Transforming Management Practices To Keep Pace With Data Center Technology
IT technologies are changing faster than the process and practices – so expectations of improved services and cost reductions are often not realized. This presentation will cover some of the most common problems faced by organizations (both supplier and end user) and how to overcome them.
RecordedAug 16 201242 mins
Your place is confirmed, we'll send you email reminders
Past infrastructures provided compute, storage and network enabling static enterprise deployments which changed every few years. This talk will analyze the consequences of a world where production SAP and Spark clusters including data can be provisioned in minutes with the push of a button.
What does it mean for the IT architecture of an enterprise? How to stay in control in a super agile world?
John Kim, SNIA-ESF Chair, James Coomer, DDN, Alex McDonald, SNIA-ESF Vice Chair
Today's storage world would appear to have been divided into three major and mutually exclusive categories: block, file and object storage. Much of the marketing that shapes much of the user demand would appear to suggest that these are three quite distinct animals, and many systems are sold as exclusively either SAN for block, NAS for file or object. And object is often conflated with cloud, a consumption model that can in reality be block, file or object.
But a fixed taxonomy that divides the storage world this way is very limiting, and can be confusing; for instance, when we talk about cloud. How should providers and users buy and consume their storage? Are there other classifications that might help in providing storage solutions to meet specific or more general application needs?
This webcast will explore clustered storage solutions that not only provide multiple end users access to shared storage over a network, but allow the storage itself to be distributed and managed over multiple discrete storage systems. In this webcast, we’ll discuss:
•General principles and specific clustered and distributed systems and the facilities they provide built on the underlying storage
•Better known file systems like NFS, GPFS and Lustre along with a few of the less well known
•How object based systems like S3 have blurred the lines between them and traditional file based solutions.
This webcast should appeal to those interested in exploring some of the different ways of accessing & managing storage, and how that might affect how storage systems are provisioned and consumed. POSIX and other acronyms may be mentioned, but no rocket science beyond a general understanding of the principles of storage will be assumed. Contains no nuts and is suitable for vegans!
Are you looking for a solution that will allow you to move fast and innovate quickly?
In our session, we will explain how you can implement a flexible and modular architecture that will meet the performance and efficiency requirements of traditional and cloud-native applications. How you can start with a small deployment, and then flexibly scale out to support dynamic workloads and evolving business needs.
From a recent IDC study; we will share with you the business value outcomes of using a Hyper Converged system along with the expected return of investment (ROI)
When applications and desktops are delivered over Citrix, the Citrix administration team becomes the front-line for responding to complaints about slow performance. But more than 60 percent of the time, the root cause of the problem lies outside of the Citrix environment.
In this webinar, you’ll learn how wire data analytics can enable Citrix administrators to not only see end-user experience for ICA sessions, but also dig into application and infrastructure performance to uncover the real reason for slowdowns.
Marc Staimer, Senior Anlayst, Dragon Slayer Consulting
Attendees will learn what software defined storage (SDS) is and is not, as well as the different SDS variations. There will be an in-depth discussion about the strengths and weaknesses of each SDS variation including, but not limited to:
• Hypervisor based SDS
• Virtual storage appliances (VSA) SDS
• Storage controller based SDS
• Scale-out object/file/block storage SDS
The common hidden gotchas for all of these will be revealed along with pragmatic practical ways to avoid them - while optimizing the benefits received from SDS regardless of SDS variation or vendor.
We will also be hosting a 15 minute break out session at the end of the webinar via GoToMeeting. Instructions on how to attend this will be provided.
About Marc Staimer:
Marc is the founder and senior analyst of Dragon Slayer Consulting in Beaverton, OR.
The consulting practice of 16 years has focused in the areas of strategic planning, product development, and market development.
With over 34 years of marketing, sales and business experience in infrastructure, storage, server, software, databases, and virtualization, he’s considered one of the industry’s leading experts.
J Metz, Cisco, Alex McDonald, NetApp, John Kim, Mellanox, Chad Hintz, Cisco, Fred Knight, NetApp
Welcome to this first part of the webcast series, where we’re going to take an irreverent, yet still informative look, at the parts of a storage solution in Data Center architectures. We’re going to start with the very basics – The Naming of the Parts. We’ll break down the entire storage picture and identify the places where most of the confusion falls. Join us in this first webcast – Part Chartreuse – where we’ll learn:
•What an initiator is
•What a target is
•What a storage controller is
•What a RAID is, and what a RAID controller is
•What a Volume Manager is
•What a Storage Stack is
With these fundamental parts, we’ll be able to place them into a context so that you can understand how all these pieces fit together to form a Data Center storage environment.
