The unexpected nature of natural disasters and other disruptive events means that preparation is key to managing disaster recovery and business continuity planning. Join the business continuity and disaster recovery community for live and recorded presentations discussing best practices for business continuity planning, disaster recovery programs and business continuity management. Learn from BCDR experts to develop your critical infrastructure and gain insight into tactical solutions to your BCDR issues.
This week on White Space, we look back at the news from DCD Converged conference in London. We’ve also brought back a special guest - Cole Crawford, CEO of Vapor IO and purveyor of unusual rack arrangements.
We discuss various ways to reuse server heat and discover that Coca Cola is apparently using Internet of Things to develop new flavors of the sugary drink.
Peter looks at the reasons behind the Telecity outage in the UK - but this outage has nothing on the recent data center fire in Azerbaijan, that left almost the entire country without access to the Internet.
Also mentioned are the news about CA Technologies getting out of the DCIM business, the reinvention of liquid cooling company Iceotope and the fact that the US government has just discovered another 2000 data centers it didn’t know it had.
As advanced threats rapidly increase in complexity, technology must evolve to find smarter ways of detecting and blocking attack techniques across IT control points.
Symantec has developed 3 innovative technologies with Advanced Threat Protection that will change the game - helping customers detect, prioritise and respond to threats within minutes – from a single console, with a single click.
Join this webinar to understand how Symantec technology can improve your advanced threat protection.
IT organizations today are under constant pressure to deliver better services more quickly and with lower cost. Traditional approaches are being rapidly replaced with enabling technologies such as virtualization, software-defined architectures, and cloud computing, introducing more complexity while the relentless growth of data pushes the limits of scalability. As IT undergoes this transformation, backup and recovery services must transform with it, and together can enable a greater transformation for your business.
Join our upcoming webcast to:
•Identify three ways NetBackup 7.7 reduces the complexity of enterprise data protection
•Understand three ways NetBackup 7.7 helps you scale with growth
•Realize three ways in which NetBackup 7.7 can make your organization more agile
•Learn about the latest capabilities added in the 7.7.1 release.
Find out how you can improve enterprise backup and recovery and ultimately move faster and take bigger risks trusting that your information is safe.
Hear about 5 key storage advancements in this webinar. You'll learn:
--How to enable greater infrastructure agility
--How to cut storage-related costs by 60% or more
--How customers benefit from recent storage innovations
Modern enterprise archiving is no longer about the long-term storage of data you’re required to keep and serves limited utility to the business. New cloud architectures are transforming what once was simply a means to protect corporate data to a more valuable information resource that helps address corporate compliance and litigation support needs.
Join analysts from Blue Hill Research for this live event and learn how progressive organizations are gaining greater value from their archive of user data, converging data availability, archiving and governance to increasingly meet their wider corporate needs. During this webinar, the panel will review real life use cases and discuss:
• The risks of decentralized and dispersed enterprise data
• How unifying data availability and governance is bringing increased utility to organizations
• Key considerations for designing a modern enterprise archive strategy
Registrants will receive a complimentary copy of the full Blue Hill Research white paper on the subject.
David Houlihan researches enterprise risk management, compliance and policy management, and legal technology. He is an experienced advisor in legal and technology fields with a unique understanding of complex information environments and business legal needs. As an attorney, he has held roles in the United States Attorney’s Office and more.
For more: http://bluehillresearch.com/author/david-houlihan/
James Haight focuses on analytics and emerging enterprise technologies, including exploring the business case development and solution assessment for data warehousing, data integration, advanced analytics and business intelligence applications.
For more: http://bluehillresearch.com/author/james-haight/
Come join us as we learn how to tackle and manage big data application performance. First, Taneja Group Sr. Analyst Mike Matchett will present his take on how enterprise IT is now being challenged to support big data applications in real production environments. He'll discuss why too many enterprises haven't been as successful as they should in taking advantage of their big data opportunities - in many cases losing out to competitors. He'll explore what agile IT/devops really needs to do to not only effectively host, but deliver top-notch, consistent big data performance with the smallest infrastructure cost.
