Storage Clouds: Limitations, Challenges and Enablers
The explosion of personal and organisational digital data, in particular fixed content, is one of the most important trends of the
decade. Generated data is growing faster than the ability of humanity to store it. In parallel with the explosion of digital data, our society has become critically dependent on services to extract valuable information from the data and drive decision making by individuals, businesses and government, across all aspects of life. In this talk we will give a short introduction to storage cloud systems, an emerging technology to deal with this explosion of data. We will continue with a description of the VISION Cloud project, whose goal is to develop a powerful infrastructure for the reliable and effective delivery of data-intensive storage services, while facilitating the convergence of IT, media and telecommunications. We will present the main concepts and innovations at the foundation of the VISION Cloud architecture, and demonstrate it through examples taken from the domains of telecommunications, media, healthcare and enterprise software.
Hillel Kolodner is a Senior Technical Staff Member in the Systems Technologies department at the IBM Haifa Research Lab. Hillel holds a Ph.D. and M.S. in Computer Science from the Massachusetts Institute of Technology, and a B.A. in Mathematics and a B.S.E. in Computer Science from the University of Pennsylvania. Currently, he is the principal investigator for VISION Cloud, an European Commission FP7 Integrated Project on storage clouds, where IBM leads a consortium of 14 partners from Industry and Academia across Europe.
RecordedJun 13 201248 mins
Your place is confirmed, we'll send you email reminders
J Metz, Cisco, Alex McDonald, NetApp, John Kim, Mellanox, Chad Hintz, Cisco
Welcome to this first part of the webcast series, where we’re going to take an irreverent, yet still informative look, at the parts of a storage solution in Data Center architectures. We’re going to star with the very basics – The Naming of the Parts. We’ll break down the entire storage picture and identify the places where most of the confusion falls. Join us in this first webcast – Part Chartreuse – where we’ll learn:
•What an initiator is
•What a target is
•What a storage controller is
•What a RAID is, and what a RAID controller is
•What a Volume Manager is
•What a Storage Stack is
With these fundamental parts, we’ll be able to place them into a context so that you can understand how all these pieces fit together to form a Data Center storage environment.
Oh, and why are the parts named after colors, instead of numbered? Because there is no order to these webcasts. Each is a standalone seminar on understanding some of the elements of storage systems that can help you learn about technology without admitting that you were faking it the whole time! If you are looking for a starting point – the absolute beginning place – start with this one. We’ll be using these terms in all the other presentations.
Load balancers occupy an important position (in the path of application traffic) on the enterprise network. Yet, traditional application delivery controllers (ADCs) are unable to provide meaningful application insights to drive business decisions. Avi Networks’ software-defined architecture for load balancing separates the control plane (management layer) from the data plane (load balancers) to generate continuous insights about applications.
In this 30 minute presentation from Avi Networks, learn how you can get rich analytics and actionable insights into end user experience, application performance, resource utilization, security, and anomalous behavior. See how you can benefit from:
• A “Network DVR” to record and replay traffic events to pinpoint app issues
• At-a-glance view of all virtual services throughout the system
• Real-time visibility into DDoS attacks, SSL versions and ciphers used in transactions
• Health scores that give you immediate feedback on application performance
Colin Whittaker, Informed Risk Decisions; Yo Delmar, MetricStream; Chris McClean, Forrester
Cybersecurity has jumped to the top of companies’ risk agenda after a number of high profile data breaches, and other hacks. In an increasingly digitized world, where data resides in the cloud, on mobiles and Internet of Things enabling multitude of connected devices, the threat vectors are multiplying, threatening the firms’ operations and future financial stability.
Organizations with the ability to view cybersecurity breaches as a risk, with associated probabilities and impacts, can strike the right balance between resilience and protection. By bringing together leadership and capabilities across fraud, IT, cybersecurity and operational risk, organizations can connect the dots and manage their GRC program more effectively. Organizations need to employ a proactive approach to review their existing risk management processes, roles and responsibilities with respect to cybersecurity to re-align them into an overall ERM strategy with boardroom backing.