Oh, and why are the parts named after colors, instead of numbered? Because there is no order to these webcasts. Each is a standalone seminar on understanding some of the elements of storage systems that can help you learn about technology without admitting that you were faking it the whole time! If you are looking for a starting point – the absolute beginning place – start with this one. We’ll be using these terms in all the other presentations.
Load balancers occupy an important position (in the path of application traffic) on the enterprise network. Yet, traditional application delivery controllers (ADCs) are unable to provide meaningful application insights to drive business decisions. Avi Networks’ software-defined architecture for load balancing separates the control plane (management layer) from the data plane (load balancers) to generate continuous insights about applications.
In this 30 minute presentation from Avi Networks, learn how you can get rich analytics and actionable insights into end user experience, application performance, resource utilization, security, and anomalous behavior. See how you can benefit from:
• A “Network DVR” to record and replay traffic events to pinpoint app issues
• At-a-glance view of all virtual services throughout the system
• Real-time visibility into DDoS attacks, SSL versions and ciphers used in transactions
• Health scores that give you immediate feedback on application performance
Colin Whittaker, Informed Risk Decisions; Yo Delmar, MetricStream; Chris McClean, Forrester; Sanjay Agrawal, CIMCON Software
Cybersecurity has jumped to the top of companies’ risk agenda after a number of high profile data breaches, and other hacks. In an increasingly digitized world, where data resides in the cloud, on mobiles and Internet of Things enabling multitude of connected devices, the threat vectors are multiplying, threatening the firms’ operations and future financial stability.
Organizations with the ability to view cybersecurity breaches as a risk, with associated probabilities and impacts, can strike the right balance between resilience and protection. By bringing together leadership and capabilities across fraud, IT, cybersecurity and operational risk, organizations can connect the dots and manage their GRC program more effectively. Organizations need to employ a proactive approach to review their existing risk management processes, roles and responsibilities with respect to cybersecurity to re-align them into an overall ERM strategy with boardroom backing.
Attend this panel webinar, as we discuss these issues and address ways to develop an evolving GRC program to cope with the growing threat landscape.
Are you a storage admins running business-critical workloads on vSphere? Replacing a traditional storage environment with hyper-converged infrastructure (HCI) solutions can give you a simpler, more efficient way to manage resources—and eliminate the guesswork that often leads to overprovisioning.
Learn what HCI can do to alleviate some pressure. We’ll discuss how VMware Virtual SAN 6.2 powers HCI with a new operational model for shared storage, including features that complement high-end SANS.
By offloading just one virtualized workload from SAN to Virtual SAN, you can save more expensive SAN or NAS for higher value workloads.
Topics in the webcast include:
-The advantages of VM-centric, policy-based storage
- Avoiding frequent storage requests for transient workloads
- Simplifying capacity planning by scaling compute and storage in tandem
- Focusing on optimizing production workloads
Easy to learn, and with the broadest set of consumption models, see how Virtual SAN hyper-converged storage powers radically simple HCI solutions that solve critical problems for storage admins.
Different workloads demand different attributes from their storage. These differences lead some to believe flash storage is only good for certain point use cases like accelerating databases. But the performance of flash systems lead others to claim a single flash system can support all workloads. The truth, as usual, is somewhere in the middle. Join Storage Switzerland and IBM for this live interactive webinar where we bust another flash myth and help you select the right flash for the right workload for the right reasons.
We hope you may find some new ideas to implement with your team. The field of Performance Engineering is changing rapidly over the last few years due to technology and perception of the field by the business areas. The presentation today will cover several areas that have proven successful in this new era of engineering.
Ethernet technology had been a proven standard for over 30 years and there are many networked storage solutions based on Ethernet. While storage devices are evolving rapidly with new standards and specifications, Ethernet is moving towards higher speeds as well: 10Gbps, 25Gbps, 50Gbps and 100Gbps….making it time to re-introduce Ethernet Networked Storage.
This live Webcast will start by providing a solid foundation on Ethernet networked storage and move to the latest advancements, challenges, use cases and benefits. You’ll hear:
•The evolution of storage devices - spinning media to NVM
•New standards: NVMe and NVMe over Fabric
•A retrospect of traditional networked storage including SAN and NAS
•How new storage devices and new standards would impact Ethernet networked storage
•Ethernet based software-defined storage and the hyper-converged model
•A look ahead at new Ethernet technologies optimized for networked storage in the future
Register today for this live Webcast where our experts will be on hand to answer your questions.
Cloud storage has transformed the storage industry, however interoperability challenges that were overlooked during the initial stages of growth are now emerging as front and center issues. Join this Webcast to learn the major challenges that businesses leveraging services from multiple cloud providers or moving from one cloud provider to another face.
