The data center management community focuses on the holistic management and optimization of the data center. From technologies such as virtualization and cloud computing to data center design, colocation, energy efficiency and monitoring, the BrightTALK data center management community provides the most up-to-date and engaging content from industry experts to better your infrastructure and operations. Engage with a community of your peers and industry experts by asking questions, rating presentations and participating in polls during webinars, all while you gain insight that will help you transform your infrastructure into a next generation data center.
Join us on Thursday, April 16, 2015 at 11:00 AM PST/2:00 PM EST for this follow-up webinar to the Introduction to Apache Ignite(TM) (incubating) webinar, in which GridGain co-founder and EVP of Engineering and Ignite PMC Chair, Dmitriy Setrakyan will take a deep dive into several coding examples.
The Fastest, Easiest Way to Backup and Store Data—so You Can Do More Important Things
Are you still spending too much time backing up and storing data rather than using that information to drive business innovation? If so, it just might be time to consider an all-in-one backup target appliance (BTA).
Join us as Seagate appliance experts Anne Haggar and Samuel Nagalingam will help you answer these important questions:
1. Why are backup target appliances gaining steam in the market?
2. How do you know if a BTA is right for you?
3. How can Seagate’s BTA solve the problems you have managing your information and backing up enterprise applications?
After taking a high-level look at the latest trends in BTA technology, Anne and Samuel will introduce you to the powerful, all-new Seagate Backup Target Appliance—an all-in-one solution that provides an onsite backup point for your most important information, let’s you optionally run the EVault Director Backup and Recovery Software, and allows you to replicate to another BTA or to the cloud.
Find out how you can protect the information that matters most—wherever it resides—freeing you to use the information to drive innovation.
Watch this EMC Tech Talk for a discussion and technical demo of the EMC ViPR SRM 3.6!
Attend and learn how you can:
Troubleshoot performance issues with an end-to-end view from guest to array
Monitor your infrastructure to proactively identify configuration, performance or health issues before they impact service levels.
Join our Webinar to learn about two new software appliances in 6WIND’s Speed Series family: Turbo Router and Turbo IPsec. Based on 6WINDGate™ packet processing software, which is deployed in Tier 1 networks worldwide, Turbo Router and Turbo IPsec can be installed quickly onto standard x86 servers within bare metal and virtual machine (VM) environments. The new Speed Series Turbo Appliances are designed to benefit Service Providers, Cloud and Content Providers and Enterprises with the best price/performance ratios when transitioning from hardware to software based appliances for flexibility, efficiency and cost savings. Compared to competing software routers, 6WIND’s Turbo Router can deliver up to twice the performance at ¼ the price. Compared to hardware-based IPsec Gateways, 6WIND’s Turbo IPsec can save 80% of the cost per gigabit of IPsec throughput.
How can you migrate critical data, applications and servers without the risk of downtime and decreased productivity in the business? This short video shows how you can solve this dilemma - migrating 10s to 1000s of servers with a platform independent solution.
The developed world's global Internet registries have officially depleted their supply of free IPv4 addresses. IPv6 is not just the future—it’s already here (65% of Verizon’s traffic is over IPv6!). Some organizations even have their IPv6 allocations already. But since a single site assignment in IPv6 contains 1 trillion, trillion, addresses (or 279 trillion Internets!), designing an effective plan can be both intimidating and unnecessarily time consuming. With that many addresses, where do you start? Join us for this webinar as Tom Coffeen, Infoblox IPv6 evangelist and O'Reilly author of IPv6 Address Planning, discusses how to design, deploy, and successfully adopt an effective IPv6 addressing plan. Both IPv4 exhaustion and IPv6 adoption are real and happening now. Take the first step to realizing an effective IPv6 address plan and adoption strategy, and watch this webinar today.
The Big Data market in 2013 was worth $12.5B+ and is projected to grow to $32.4B in 2017 when Big Data will be a component of mainstream IT. This is your opportunity to redefine traditional data architectures characterized by rigid, difficult-to-scale, proprietary configurations to a modern “Data Lake” characterized by agile, scale-out, and open architectures via on-premises or cloud delivery models.
Learn about the following:
•How to get started with EMC Data Lake Foundation solutions
•Building your Data Lake skills
•Starting the conversation with your customers
More than 75% of organizations in the U.S. and U.K. have experienced at least one DNS attack according to SC Magazine. DNS Attacks are increasing in frequency and evolving constantly. They range from common amplification, reflection, and flood attacks to more sophisticated and stealthier types. These might have fancy names like random subdomain, phantom domain, and domain lock-up, but their effects on DNS are far from pretty. Join this webinar as we reveal the top 10 attacks on external and internal DNS servers; and the impact they have on your operations.
Between rapidly growing data volume and stricter protection requirements, you might be finding that your tape archives are simply too slow to keep up. Fortunately, a solution has emerged: the Virtual Tape Library (VTL).