Attend this panel webinar, as we discuss these issues and address ways to develop an evolving GRC program to cope with the growing threat landscape.
Different workloads demand different attributes from their storage. These differences lead some to believe flash storage is only good for certain point use cases like accelerating databases. But the performance of flash systems lead others to claim a single flash system can support all workloads. The truth, as usual, is somewhere in the middle. Join Storage Switzerland and IBM for this live interactive webinar where we bust another flash myth and help you select the right flash for the right workload for the right reasons.
Ethernet technology had been a proven standard for over 30 years and there are many networked storage solutions based on Ethernet. While storage devices are evolving rapidly with new standards and specifications, Ethernet is moving towards higher speeds as well: 10Gbps, 25Gbps, 50Gbps and 100Gbps….making it time to re-introduce Ethernet Networked Storage.
This live Webcast will start by providing a solid foundation on Ethernet networked storage and move to the latest advancements, challenges, use cases and benefits. You’ll hear:
•The evolution of storage devices - spinning media to NVM
•New standards: NVMe and NVMe over Fabric
•A retrospect of traditional networked storage including SAN and NAS
•How new storage devices and new standards would impact Ethernet networked storage
•Ethernet based software-defined storage and the hyper-converged model
•A look ahead at new Ethernet technologies optimized for networked storage in the future
Register today for this live Webcast where our experts will be on hand to answer your questions.
Cloud storage has transformed the storage industry, however interoperability challenges that were overlooked during the initial stages of growth are now emerging as front and center issues. Join this Webcast to learn the major challenges that businesses leveraging services from multiple cloud providers or moving from one cloud provider to another face.
The SNIA Cloud Data Management Interface standard (CDMI) addresses these challenges by offering data interoperability between clouds. SNIA and Tata Consultancy Services (TCS) have partnered to create a SNIA CDMI Conformance Test Program to help cloud storage providers achieve CDMI conformance.
As interoperability becomes critical, end user companies should include the CDMI standard in their RFPs and demand conformance to CDMI from vendors.
Join us on July 19th to learn:
•Critical challenges that the cloud storage industry is facing
•Issues in a multi-cloud provider environment
•Addressing cloud storage interoperability challenges
•How the CDMI standard works
•Benefits of CDMI conformance testing
•Benefits for end user companies
Steve Woo, Co-founder and VP of Products, VeloCloud
Most enterprises deploy both private MPLS and public broadband Internet to some or all of their branch offices. The right SD-WAN solution will dramatically improve the utilization, performance and ease of management of the these hybrid deployments.
Join this webinar for a detailed understanding of the architectural details of Cloud-Delivered SD-WAN for hybrid WAN deployments. You’ll leave with a clear understanding of how hybrid deployments can be designed, implemented and maintained for a secure, optimal and high quality wide area network.
MuleSoft expert and Principal Solution Architect Brett Roeder provides an overview of the broad set of capabilities available out of the box with Anypoint Platform that will enable business agility and create better experiences for your customers. These capabilities uniquely enable reuse, self-service, composability, governance and security. Infused throughout Brett’s demo are best practices for designing, building,and managing both APIs and integrations to deliver projects 3x faster.
Sarvesh Jagannivas, VP Product & Industry Marketing, MuleSoft
Chief architects and CIOs know that API-led connectivity drives business and IT agility. MuleSoft surveyed tech leaders among its customers and discovered not only the value of IT agility, but dramatic, measurable business outcomes for organizations that adopted our approach to integration. This webinar will provide a practical approach to understanding the value of API-led connectivity within your company.
Ian Bromehead, HPE, Harald Burose, HPE, Luke Bradley Vodofone
83% of recently surveyed companies agree that end-to-end visibility is critical to operating a hybrid cloud.
94% state that a single integrated solution is needed to monitor Hybrid IT environments.