The SNIA Cloud Data Management Interface standard (CDMI) addresses these challenges by offering data interoperability between clouds. SNIA and Tata Consultancy Services (TCS) have partnered to create a SNIA CDMI Conformance Test Program to help cloud storage providers achieve CDMI conformance.
As interoperability becomes critical, end user companies should include the CDMI standard in their RFPs and demand conformance to CDMI from vendors.
Join us on July 19th to learn:
•Critical challenges that the cloud storage industry is facing
•Issues in a multi-cloud provider environment
•Addressing cloud storage interoperability challenges
•How the CDMI standard works
•Benefits of CDMI conformance testing
•Benefits for end user companies
Steve Woo, Co-founder and VP of Products, VeloCloud
Most enterprises deploy both private MPLS and public broadband Internet to some or all of their branch offices. The right SD-WAN solution will dramatically improve the utilization, performance and ease of management of the these hybrid deployments.
Join this webinar for a detailed understanding of the architectural details of Cloud-Delivered SD-WAN for hybrid WAN deployments. You’ll leave with a clear understanding of how hybrid deployments can be designed, implemented and maintained for a secure, optimal and high quality wide area network.
MuleSoft expert and Principal Solution Architect Brett Roeder provides an overview of the broad set of capabilities available out of the box with Anypoint Platform that will enable business agility and create better experiences for your customers. These capabilities uniquely enable reuse, self-service, composability, governance and security. Infused throughout Brett’s demo are best practices for designing, building,and managing both APIs and integrations to deliver projects 3x faster.
Sarvesh Jagannivas, VP Product & Industry Marketing, MuleSoft
Chief architects and CIOs know that API-led connectivity drives business and IT agility. MuleSoft surveyed tech leaders among its customers and discovered not only the value of IT agility, but dramatic, measurable business outcomes for organizations that adopted our approach to integration. This webinar will provide a practical approach to understanding the value of API-led connectivity within your company.
Ian Bromehead, HPE, Harald Burose, HPE, Luke Bradley Vodofone
83% of recently surveyed companies agree that end-to-end visibility is critical to operating a hybrid cloud.
94% state that a single integrated solution is needed to monitor Hybrid IT environments.
But how do you monitor private and public cloud services? How do you make sure you're delivering appropriately? What if you're paying far too much for services you consume? Does monitoring providers give access to any use? With the new HPE Operations Bridge Suite, we'll show you how you can address these issues, and with the help of our customer Vodofone Group, you'll learn what benefits you can extract through adopting it
best practices for achieving enterprise IT efficiency
The Enterprise Architecture channel presents the next generation of enterprise IT: recognizing the strategic importance of the data center to make companies more nimble and competitive. These presentations will help demanding IT professionals achieve flexibility, scalability and performance with reduced risk and complexity.
Having a single system of record of all program, portfolio, and project information reduces costs and allows governmental organizations to quickly snap to and comply with mandates and regulations.
Join this webcast to learn how integrated PPM solutions:
•Bring increased accountability across agency projects
•Facilitate real-time collaboration between project and program managers and their teams
•Reduce redundancy and manual effort
Business analysts fuse the science and the art of data analysis to build custom reports and drill down on important business drivers.
Join this webcast to learn:
•How powerful analytical tools can bridge the gap from cold data to meaningful insight
•How Business Intelligence applications can combine data from multiple sources for a more well-rounded picture
•How these apps can perform richer analysis to bring data to life for everyone on your team
This webcast is part of our Building a Data Culture Leveraging Power BI webcast series. Sign up for this session, or the entire series today!
As organizations create increasingly complex software applications, IT development teams evolved their software creation practices for more flexibility, moving from waterfall models to agile or lean development practices.
Today, DevOps designates a set of tools, processes, best practices and corporate management guidelines that make an IT organization more agile and more efficient. While the software tools and practices promoted by DevOps practitioners are well understood, rigid infrastructures reduce the benefits and hinders the application of agile methods.
Join Amazon Web Services Premier Partner, 2nd Watch, for a live webinar to learn more about how to get the right approach to DevOps and Containers in the cloud.
•What is DevOps?
•What are the benefits of DevOps?
•How can we measure success?
•Organizational change in the new era of technology
Ransomware and destructive attacks have changed the cybersecurity landscape. Modern business requires enhanced access to data to improve productivity, attract and retain customers, and run efficient supply chains – making the network perimeter more difficult to defend. At the same time, criminals are no longer content to just steal information, instead extorting ransoms after encrypting data or sometimes seeking to cripple organizations by destroying their data.
