Hi {{ session.user.profile.firstName }}

Review: Storage Predictions from 2008 vs. Storage Technology Changes

Manage webcast
Nigel Wakefield, Storage and SAN Consultant, Sigman North
Join Nigel Wakefield and review storage predictions from 2008 vs. storage technology changes. How accurate can a storage insider predict technology changes. New products released vs. what storage market actually wants.

Review Storage Evolution for the next 5yrs.
Option1 SSD Solid State Memory Arrays – memory costs vs... Benefits
SSD Costs and Environment Benefits
Application Performance and Design
Storage Migration performance
SNAPS and Clones
Option2 Sub Lun Tiering technology FAST2 / Adaptive Optimisation / Smart Pools
Performance Monitoring
Activity Schedules
Application Cycles of IO Activity
Option3 Hybrid Drives are they an option in the Enterprise Arrays Market or Heavy Cache frontend arrays
Hybrid Drives Performance
Array I/O Accelerator Options Fibre Channel Performance on SATA drives

Discuss external influences cost of memory and large fines being imposed on memory company for price fixing or will advance sub lun tiering functionality solve storage performance and capacity issue. Could new technology evolve where hybrid drives or cache frontend heavy arrays become the normal solution. Plus business news around SSD start-up looking to take the big boys on or get purchased. Which SSD start-up will be the new 3PAR.

Profile Nigel Wakefield:
- Nigel Wakefield 25yrs experience in Storage Industry.
- Worked for Intel/Orange/Goldman Sachs
- Familiar with major vendors EMC/HDS/HP/NetApp
- Chairman of EMC User Group UK 5yr period
- Founder of LinkedIn Independent Storage Management Forum
Jun 13 2012
43 mins
Review: Storage Predictions from 2008 vs. Storage Technology Changes
  • Date
  • Rating
  • Views
  • Join cloud security expert Tricia Pattee on August 27 for a quick, cut-to-the-chase analysis on where to get the most bang for your security buck. The interactive, hour-long discussion will include:

    -The five most common security mistakes
    -Top six areas of security spend
    -How to maximize budget – and minimize risk
    -Hidden cloud security costs

    The presentation will include a Q & A to answer your specific questions about security budgeting and cost management.

    Register today.
  • Omnichannel shopping and the Internet of Things are creating device proliferation and expanding the diversity of customer demands. Is your network ready?

    The converging wired and wireless worlds, along with best-in-breed cloud management applications, are offering ultimate network flexibility allowing for greater security, ease-of-management, and cost savings at the Edge.

    Join our webinar to discuss a direction for future-proofing your network platform with speaker and thought leader Ken Silay.

    Attendees will learn:
    •Trends and challenges in today’s network landscape
    •What are the elements of a future-proof network
    •What issues you need to consider to future-proof enterprise networks
    •How WAN Diversity is enabling IT productivity

    Who Should Attend?
    •Network Administrators/Engineers/Architects
    •CIO/CISO
    •IT Directors/Vice Presidents


    About Ken:
    Ken has held technology leadership positions throughout his career across multiple industries including retail, healthcare, consumer goods, medical devices and the United States military. He is as effective designing and implementing a strategy for corporate innovation as he is streamlining business process that yield hundreds of thousands of dollars in business and technology improvements. As problem solver and recognized thought leader, he is skilled at fusing analytic and creative thinking to deliver innovative solutions.

    Ken was selected as a 2015 Top Innovator by Retail Touch Points and Chairperson for the 2015 RIS News Technology Conference. Combining his technical education with solid people and business management experience he has forged effective partnerships to deliver large-scale projects and technical process improvements. He believes in leadership by example and is a trusted mentor. Ken is a change agent who would rather be the catalyst for change than the victim of it.
  • Cloud applications are fueling the data sprawl issues plaguing today’s businesses. With the rapid adoption of popular cloud applications and other cloud services, organizations must change the way data is managed, protected, and governed.

    The dispersion of data to laptops and mobile devices made up the first wave of data moving outside the data center. IT must now address a second: end user data going into the cloud. So how do organizations address their enterprise data availability and governance needs in this new world? With a new approach that follows the user and not their device.

