing HP StoreOnce Catalyst software:

  • To improve backup storage utilization: backup one server at a time (sequentially) for quickly rising deduplication ratios that are maintained over time.
  • To reduce the end-to-end data size: if the backup process can accommodate it, use a unique StoreOnce Catalyst store for each data type or same type of operating system.
  • For the trade-off between backup impact and ease of recovery: configure a weekly full with daily incremental or initial full with daily incremental backup schedule to reduce the amount of end-to-end data and decrease the time required to run daily backups. StoreOnce Backup systems data deduplication will be utilized for full and incremental backups.
  • For efficient and cost effective movement of backup data offsite: use the StoreOnce Catalyst remote copy feature to seamlessly replicate all servers to an appliance in a remote facility for simpler recovery in the event of a disaster.
  • To increase backup speed without affecting deduplication ratios: use a larger Backup Exec backup block size for faster backup throughput performance with little or no effect on StoreOnce data deduplication ratios.

FlexiCapture 8.0 Enables Business to Run at the Speed of Data

Executive summary

In today’s digital world, modern business depends largely upon the quality and timeliness with which it can respond to a daily multitude of public inquiries, consumer demands, and requests from distributors. Once these paper documents are converted to digital data, the data can be merged into the same workflow as other electronic media – such as EDI, email and Web-based data – and then processed under a common set of business rules for recordkeeping and government compliance. The point is that paper business documents, in order to add value to corporate operations or to be of any use at all, must be converted into computer-usable data suitable for input into electronic business processes – the sooner, the better – because, in order to survive, business must run at the speed of data.

Until recently, traditional methods of capturing content from semi-structured forms required many hours, days, or months of customization – creation of multiple form templates for each form layout, form redesign, and technology adaptation – or alternatively, manual input by a key operator. Finally, there is a better way to extract data from imaged documents: FlexiCapture™ 8.0 Professional by ABBYY®, a data capture software solution that intelligently extracts data from structured forms, semi-structured forms, unstructured documents or any combination of document types, for accurate input into the databases that support today’s business processes.

ABBYY FlexiCapture 8.0 Professional is an easy-to-deploy, cost-effective and powerful desktop solution designed to meet organizational and departmental document processing needs in a variety of vertical industries that include banking, insurance, utilities, education, healthcare, accounting, law, and transportation.  

Implementing HP EVA/P6000 Cluster Extension for Windows in a VMware Virtual Machine


This white paper is divided into four main sections:

  • Requirements: Covers the required components for implementing HP EVA/P6000 Cluster Extension within a VMware Virtual Machine. Example configurations are outlined, including a Majority Node Set with File Share Witness.
  • Implementation Overview: Provides high-level instructions for implementing the solution. Subsections in this section correlate to subsections in the Implementation Detailed Instructions section. This structure provides significant details that can be quickly referenced if steps in the overview are unclear.
  • Implementation Detailed Instructions: Provides detailed step-by-step instructions for implementing the solution. It includes an example of implementing the solution based on a two-node cluster using Majority Node Set with File Share Witness.
  • Implementation Considerations: Provides several topics to consider when planning the environment. Additionally, it demonstrates potential hardware reduction when implementing Cluster Extension within a VMware virtual machine.

Managed Print and Document Services for Controlling Today's - - and Tomorrow's - - Information Costs

Unmanaged Information Explosion: Costs and Impact

By 2020 IDC predicts the amount of digital information will grow by a factor of 30, the number of files, by a factor of 60, but the number of IT professionals in the world will only grow by a factor of 1.4. Driving this information explosion is the Web, social media, and mobile device usage (smartphones, tablet PCs, netbooks, etc), which enable the creation and dissemination of content. Meanwhile, average file sizes get smaller due to the growth of embedded systems in everything from smart grid to logistics item tracking, as the number of things to manage grows twice as fast as the total number of available gigabytes. While CIOs, IT executives, and line-of-business managers ponder the ramifications of these trends, they can’t forget the more immediate and worrisome challenges currently heaped on their plates.