In this webcast you will learn about:
-Dangerous new threats such as ransomware and hacktivism, and how they differ from traditional threats
-Why new threats require a new focus
-Cybersecurity frameworks and best practices
-Enhancing your data protection and recovery capabilities to improve your cybersecurity defenses
-Why some data protection approaches may not be sufficient for advanced threats and how an Isolated Recovery approach provides a best layer of defense
The competitive landscape of cloud computing in China and India looks very different today than it did a few years ago. Aside from gaining wholehearted support from local governments, positive investment climate has a role to play to ignite market interest and vendor support. While early cloud leaders like Amazon and Salesforce have helped define the evolving marketplace and invited further competition, local players, which used to be hampered by process oversights, are now turning to cloud-based business models and service delivery to reinvent themselves and stay agile as technology innovation collides with reality. How does the cloud market shape up in China and India so far? What types of cloud services will be important in near future? What does it mean for you going forward?
58% experienced issues when failing over IT systems! - The State of IT Disaster Recovery in the UK – 2016 Survey
Find out if you’re ahead or behind on IT Disaster Recovery. In a survey commissioned by iland and conducted by Opinion Matters, 250 IT decision makers in the UK were asked about their DR experiences, challenges and strategies. And, we’re sharing the results!
Learn from your peers:
- The frequency of DR testing – how much is enough?
- The impact of IT outages – how disruptive would it be to your business?
- The trade-offs IT leaders make between downtime, cost and security – what trade-offs make sense for you?
Join iland and Zerto as we dig into the survey findings which will be a useful benchmark for your own DR strategies. Don’t miss it.
Analysing big data quickly and efficiently requires a data warehouse optimised to handle and scale for large datasets. Amazon Redshift is a fast, petabyte-scale data warehouse that makes it simple and cost-effective to analyse big data for a fraction of the cost of traditional data warehouses. By following a few best practices, you can take advantage of Amazon Redshift’s columnar technology and parallel processing capabilities to minimize I/O and deliver high throughput and query performance. This webinar will cover techniques to load data efficiently, design optimal schemas and tune query and database performance.
• Get an inside look at Amazon Redshift's columnar technology and parallel processing capabilities
• Learn how to migrate from existing data warehouses, optimise schemas and load data efficiently
• Learn best practices for managing workload, tuning your queries and using Amazon Redshift's interleaved sorting features
Who Should Attend:
• Data Warehouse Developers, Big Data Architects, BI Managers and Data Engineers
Other sessions on the AWS Big Data Webinar Day - 28 September:
10:00 - 11:00 GMT | Getting Started with Big Data on AWS
Register » https://www.brighttalk.com/webcast/9019/221047?utm_campaign=Brighttalk
11:15 - 12:15 GMT | Architectural Patterns for Big Data on AWS
Register » https://www.brighttalk.com/webcast/9019/221063?utm_campaign=Brighttalk
12:30 - 13:30 GMT | Building Big Data Solutions with Amazon EMR and Amazon Redshift
Register » https://www.brighttalk.com/webcast/9019/221145?utm_campaign=Brighttalk
This webinar is being delivered in conjunction with the UKDCIG, PTS Consulting and Square Mile Systems.
Migrating data centres or moving to co-location is complex and subject to cost overruns, especially where existing infrastructure documentation is of questionable quality. We'll show how the use of database driven toolsets can help automate the project processes and avoid many of the typical problems that organisations with overstretched teams encounter.
Avec le degré de maturité et le niveau de menace atteint par les ransomwares au cours de l’an dernier, comment pouvez-vous être sûrs que votre infrastructure IT est réellement protégée et que vous êtes prêt à parer à une attaque ?
Aujourd’hui, les responsables sécurité sont confrontés à :
•un manque de renseignements exploitables sur les menaces, qui leur permettraient de mieux cerner les acteurs et les campagnes susceptibles de viser leurs entreprises
•une carence en analystes de sécurité qualifiés, capables d’identifier le nombre croissant de menaces pénétrant leurs organisations. Par exemple, les cryptoransomwares sont en augmentation constante (+35 % en 2015 ) et il faut encore en moyenne plus de 200 jours à une entreprise pour découvrir qu’elle victime d’une attaque.
•peu d’expertise spécialisée dans les techniques requises pour réagir à des menaces et les neutraliser une fois que celles-ci ont pénétré leur environnement IT
Les gangs de rançonneurs ne cessant d’affiner leurs tactiques, les entreprises ont besoin d’être parfaitement au courant des menaces et des risques qu’elles encourent. Symantec vous donne rendez-vous pour un webcast consacré aux attaques par ransomware. Vous y découvrirez ce qui est arrivé à une société et les mesures qu’elle a prises pour remédier à la menace.