Then Sean Suchter, co-founder and CEO at Pepperdata will present their compelling approach to solving big data cluster performance challenges. He'll demonstrate how Pepperdata's dynamic run-time optimizations can guarantee consistent performance SLA's in a shared multi-tenant Hadoop cluster. Because Pepperdata delivers detailed visibility into Hadoop cluster activity , the software becomes invaluable for cluster troubleshooting, reporting/chargeback, capacity planning, and other management and optimization requirements. With Pepperdata, IT can now effectively, efficiently, and reliably support all the business-empowering big data applications of an organization. This webcast will be 45 minutes with time reserved for Q+A.
Server Virtualisation has rapidly become an integral part of the IT landscape for most organisations, with upsides for both the business and the IT department. But, what’s next when it comes to managing your data?
One likely destination is the Software-Defined Data Centre (SDDC). Whilst the definition of the SDDC varies, and analysts debate how close to reality they really are, the consistent theme is the need for a high degree of virtualisation and process automation, driven by software, to deliver infrastructure as a service, in order to deliver benefit to the business.
A software-defined data centre (SDDC) is a data storage facility in which all elements of the infrastructure -- networking, storage, CPU and security – are virtualized and delivered as a service. Deployment, provisioning, configuration and operation of the entire infrastructure is abstracted from hardware and implemented through software.
Understanding the ramifications of the emergence of the SDDC, as well as the benefits, is central to gaining buy-in across an organisation. Join Commvault on the first of a series of webinars: “The Top 5 Principles of Backup Service Optimisation in a Software-Defined Data Centre”. Hosted by experts in the field of information and data management, you’ll increase your knowledge through valuable insights to aid in your transformational planning.
Backup is not the most fashionable of functions within the datacentre but it is one that every organisation faces. Nevertheless many firms, particularly at the mid and larger end of the scale, find it challenging to sustain high performance, service quality and control costs.
The emergence of cloud infrastructure offerings such as AWS, Microsoft Azure and Private cloud has only increased the appeal of abandoning the traditional labour-intensive, multi-vendor approach in favour of a service-led utility model.
This raises the question – are you better off continuing with an in-house solution under your control or deploying a cloud service?
The webinar will explore 5 challenges that need to be addressed by Enterprise customers looking to take advantage of the opportunity Cloud presents.
You will learn about:
* The impact on restore
* Handling bandwidth constraints
* Delivering to Service levels in the cloud
* Assessing security and compliance commitments
* The true costs and the impact of change
Hyperscale clouds get all of the press, but is it really a case of “go big or go home”? The giant cloud providers offer great prices on bulk storage but the cloud can act as much more than just a backup destination. There’s a lot of value residing within the individual cloud offerings of the data protection vendors, with an entire spectrum of services ranging from standard backup storage to Managed Archiving to Disaster Recovery as a Service. And more.
Join us on this panel discussion to learn about what’s available and how to take full advantage of the range of cloud services offered so that you can precisely match vendors’ offerings to your business needs.
Arun Taneja, Founder & Consulting Analyst; Taneja Group (Moderator)
Christophe Bertrand, Vice President of Product Marketing; Arcserve
Austin McChord, CEO & Founder; Datto
Abhijit Dinkar, CTO, Dell Data Protection; Dell
Mark Campbell, CTO; Unitrends
Enterprise IT and security experts are under increasing pressure to respond to complex network changes to keep up with growing business demands. Lack of network visibility hinders the ability to deliver services and applications with the security, speed and accuracy required for today’s heterogeneous IT environments. Add to this, the demand to mitigate cyber threats by reducing attack surface and improving overall security posture.
Together, Tufin Orchestration Suite™ with Fortinet® Firewalls and FortiManager Network Security Management enable IT security teams to manage complex heterogeneous networks through a single pane of glass.