Creating, finding, organizing, and analyzing information is crucial to maintaining the health and well being of business. Making good business decisions and gaining a better understanding of customers and business conditions requires monitoring, analyzing, and disseminating information from a large array of internal and external sources including employees, media, customers, shareholders, and social media such as blogs, wikis, etc. Accordingly, worker communication has expanded beyond email to incorporate collaborative and social networks such as instant messaging, Twitter, Facebook, etc., further depleting concentrated productivity time each day. 

The inadequacies of the tasks associated with these activities are consuming increasing amounts of employees’ time each day and negatively impacting the bottom line. IDC surveys find that the time spent searching for information averages 8.8 hours per week, at a cost of $14,209 per knowledge worker per year. Analyzing information consumed an additional 8.1 hours, costing organizations $13,078 annually. Furthermore, an organization employing 1,000 knowledge workers loses nearly $6 million annually in time wasted when employees reformat information as they move between applications.

HP Printers Supported in Citrix XenApp Server Environments


Citrix® has collaborated with HP to test select HP printers and their associated HP print drivers in Citrix environments up to and including Citrix XenApp™ 6.5 with Microsoft® Windows® Server 2008 R2 Edition.

These tests were run to determine how HP printers and their associated printer drivers performed using the standard printer and printer-related features tests that Citrix uses to test its XenApp server and client software. This document lists all of the printers tested by HP in Citrix environments, explains the printer tests performed by Citrix, identifies which HP printers and printer driver versions were used, and describes any issues that occurred when these tests were performed. 

Citrix has also collaborated with HP to test scanning functions on select HP All-in-One (AIO) devices and their associated HP TWAIN drivers in a XenApp environment. These tests were run to determine how HP AIO devices and their associated TWAIN drivers performed with the scan-related feature tests that Citrix uses to test its XenApp server and client software. This document explains the scan tests performed by Citrix, identifies which HP AIO devices and TWAIN driver versions were used, and describes any issues that occurred while these tests were being performed. 

What’s new

  • The tables of HP supported printers and drivers have been updated.
  • HP Universal Print Driver (UPD) 5.5 is listed as Citrix Ready.

DocuWare White Paper Security

1 Objectives of This White Paper

The purpose of this white paper is to present the security measures within the DocuWare software. The paper includes a discussion of the measures undertaken to achieve access security and to prevent downtimes – or at least to minimize their adverse effects on users. It includes all preventive measures against accidental or deliberate manipulation of managed content and against data loss caused by system failure. Security features also include measures to ensure data protection and the traceability of events within the system. 

It mentions the underlying technologies and describes how they are used by the DocuWare system. This should provide readers with a technically sound understanding of the DocuWare system and the security it offers. 

This document is intended for clients (users), consultancy companies, IT magazines and distribution partners. It assumes a certain level of technical knowledge about the structure of modern software applications, ideally of document management systems. Detailed knowledge of current or previous DocuWare systems is not required. 

2 Introduction 

The larger and more complex file cabinets become, the more extensive their security requirements. DocuWare provides comprehensive features relating to

  • authorization and access security and
  • protection against failure

An important element of the DocuWare system is Authentication Server, which not only ensures correct authentication, but also provides functions which protect against failure. To avoid the unauthorized use of DocuWare functions, the DocuWare servers contain the following security features: 

  • A state-of-the-art authentication system 
  • A comprehensive authorization concept
  • Optional encryption
  • Powerful electronic signature features
  • Comprehensive logging options
  • Secure communication protocols

DocuWare White Paper Integration

1 Introduction

1.1 Objective and Layout of the Paper
This White Paper is aimed at technically literate readers and explains all of the different ways in which the DocuWare system can be integrated with other system worlds: the underlying technologies and the way they are used by the DocuWare system.