• Differences to the conventional HTTP / TLS / TCP web stack
• Early performance numbers • Potential side effects of a broader deployment of QUIC
- Channel
- Channel profile
- NVMe and NVMe-oF Configuration and Manageability with Swordfish and Redfish (May) [[ card.jobTitle ] (6:
(pm) UTC[[ userProfileTemplateHelper.getLocation(card) ] (mins)Rajalaxmi Angadi, Intel; Phil Cayton, Intel; Richelle Ahlvers, BroadcomSNIA Swordfish is an extension of the DMTF Redfish specification to provide a unified approach for the management of storage and services in converged, hyperconverged, hyperscale, and cloud infrastructure environments. Swordfish uses a client-centric approach to develop the dynamic resource models as part of the specification, which describes client needs, management requirements, and use cases.NVMe-oF currently support fabric transports like RDMA (iWarp, RoCE, IB), TCP, and FC. NVMe / NVMe-oF is currently lacks efficient remote configuration and provisioning management mechanisms to enable NVMe-oF scaling to large converged infrastructures – something Redfish and Swordfish can provide.The SNIA Swordfish specification is currently growing to include full NVMe and NVMe-oF enablement and alignment across DMTF, NVMe, and SNIA for NVMe and NVMe-oF use cases. SNIA members are contributing to specification development and helping to shape the ecosystem. This presentation will provide an overview of the work in progress to map these standards together to ensure NVMe and NVMe-oF environments can be represented entirely in Swordfish and Redfish environments.Join us! We welcome your feedback, and encourage participation.Storage Networking Security Series: Protecting Data at Rest (Apr)
(5:) pm UTC
[[ userProfileTemplateHelper.getLocation(card) ] (mins)Pierre Mouallem, Lenovo; Ahmad Atamhl, Mellanox; Steve Vanderlinden, LenovoOne of the most important aspects of security is how to protect the data that is just “sitting there.” How easy is it to get to? Who can get to it? If someone does get access to the data, can they read it? These are just a few of the questions that we try to answer when we go through the process of securing data.Contrary to popular belief, however, securing “data at rest” is not simply encrypting the data. While it is true that data encryption plays a major role in securing “data at rest,” there are several other factors that come into play and are equally as important – if not more so.
For this webcast, we’re going to talk about those other factors (Encryption is deserving of its own, specific webcast). We will present the end-to-end process to securing “data at rest,” and discuss all the factors and trade-offs that must be considered, and some of the general risks that need to be mitigated, discussing: [[ userProfileTemplateHelper.getLocation(card) ] • How requirements for “data at rest” differ from “data in flight” • Understanding the costs of ransomware• How to protect cryptographic keys from malicious actors• Using key managers to properly manage cryptographic keys
• Strengths and weaknesses of relying on government security recommendations
• The importance of validating data backups … how stable is your media? [[ card.jobTitle ]Storage Wars: Object vs. File vs. Block (Apr) (5:) PM UTC[[ userProfileTemplateHelper.getLocation(card) ] (mins)Panel of expertsResearch firm IDC projects that by the end of , the world will generate (zettabytes) (trillion gigabytes) of data per year. Data storage, therefore, is no longer simple, and in the age of cloud maturity and Digital Transformation, storage infrastructure strategies are shifting. With object stores having a very different set of characteristics than file and block storage, it can be confusing to know which is the right strategy that will keep up with an expanding digital universe.Even small businesses struggle to manage the ever-growing pile of files stored on various networks and systems, so the challenges for enterprise companies can be hard to wrap your head around.Join this panel of object, file and block storage experts as they discuss: [[ card.companyName ] – The best way to manage unstructured data – Are there deceptive costs in a file storage strategy?– Use cases for object storageSpeakers:Moderator, TBDTom Christensen, CTO & Customer Advocacy – Northern EMEA, Hitachi Vantara Anne Blanchard, Sr. Director of Product Marketing, NasuniCloudian TBDSo You Wanna Program Persistent Memory? Meet the PM Programming Contest Winner! (Apr) 3600 (6:PM UTC[[ userProfileTemplateHelper.getLocation(card) ] (mins)Jim Fister, Director, SNIA Persistent Memory Software Enabling