In this session, experts from Fortinet and Tufin will show how security and network teams can achieve:
•Visibility for the security posture and control of complex networks—from on-premise networks across hybrid cloud environments
•Optimization of firewall policies
•Continuous regulatory compliance and auditability with industry standards
•Automated change design and verification
File storage is an ever growing costly, complex problem. Files sprawl is out of control forcing organizations to build storage environments with file servers or NAS, backup servers and media, disaster recovery sites, WAN optimization, replication, remote storage, and mobile solutions. Adding insult to injury, these solutions run out of capacity and need expensive upgrades and painful migrations.
Cloud NAS does away with all of this by providing local NAS controllers which cache active files from a cloud based file system. This maintains the same user experience and performance, adds collaboration and mobile access, while securely eliminating separate backup, DR and remote data access solutions. Learn how cloud enables file storage with unlimited scale that saves company’s 40-60% of their storage costs and eliminates refreshes and migrations forever.
There are various new ways to perform data protection using the Cloud and many advantages of using the Cloud this way. However, IT managers need to carefully study all the alternative approaches and the experiences of others (good and bad) to avoid the pitfalls, especially during the transition from strictly local resources to cloud resources. In this live Webcast we will discuss:
•Critical cloud data protection challenges
•How to use the cloud for data protection
•Pros and cons of various cloud data protection strategies
•Experiences of others (good and bad) to avoid common pitfalls
•Cloud standards in use – and why you need them
The short presentation will be followed by a panel discussion with audience participation.
In an ideal world, Security Information and Event Management (SIEM) acts as a central repository for security events, ingesting logs from disparate systems, identifying and correlating information, and utilizing threat intelligence against the resulting data set to identify problems.
But those capabilities come at a setup cost. The promise is there, but SIEM implementation projects can elicit a groan from security managers at the same time.
Join Daniel Kennedy, Research Director for 451 Research Voice of the Enterprise: Information Security, for a 45-minute webinar and Q&A summarizing key findings from more than 900 customer responses gathered during 451 Research's Q3 Voice of the Enterprise: Information Security survey.
This Webinar will reveal:
• The top concerns of information security managers
• Where budgets are heading
• The characteristics and inhibitors of Security Information and Event Management (SIEM) in the enterprise, and
• How customers position vendors in the competitive landscape as shown by 451 Research's proprietary Vendor Window.
Come armed with your own questions - there will be time for Q&A at the end of the session.
This joint presentation from Commvault and Nutanix will show how you can make the most of your current cloud infrastructure by streamlining VM management and protection processes, and introduce you to the next generation Hyper Converged infrastructure.
The session will cover how Commvault software can help to cut the cost of protecting your large scale VM estate or Cloud, while at the same time providing you with better RTO/RPO for your critical applications. Commvault works seamlessly with your existing systems and those from Nutanix, helping you to smoothly transition to a simpler, more scalable hyper converged model. Our partners at Nutanix will explain their mission to make datacenter infrastructure invisible, elevating IT to focus on applications and services.
The topics that will be covered are:
Protection at scale: leverage your existing infrastructure to make it simpler
Effective ways to improve the RPO/RTO of applications in your cloud
The evolution of your datacenter and simplifying your infrastructure
Hyper convergence with web-scale Foundation
A first look at Nutanix Acropolis & Prism
Join us both and gain real world, practical strategies to deploy advanced datacenter solutions in you environment.
Enterprise IT organizations continuously need to prove their value. Operational excellence is at the core. Attending this webinar allows you to get first hand insights into a unique closed-loop process for a highly effective and fast incident response. If you are an IT Admin, on-call engineer, IT Manager, Business Continuity Manager or need to stay up-to-date on everything that is going on - this is the perfect session for you.