    With Henry Baltazar, Sr. Research Analyst at Forrester Research, you will learn about:

    - The risks and data challenges posed by the adoption of popular cloud applications
    - Strategies to ensure data archiving, search and audit and eDiscovery for cloud application data
    - Opportunities to manage and control dispersed data, whether residing on laptops, mobile devices or in the cloud in a single, unified view
  • Cloud applications are fueling the data sprawl issues plaguing today’s businesses. With the rapid adoption of popular cloud applications and other cloud services, organizations must change the way data is managed, protected, and governed.

    The dispersion of data to laptops and mobile devices made up the first wave of data moving outside the data center. IT must now address a second: end user data going into the cloud. So how do organizations address their enterprise data availability and governance needs in this new world? With a new approach that follows the user and not their device.

    With Henry Baltazar, Sr. Research Analyst at Forrester Research, you will learn about:

    - The risks and data challenges posed by the adoption of popular cloud applications
    - Strategies to ensure data archiving, search and audit and eDiscovery for cloud application data
    - Opportunities to manage and control dispersed data, whether residing on laptops, mobile devices or in the cloud in a single, unified view
  • Security Researcher, Cameron Camp, discusses seven ways in which malware threatens your virtual systems and the increasingly mission critical data and services that those systems handle. Given a thriving black market in stolen information, and the wide availability of the tools with which to acquire it, no virtual attack vector is likely to be neglected by the bad guys, from compromised executables in virtual server images to virtual networking connections between mobile end points. Drawing on the latest malware research, Camp looks at how malicious code is adapting, and may be adapted, to penetrate virtual systems.
  • Get inspired by real world cloud migration success stories. Tom Flanagan, Vice President of Technology, Alain Pinel Realtors and Steve Novoselac, Director of Digital Technology, Trek Bicycle Corporation, share their first-hand experiences of moving to the cloud, along with insights and pointers for your own successful transition.
  • Container technologies are capturing the industry headlines right now, but they are seen mainly as a solution for Linux test-dev environments. In reality, container technology can pay big dividends for MS-SQL. Join Storage Switzerland’s George Crump and DH2i’s Carl Berglund for this interactive webinar as we explain how containers work in MS-SQL environments and detail the 3 reasons you should consider containers for your MS-SQL environment:

    1. Make any SQL Server instance mobile to any infrastructure
    2. Facilitate modernization of infrastructure, OS, &/or application version
    3. Get near-zero downtime with simple, flexible management
  • In the landscape of vulnerability management, you know that effective prioritization of vulnerabilities is the difference between "playing the numbers game" and truly being an InfoSec rock star. But too often, our primary resource--the CVSS--is relied on too heavily, with disastrous consequences.

    Michael Roytman, Chief Data Scientist at Kenna, will explain what IT security professionals miss by placing too much trust in CVSS when it comes to prioritization efforts. He will also explain what information should absolutely be taken into consideration in order to focus on vulnerabilities posing the greatest risk. Topics covered include:

    - Why CVSS sometimes gets it wrong
    - Specific examples of serious exploits being given low scores
    - What IT security professionals should do to supplement CVSS
    - How the proper use of threat intelligence can accelerate your vuln management program
  • Availability is one of the core principles in the security CIA triad and one which business leaders tend to grasp more so than other technical risks associated with security. Customers want and expect access to their finances anytime and from anywhere. How is the financial industry grappling with distributed denial of service (DDoS)? What is the financial impact to an institution under DDoS attack? Are financial services firms witnessing an increase in DDoS attacks and duration? If so, what countermeasures are in place to ensure availability does not suffer?

    Lastly, what is the financial services industry relying on as sources of intelligence?

    Join us to hear answers to these questions and more as IANS Research and Arbor Networks present poll results from financial services’ security executive management surveyed.
  • Most outages are accidental; by adopting an intelligent power chain, you can help mitigate them and reduce your mean-time to repair. Join Anixter and DatacenterDynamics for a webinar on the five best practices and measurement techniques to help you obtain the performance data you need to optimize your power chain.

    Register today!

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Review: Storage Predictions from 2008 vs. Storage Technology Changes
  • Live at: Jun 13 2012 10:00 am
  • Presented by: Nigel Wakefield, Storage and SAN Consultant, Sigman North
  • From:
Your email has been sent.
or close
You must be logged in to email this