But how do you monitor private and public cloud services? How do you make sure you're delivering appropriately? What if you're paying far too much for services you consume? Does monitoring providers give access to any use? With the new HPE Operations Bridge Suite, we'll show you how you can address these issues, and with the help of our customer Vodofone Group, you'll learn what benefits you can extract through adopting it
Mike Wood, VP of Marketing, VeloCloud & Ron Longo, Head of WW Operations, VeloCloud
Since the dawn of time nearly every being has striven for independence. IT professional tirelessly work to get to the same goal of creating solutions which result in greater independence from how technology was used in the past.
Join this webinar to learn how Cloud-Delivered SD-WAN delivers independence from underlying transport, freedom to host applications anywhere, liberty for how services are delivered and choices on how far you extend your wide area network. You'll leave with a better understanding of how to gain your independence from the boundaries of the legacy networks of the past decade.
Hyper-converged systems offer a great deal of promise and yet come with a set of limitations. While they allow enterprises to re-integrate system components into a single enclosure and reduce the physical complexity, floor space and cost of supporting a workload in the data center, they also often will not support existing storage in local SANs or offered by cloud service providers. There are solutions available to address these challenges and allow hyper-converged systems to realize their promise. During this session you will learn:
• What are hyper-converged systems?
• What challenges do they pose?
• What should the ideal solution to those challenges look like?
• About a solution that helps integrate hyper-converged systems with existing SANs
Alex Li, Product Manager, Ahyoung An, Product Marketing Manager, and Damian Sima, Lead Software Engineer, MuleSoft
How are you validating the behavior of your Mule app before you send it to QA? Did you know that there is a testing framework that automates the testing of Mule apps? Join this webinar to learn what you may not know about testing your Mule applications within Anypoint Studio.
Learn how to use MUnit to:
- Test API implementations
- Do other types of unit and integrated testing
- Automatically generate coverage reports
- Integrate testing into your continuous integration process
Derek Granath, VP of Product Marketing, Silver Peak
This new and disruptive technology has taken the industry by storm - delivering the promise of accelerated WAN performance, extended visibility and control as well as a massive cost savings of up to 90%. IDC reports that the SD-WAN market will reach $6 billion by 2020 and independent studies such as the one conducted by Silver Peak and IDG show that 92% of enterprise organizations surveyed will implement an SD-WAN in the next 12 months.
Are you ready to jump on board? Confused about how to take the first steps?
Join us for an overview of this emerging technology that can not only reinvent your network, but significantly impact your business.
Ben Wilson, Senior Director, Product Management, Fortinet
During the past 15 years, access layer solutions have evolved, especially in terms wireless connectivity.
Today's wireless connectivity has multiple approaches, each better meeting the specific requirements of organisations through a choice of different architectures. Whether its a refresh, redeployment, change of application or a brand new site, there are a lot of options.
During this webinar we’ll examine different approaches and how to apply them to different verticals or deployment scenarios. As wireless connectivity continues to evolve, we will also look to the future and see how trends in new hardware can provide cutting edge solutions to meet the potential needs of tomorrow's organisations.
The presentation will end with an overview of Fortinet's Secure Access Architecture and how it can meet today's and tomorrow's wireless requirements.
Sam Fineberg, Distinguished Technologist, HPE, Ben Swartzlander, OpenStack Architect, NetApp, Thomas Rivera, SNIA DPCO Chair
This Webcast will focus on the data protection capabilities of the OpenStack Mitaka release, which includes multiple resiliency features. Join Dr. Sam Fineberg, Distinguished Technologist (HPE), and Ben Swartzlander, Project Team Lead OpenStack Manila (NetApp), as they discuss:
- Storage-related features of Mitaka
- Data protection capabilities – Snapshots and Backup
- Manila share replication
- Live migration
- Rolling upgrades
- HA replication
Our experts will be on hand to answer your questions.
This Webcast is co-sponsored by two groups within the Storage Networking Industry Association (SNIA): the Cloud Storage Initiative (CSI), and the Data Protection & Capacity Optimization Committee (DPCO).