With Ian Moyse,
- 2015 Sales Director Of Year
- Board member Eurocloud and the Cloud Industry Forum,
- TalkinCloud Top200 Cloud Expert
- SMBNation Top150 Channel Influencer
- Onalytica's #1 Top 100 Cloud Influencers
Join Microsoft Chief Strategist James Staten and HOSTING VP of Product Sean Bruton for this eye-opening exploration into – and discussion about – the successful union of Azure with managed services to optimize your cloud (and business) performance.
This week on White Space, we have data centers that float, data centers inside pyramids and data centers with ridiculously low PUE.
Peter reports on his trip to Dublin for Host in Ireland conference: there’s news about subsea cables and a change of rhetoric from Ireland’s data protection commissioner.
Bill details (hopefully) the last chapter in the saga of a Paris data center owned by Interxion.
We also look at Amazon’s data protection gambit in Germany – the company simply handed over the running of AWS facilities to a subsidiary of Deutsche Telekom, in order to earn the trust of local customers.
The episode concludes with some music box fun, courtesy of 4D Data Centres.
VM replication technologies like SRM or Zerto aren’t always the best way to replicate and protect all workloads. For example, most databases have native replication that’s more context-sensitive than hypervisor-based block-level replication. Join me, Darrell Hyde, HOSTING CTO, on November 12, 2015 for DR in the Cloud: Finding the Right Tool for the Job – an interactive webinar where I’ll discuss:
•Common use cases
•Different approaches to DR
•Pros and cons of each approach
Bring your questions for a live Q&A at the end of the webinar! I’ll see you there!
In a landscape filled with new threats and new regulations, risk management has never been more critical to senior leaders across all sectors. The growth of data is increasing exponentially, organizations are suffering from volatility across all risk types, and need to re-think their enterprise risk strategy. At the heart of this strategy is the need for a single consistent view of the data, and a data-centric, multi-platform approach to secure valuable customer and corporate data assets, end-to-end.
Join our experts as they discuss a new generation of risk technologies which use a holistic approach to data management and address the risks inherent when data is at rest in storage, in motion on the network, and in use in analytics and business processes.
Penetration testing is just one element in the overall process of obtaining confidence in the cyber security of the organisation. Consideration to security must be given in the architectural design of networks and the coding of applications and website. Where this is not the case penetration testing will provide an indication of what should be done to retrospectively apply security or to provide a ‘patch’ to make things better.
Many investigations of cyber attacks have highlighted that the system has been compromised for some time, often years, without the system owner knowing. The penetration test provides an insight into the internal controls and the ability of the SOC or NOC to identify attacks. If the test is conducted and there is no indication that it has been detected, it is highly likely that real attacks have not been detected either and further analysis is required.
It must be recognised that no security is impenetrable and therefore the ability to react to a cyber security incident is really important. The penetration testing is essential to test the organisation’s ability to respond. The statement that a penetration test will be quickly out of date is valid to some extent but without it the organisation is blind to the types of threats it is exposed to and the vulnerabilities in the systems. To be effective the testing programme must be placed in context and the links between assurance activities fully understood.
With each passing year, the frequency and number of organisations that are hacked increases at a dizzying rate. No industry vertical can ignore this trend. One of the key challenges facing all business is to come to grips rapidly with an ever-changing threat landscape.
How can your organisation understand specifically what threats is being targeted with? In order to answer this question business need to be able to quantify and qualify the threats aligned against them. In essence being able to understand what malicious actor’s know about an organisation and how that knowledge may be deployed in attack campaigns and vectors.
During the course of the webinar session, Blueliv’s Cyber Security Development Manager, Nahim Fazal will present the Blueliv proposal for improving the cyber threat visibility of a business.
- Why the same approach gives the same results
- Actionable intelligence – what does this look like in the real world?
- Reducing your cost and incident response time
Every operator knows that, to provide the service levels today’s customers expect, they need to improve reliability and availability while reducing Total Cost of Ownership (TCO).
The only question is: How?
Could a power infrastructure and system architecture that maximizes asset utilization, optimizes energy efficiency and simultaneously achieves best-in-class reliability, be the answer?