SNIA’s Persistent Memory Hackathon Program enters its second year with developers up to speed on the latest in programming persistent memory – and SNIA’s NVDIMM Programming Challenge just announced its first winner of distinction. Join our webcast to learn the latest developments in PM, new resources available to learn more about programming to PM, and a dive into the winning application introduced at the recent Persistent Memory Summit.[[ userProfileTemplateHelper.getLocation(card) ]QUIC – Will it Replace TCP / IP?Recorded:- Apr 2 (mins)
Lars Eggert, NetApp; Tim Lustig, MellanoxQUIC is a new UDP-based transport protocol for the Internet, and specifically, the web. Originally designed and deployed by Google, it already makes up % of Google’s egress traffic, which corresponds to about 7% of all Internet traffic. The strong interest by many other large Internet players in the ongoing IETF standardization of QUIC is likely to lead to an even greater deployment in the near future. This webcast will highlight:• Unique design aspects of QUIC• Differences to the conventional HTTP / TLS / TCP web stack
• Early performance numbers • Potential side effects of a broader deployment of QUIC
The Impact of Artificial Intelligence on Storage and ITRecorded:- (Apr 1)
68 mins
Glyn Bowden, HPE; James Myers, Intel; Alex McDonald, NetAppArtificial intelligence (AI) and machine learning (ML) have been having quite the impact on most industries in the last couple of years, but what about our own IT industry? In this webcast find out how the rise of machine learning has created a new type of demand on IT operations teams as well as how those same teams can utilize new insights and capabilities driven by machine learning. We will explore:
• The demand on infrastructure • Storage and data pipelines • The growing field of IT operations leveraging AI (aka AIOps)[[ userProfileTemplateHelper.getLocation(card) ] Ethernet-attached SSDs — Brilliant Idea or Storage Silliness?Recorded:- (Mar)
[[ session.user.profile.jobTitle ] minsMark Carlson, Kioxia; Rob Davis, Mellanox; John Kim, Mellanox; Ted Vojnovich, LenovoSeveral SSD and networking vendors have recentl¬y demonstrated ways to connect SSDs directly to an Ethernet network. They propose that deploying Ethernet SSDs will be more scalable, easier to manage, more performant, and / or lower cost than traditional storage networking solutions that use a storage controller (or hyperconverged node) between the SSDs and the network.Who would want to attach SSDs directly to the network? Are these vendors brilliant or simply trying to solve a problem that doesn’t exist? What are the different solutions that could benefit from Ethernet SSDs? Which protocols would one use to access them? And how do Ethernet SSDs relate to computational storage? Join this SNIA Networking Storage Forum webcast to learn all this and more as SNIA experts discuss:• What are the appropriate use cases for Ethernet SSDs?
• Why Ethernet SSDs could be appealing and more efficient • How Ethernet SSDs compare to other forms of storage networking
• Different ways Ethernet SSDs can be accessed, such as JBOF / NBOF, NVMe-oF, and Key Value • How do Ethernet-attached SSDs enable composable infrastructures?()- Object Storage: What, How and Why
- Feb 1706 mins
Chris Evans, Architecting IT; Rick Vanover, Veeam; Alex McDonald, NetApp; John Kim, MellanoxThere are many types of storage technologies, both in how they are interconnected, consumed and designed. Object storage is no different in that it brings its own set of unique characteristics to the market. In this webinar, storage experts Rick Vanover and Chris Evans will explain:
• What object storage is and what it does
• How to use object storage • Essential characteristics of typical consumption • Why object storage is important to the future of storage and computing technologies
After you watch the webcast, check out the Q&A blog at https://bit.ly/2xa (fH)
Cloud Standards: What They Are, Why You Should CareRecorded:- Feb (mins
Eric Hibbard, ISO Editor; Alex McDonald, NetAppSince the initial publication of the National Institute of Standards and Technology (NIST) definition of cloud computing in 3283, international standards development organizations (SDOs) have sought to refine and expand the cloud computing landscape. This webinar will:• Identify key published and draft cloud standards) • Discuss their interdependencies• Highlight their importance
• Identify potential future work.In addition, related technologies such as virtualization, federation, and fog / edge computing will be addressed. Lastly, the relevance of the standards will be explored to help organizations understand ways these documents can be exploited.
Recorded: - Apr 2 (mins)
GIPHY App Key not set. Please check settings