IT Teams are being overwhelmed by the increasing complexity of the networks they’re required to manage. Not only do they have too much to do, they paradoxically also have too many tools with which to try to do it! Yet there are a number of clear similarities found amongst the IT teams that are most productive and most effective. Ipswitch and Enterprise Management Associates both surveyed IT teams worldwide to find out how the best IT teams were able to cope.
The webinar will present our findings and answer key questions such as:
•What are the emerging challenges facing IT professionals?
•How are these challenges impacting their business and their end-users?
•How do the most productive IT teams address increasingly complex networks?
•Why are additional management tools and outsourced management counterproductive?
Data shows that increasing network complexity doesn’t have to degrade the effectiveness of IT teams or the businesses they support. Join this webinar to find out how the high-performing IT professionals manage this – and learn what not to do as well!
This session will be presented by Shamus McGillicuddy, Senior Network Management Analyst for Enterprise Management Associates as well as Mark Towler, Senior Product Marketing Manager for Ipswitch.
Dr. Jim Metzler, Co-Founder & Principal Analyst at Ashton, Metzler & Associates; Todd Krautkremer, SVP, Cradlepoint
In less than a decade, virtualization and cloud technologies have transformed enterprise computing from top (applications) to bottom (storage).
During this time, computing has evolved from a tiered and operationally isolated architecture of front-end, application, database and storage servers — each tier having its own teams, processes, tools, and manual functions — to a tightly integrated, fully automated “stack” that’s orchestrated with a common set of people and tools.
Because of this unification and automation of the computing stack, enterprises can now instantly deploy workloads across private and public clouds with ease. While this evolution has been occurring on the computing side of IT, networks have remained largely unchanged. Software-Defined Networking (SDN) and Network Function Virtualization (NFV) technologies are about to change that.
Join Cradlepoint and analyst Dr. Jim Metzler in a discussion about SDN and NFV and how they are creating the new networking stack.
best practices for achieving enterprise IT efficiency
The Enterprise Architecture channel presents the next generation of enterprise IT: recognizing the strategic importance of the data center to make companies more nimble and competitive. These presentations will help demanding IT professionals achieve flexibility, scalability and performance with reduced risk and complexity.
Программное обеспечение ECS позволяет хранить, администрировать и анализировать неструктурированные данные в масштабной инфраструктуре из типовых компонентов. ECS — это комплексная многопользовательская облачная платформа хранения данных, которая предлагает учет потребления, возможности самостоятельного выделения ресурсов и др.
Заказчики могут приобрести ECS как готовую программно-аппаратную систему хранения данных (решение EMC ECS Appliance) или в виде программного продукта (ПО ECS), который устанавливается на серверы заказчика и типовые диски, сертифицированные EMC. В состав ECS входит модуль хранения неструктурированных данных, который поддерживает сервисы управления объектными данными и HDFS, а в ближайшем будущем получит поддержку файловых сервисов.
No security posture is 100% effective against attackers. That is why IT teams must proactively identify and protect sensitive and regulated data whether “at rest” in file stores or “in motion” as it is sent or received.
Proofpoint Information Protection is the only cloud-based suite of solutions designed from the ground up to provide visibility and control of sensitive data across cloud-based email such as Microsoft Office 365, on-premises email, file shares, storage area networks (SAN), network attached storage (NAS), and SharePoint — all with out-of-the-box policies that provide insight to your attack surface in just 24 hours.
- Proofpoint Data Discover: Quickly discover exposed sensitive and confidential information in shared drives, NAS, SAN and SharePoint sites
- Proofpoint Email DLP: Prevent accidental negligence by employees with greater accuracy and control
- Proofpoint Email Encryption: Communicate securely with policy-based encryption of messages and attachments
Companies used to know where their data was at all times: It was in the data center, surrounded by physical walls. But today, your data is everywhere your employees and customers are — on phones, on tablets, on laptops, in the cloud. Anywhere, anytime access provides more work-life balance and helps employees stay productive, but it also puts data security at considerable risk. The challenge companies consequently face is how to provide fast, simple access to enterprise applications, data and resources without compromising security.