Join Paul Smith of GE Energy Management as he explores the pros and cons of different power architectures, considers some alternative energy sources and reveals how to:
• Improve both server up-time AND customer service
• Recapture valuable floor space and reduce capital replacement costs
• Slash OPEX and save $millions in TCO with as little as 1% gain in power efficiency.
End users are increasingly shifting their IT services to managed service providers and the scope of both technology and services offered by MSPs is constantly evolving. Join ESET and LabTech Software, the industry-leading IT automation software, as we explore these changes and what it means for businesses.
The threat landscape is evolving quickly, and you have to keep up. Many organisations are still in a reactive mode, addressing vulnerabilities and threats by relying on information freely available on the web - by which time the damage has already been done. On the other hand, IT security professionals with too much information available become uncertain of how to incorporate the threat intelligence into their security programme, and end up relying on protection from the perimeter.
In this session, we’ll discuss how organisations can incorporate threat intelligence into their security programmes and focus on the threats most relevant to your environment to reduce the risk or impact from an incident.
• What threat intelligence is, and is not.
• Best practices to consume threat intelligence.
• How to put intelligence into context and make it actionable.
• Incorporating intelligence into the lifecycle of your security programmes.
(This webinar is sponsored and brought to you by Symantec)
Business Continuity has become too complicated and plans are not being used when needed. Too many acronyms, complex Standards and long projects mean BC loses credibility. Tim will present on how to make your plan work in a page, how to implement solutions in the shortest possible time and how to bring BC alive and effective in your organisation.
TCP stacks for FPGAs are costly today; both in monetary terms and in the amount of resources they consume on the FPGA itself. In this webinar, David Riddoch will present Solarflare's patented ANTS technology and AOE network adapters which enable extremely low latency, while scaling to large numbers of concurrent TCP connections and consuming a fraction of the resources.
Insurance is the equitable transfer of the risk of a loss, from one entity to another in exchange for payment. It is a form of risk management primarily used to hedge against the risk of a contingent, uncertain loss. An insurer, or insurance carrier, is a company selling the insurance; the insured, or policyholder, is the person or entity buying the insurance policy. The amount of money to be charged for a certain amount of insurance coverage is called the premium. Risk management, the practice of appraising and controlling risk, has evolved as a discrete field of study and practice.
The technology of the future is not that far away! Join James Hanlon, CTO Security Strategist at Symantec, while he takes an insightful journey through the current and future advancements in technology and provides a vision of what the technological integrated world of 2100 will look like. In line with these advancements, cyber security will also have to evolve and will become more, not less significant. How can you start building a more resilient organisation today?
Join long-time industry insider Robert Amatruda as he outlines the reasons you should consider switching from Veritas backup solutions to Dell’s comprehensive portfolio of data protection solutions. During this webcast you will learn more about the dynamic changes to production and cloud environment and why these advances can leave you unprepared for both written and unwritten expectations for your recovery.
Attention Cassandra and DataStax users! Are you worried about data corruption or data loss in your DataStax or Cassandra environment? Do you need enterprise-grade recovery capabilities for your next-generation and core applications? Here's an exciting opportunity to learn about the Datos IO Versioning Platform, which is reinventing recovery for the world of scale-out databases.
Find out how database admins and DevOps can use the Datos IO industry-first capabilities to manage and recover data in Cassandra clusters.
Sign up today for the free webinar ‘Aaron Morton Presents Scalable Recovery for Cassandra' on 'Timing'
In this webinar, Aaron Morton, a world-renowned Apache Cassandra committer, will share some leading use cases where Cassandra is being deployed today. Plus, he’ll discuss the need for enterprise-grade recovery solutions.
Rob Whitcher, Director of Sales Engineering at Datos IO, will give an overview of the Datos IO Versioning Platform, describe its industry-first features, and give a live demonstration.
Take your Cassandra environment to the next level. Sign up today for the ‘Aaron Morton Presents Scalable Recovery for Cassandra’ webinar.
Learn how you can uncover, prioritize, and remediate today’s most advanced persistent threats across your endpoints, networks, and email – fast! Combine local intelligence with everything Symantec sees globally, so that you can pinpoint and remediate the most critical threats to your organization – all without deploying any new agents.
Join our webcast on December 8, 2015, and you will learn how Symantec's Advanced Threat Protection solution is the first solution that can:
- Uncover a full range of threats - from persistent threats to zero-day
attacks-across your endpoints, network, and email
- Prioritize what matters most by correlating local intelligence with everything Symantec sees through its massive global telemetry
- Remediate threats quickly from a single console, all without deploying new endpoint agents
-Leverage existing agents, which means there is no need to deploy agents on top of Symantec Endpoint Protection or Symantec Email Security.cloud
Looking forward to seeing you at the upcoming webinar December 8th
So you’ve purchased a DDoS protection solution. You’ve installed it according to the vendor’s recommendations. Sigh of relief…you’re feeling more secure already. But there’s a nagging thought in the back of your mind …“How do I REALLY know if my DDoS protection solution will stop a complex DDoS attack?”
The answer is certainly NOT "wait and see." The best practice is to simulate the attack vectors of a real DDoS attack as accurately as you possibly can, to put your technology and process to the test - before a real attack occurs.
Join Arbor Networks, the leader in DDoS attack protection products and services and Security Compass, a leading DDoS attack simulation and security consulting company – to see how you can use DDoS attack simulation to test the various layers of your DDoS protection solution.
This webcast will cover:
- A variety of DDoS attack types simulated to show you how they impact a network
- What patterns and information you should expect from a mitigation device in action
- How to convert your learnings into actionable guidance for your DDoS attack response plan
Learn important lessons gleaned from real-life engagements, detailing the tools and techniques advanced attackers use to compromise victim networks, and strategies the CrowdStrike Services team has devised to combat and even prevent these attacks from occurring.
You will learn:
- New tactics attackers are using to gain and maintain access to victim networks
- How quickly adversaries attempt to re-infect an organization
- Remediation tactics and tools you can use to remove attackers from your network
- Proactive steps you can take to improve your success in detecting, preventing and responding to targeted attacks
While virtualizing infrastructure is a method to help manage sprawl, it is not a solution by itself. Learn how and why a truly heterogeneous, software-defined storage approach is the key to reducing complexity, maximizing efficiency and lowering costs. It’s time for IT staff to stop reacting and gain back the freedom and flexibility to drive business.
User provisioning is one of those tasks that many administrators detest. Not only does it take a significant amount of time to setup a new user, but it also takes time to assign all the permissions a user needs, especially when multiple applications need to be configured as well. Once that’s all setup, then you have to email out confirmations, deal with exceptions, and hope that you’ve crossed every t and dotted all of your i’s.
In this webinar, you will learn:
*How to avoid the common pitfalls of user provisioning.
*How to optimize your user provisioning process.
*How to work with error and exception handling.
*How to automate common tasks and reduce number of emails sent.
At the BCI World Conference in November, the Business Continuity Institute, supported by Zurich Insurance Group, launched their annual Supply Chain Resilience Report. This webinar is a presentation of some if the key findings of the report. This includes that nearly one in ten organizations are not aware of who their key suppliers are, leaving them open to severe disruption as they are unable to manage their supply chain effectively.
Everyone knows humidity control minimises the risk of electronic static discharge (ESD) – but traditional techniques have proved expensive, both in their energy impact and additional power requirements. Join the debate in this free 60-minute webinar, sponsored by leading control solutions provider Carel and supported with customer case studies, to learn how:
•New adiabatic technologies let you control humidity while reducing energy consumption.
•Correctly matching your humidifier needs to the new guidelines helps avoid costly over-specification.
•A fully-optimised calculation and installation minimises the demand for humidification, while simultaneously maximising cooling.