Join Mark Hewett, senior product manager for Dell SonicWALL Secure Mobile Access, and Steven Sanderson, senior product marketing manager for Dell SonicWALL Secure Mobile Access, for a webcast on how to manage and provision mobile devices to protect company data and networks from cyber attacks, viruses, malware and other threats.
•Ensure that only authorized users have access to appropriate data and through approved devices
•Quickly and easily provision secure mobile access and role-based privileges
•Keep company data secure in-flight and at-rest on devices
Enterprises are widely adopting hyperconverged infrastructure to transform the way they deliver IT services. At the same time, with dropping prices and increasing storage density, we’ve reached an inflection point that is transforming decisions around all flash deployments as well. If HCI is the path to the future, shouldn’t your storage decisions reflect that? With emerging technologies such as NVMe and 3D CrossPoint rapidly coming into the market, this session will dig into the new realities for enterprise datacenters and what could possibly be the ideal way to deploy flash.
The EU's General Data Protection Regulation (GDPR) was adopted on April 14, 2016 and threw infosecurity and privacy teams into chaos. While teams were trying to get their arms around the new regulations and rules, the UK voted to leave the EU, throwing another big wrinkle into the mix. What does all of this mean to you and your compliance and regulation efforts? What does the Brexit vote mean for the GDPR and for the UK's infosecurity and privacy rules? Imperva sponsors an (ISC)2 From the Trenches webinar discussion on this and answers questions from the audience on July 28, 2016 at 1:00PM Eastern.
With Datadog’s cloud-scale performance monitoring capabilities, users obtain invaluable operational data about their cloud environment and applications. IMMUNIO is the latest addition to the list of more than 100 turnkey Datadog integrations (a group that also includes Amazon Web Services, Docker, and Slack). The IMMUNIO integration makes your existing Datadog monitoring even more powerful. By using IMMUNIO with Datadog, you gain critical insights into how attacks are affecting your system -- and you get the tools you need to stop the attacks immediately.
The data provided by your IMMUNIO integration with Datadog helps you determine what’s normal for your system and your apps -- so you can quickly zero in on abnormal activity, determine whether it’s malicious, and immediately safeguard your apps.
Join IMMUNIO and Datadog for this informative webinar and get the scoop on all the benefits of the IMMUNIO integration, including the ability to:
- Correlate CPU usage spikes with a brute force login attack
- Diagnose database query latency by matching to a blind SQL Injection attack
- Use IMMUNIO to stop bots by automatically serving CAPTCHAs, and set a Datadog alert based on number of CAPTCHAs served.
- Harden your application against Cross-Site Scripting, SQL Injection, Remote Command Execution, and other vulnerabilities -- even many zero-day attacks
SteelBrick and Salesforce’s Partner Community give your channel new ways to connect to your sales processes and resources, allowing channel partners to service their buyers directly, for example.
Learn from long-time Salesforce customer Curt Westberg, Vice President at Dexter & Chaney, as he discusses how Dexter took its Partner Community to the next level. He used SteelBrick to replace a spreadsheet-based system for pricing and quotes. Channel partners gained access to product and pricing information and the ability transact from anywhere, on any device.
Dexter & Chaney moved its channel sales partners from a system plagued by manual processes and poor visibility to Salesforce’s Partner Community and Steelbrick, making its channel a powerful revenue machine and engine of growth.
Do you really know the implications for your business of all the terms and conditions listed in the agreements that a public cloud service provider asks you to sign? Public Cloud Service Agreements: What to Expect and What to Negotiate, Version 2.0 was written to help you, the customer, understand the meaning of these terms, obtain clarifications, and sometimes get stronger commitments. This white paper complements the Cloud Standards Customer Council’s Practical Guide to Cloud Service Agreements but goes deeper, based on analyzing dozens of actual agreements. Version 2.0 reflects the evolution of the market, the growing concerns about privacy, the development of hybrid clouds, and more. Join several of the paper’s co-authors who will share best practices to evaluate competing offers.