•Existing operators are replacing legacy humidifiers with more effective techniques, to capitalise on potential energy savings
Enterprises adopting virtualization will find themselves managing thousands of network security changes per week.
Handling these changes effectively and securely requires visibility and control across virtual and physical infrastructure.
A security policy orchestration solution can address the security and agility challenges with a single console that monitors and manages security policies across hybrid IT.
In this session we will discuss real life examples of the challenges in network virtualization and how they can be addressed through orchestration.
On average, the 58 United States companies participating in the 2015 Cost of Cyber Crime study lost $15 million due to cyber crime, an increase of 19 percent from $12.7 million in last year's study. And other countries are close behind. These are results from the recently completed Ponemon Institute 2015 Cost of Cyber Crime study. You know the risks, but you need the data to plan your defenses and demonstrate the cost of inaction.
For a fuller look at these and other findings from the institute’s study, join Dr. Larry Ponemon, chairman and founder of the Ponemon Institute, to learn:
-What cyber crimes are most common and most costly
-The hidden internal and external costs you incur
-What security defenses are most effective in reducing losses
-How businesses with a strong security posture drive down costs
In 2014 around 40 percent of data breaches were the result of external intrusions, while the remainder were caused by a lack of internal controls/employee actions, lost or stolen devices/documents, and social engineering/fraud. The good news is that the vast majority of security breaches can be prevented by implementing and enforcing basic security best practices with proven technologies.
Join this educational panel webinar to hear experts discuss how to establish a data protection plan and educate employees to maintain PCI compliance, and enforce basic security best practices and leverage technology solutions to prevent data breaches in 2016.
Discover a day in the life of your network security and what it may face on a daily basis. Find out how to anticipate and prevent emerging security threats and see how to better secure your organization, keeping it safe from external and internal threats.
Take a walk through the current threat landscape with a practicing security engineer. Then watch live demonstrations from a SonicWALL system engineer of how to leverage Dell solutions to counter these intrusions.
You’ll learn more about:
• Understanding the threat landscape and need for security
• Easy methods of extending security awareness to internal and external customers
• Combating threats with Dell Software solutions
The bottleneck in flash storage is often the interface. SAS/SATA interfaces were designed specifically for hard disk drives not for flash media. For example, flash storage can support many more simultaneous I/O operations. The resolution to the problem is to use a different interface, one that is higher throughput and is more directly accessible from the CPU. Leveraging one of these interfaces and extracting optimal performance from the flash media means leaving the confines of the SCSI protocol with customized proprietary drivers. The result is complexity and slow innovation.
Join Storage Switzerland and OCZ, a Toshiba Group Company, for a live webinar “How NVMe Will Change Flash Storage”. In this webinar we will answer these questions:
- What is NVMe?
- Why is NVMe Flash superior to SAS/SATA SSDs?
- Is NVMe Flash superior to proprietary PCIe flash drives?
- How to get started with NVMe?
Join Catherine Roy, Sr. Manager of the HOSTING Project Management Organization and Brian Frank, HOSTING Cloud Services Manager, for a discussion on best practices in declaring a disaster and implementing your disaster recovery solution. Having implemented over 300+ disaster recovery solutions, the team will draw upon real-world experience and give valuable, practical advice for handling your DR solutions in all cloud environments -- large, small, simple and complex. The following topics will be covered:
•Prepping for Disaster
•Disaster Recovery Testing
•What happens when you declare a Disaster
El atender a este seminario le dará las habilidades necesarias para demostrar la relevancia y peso que tiene el coste de la energía en los data centers como elemento clave para la gestión eficaz en los DCs así como para el negocio en la actualidad.
Asi como evidenciar mediante diversos casos prácticos:
• La aplicación de las mejores prácticas en eficiencia energética.
• Los efectos positivos en áreas de negocio relacionadas con:
1. La competitividad
2. La eficiencia en la capacidad de enfriamiento y el uso de espacios TI
3. La imagen
4. Costes de operación