Before you choose a VTL, however, it’s vital that you know all the major considerations. See what they are in a live webcast led by acclaimed IT technologist Mel Beckman and Dell’s Marc Mombourquette. Don’t miss out on your chance to hear them demystify VTL technology and explain its inner workings. Sign up today and discover:
• How VTL works and why it's so good
• Secrets of reduplication
• The importance of encryption at rest and key management
• VTL interconnect technologies
• Shopping for feeds, speeds, and features
• Backend archival strategies
• Real-world solutions
For the past 18 months, the technology trade press has been filled with articles by vendors and analysts proclaiming the emergence of an entirely new conceptualization of storage infrastructure: software defined storage. In this webinar, IT-SENSE editor, Jon Toigo, looks at the realities of virtual SANs from leading hypervisor vendors – their capabilities and limitations – and how they may be missing the storage requirements of smaller firms and companies that need to support remote and branch offices. Joining Toigo will be Anatoly Vilchinsky, Head of Support for StarWind Software, an early mind share leader in virtual SAN technology.
The proliferation of data on mobile devices has created huge headaches for CIOs as they attempt to protect data, stay in compliance and move workloads to the cloud. How IT approaches data protection for mobile devices can support or hinder these high level efforts. Endpoint backup, traditionally viewed as a functional requirement below the radar of CIOs, is evolving to offer not just data backup and restore, but also a modern way to address costly data governance challenges such as compliance and eDiscovery. This webcast will cover real-world case studies of Fortune 1000 companies leveraging endpoint backup solutions to gain significant business advantages including cost control, compliance and embracing the cloud.
Watch this EMC Tech Talk for a discussion and technical demo of the EMC storage automation software, ViPR Controller.
Attend and learn how you can:
-Create virtual storage pools to meet performance and protection SLAs
-Automate delivery of policy-based storage services, including exporting to hosts
-Empower end-users via a self-service catalog to reduce reliance on IT
As enterprises struggle to control and secure their assets across internal file stores, an ever-increasing universe of mobile devices, and a plethora of non-secure cloud storage services, they are searching for solutions that allow them to quickly identify and isolate noncompliant data sharing and prevent unauthorized access to sensitive information.
Intel Security and Topia Technology have partnered to develop an integrated product for organizations to store, analyze and share documents from a mobile device or a cloud computing platform.
•Secrata deployed with McAfee provides a unified file sync and share experience with military-grade security, to address this need.
•McAfee Enterprise Security Manager enables businesses with true, real-time situational awareness and the speed and scale required to identify critical threats, respond intelligently, and ensure continuous compliance monitoring.
What's New at FalconStor!
True Software Defined Storage.
How Intelligent Abstraction merges legacy and modern infrastructure for optimized IT processes.
Rethinking how we provision, protect, and recover data resources, and how that impacts your business.
When organizations are looking at a phone system, they have two paths they can take — upgrading their entire on-premise equipment in each office or evaluate a cloud-based system. Marty Piombo, VP of Partnership Development at RingCentral, discusses what it takes to transition to a phone system in the cloud and the benefits it can provide.
In the first part of this program, Daniel O’Connell, Research Director at Gartner, will discuss how businesses can transition from an on-premise PBX phone system to the cloud, as well as the advantages of BYOD and mobile enabled phone solutions. In the second part of this program, Kira Makagon, Executive Vice President of Innovation at RingCentral, shares her perspective on the reasons why IT is choosing cloud-based platforms for their phone system, and why cloud communication, along with the ‘bring your own device’ movement, is the future for businesses everywhere.
Would you ever consider leaving your house for the day without locking your door? Of course not!!
It is as important to protect and control front-door access of your databases as it is to lock the front door of your house. That is why we use a suite of database discovery and activity monitoring tools to control the front door access of our databases. Yet hackers and miscreant insiders know that the back door of databases are all too often left wide open—and it is the path of least resistance to steal valuable data.
Vormetric has partnered with Intel Security to integrate with McAfee Database Activity Monitoring (DAM) and McAfee Enterprise Security Manager (ESM) to extend data-security coverage. Vormetric adds another layer of security to McAfee DAM by preventing unauthorized users and processes from accessing or viewing the database files through transparent encryption.
In this presentation, Vormetric will demonstrate:
• How to complete database security, to assure that back door entry is as locked down as the front door
• How to protect the database, and its associated files such as configuration, logs and reports, from not only physical theft, but also from insider threats and hackers
Join us for a fast-paced and informative 60-minute roundtable as we discuss one of the hottest topics in the datacenter: VMware vSphere Virtual Volumes (VVOLs). VVOLs is the industry's first solution to enable native virtual machine-awareness across a broad range of SAN/NAS arrays. VVOLs will be packaged as a feature in VMware vSphere Standard Edition and above as well as in VMware vSphere ROBO editions, and is seeing a groundswell of interest from IT professionals, especially those involved in datacenter operations. The panel includes VVOL experts from four major vendors that have announced they will be implementing VVOLs into their storage. Some of the questions we will be asking them include: What immediate impact will VVOLs have on the datacenter? What should the early adopters look for in a VVOL-based storage solution? Should datacenters start to implement VVOLs right away or wait for VVOL.next?
David Glynn, Technical Solutions Engineer; Dell
Eric Siebert, Worldwide Solutions Marketing Manager; HP
Joel Kaufman, VMware Technical Director; NetApp
Ben Bolles, VP Products; NexGen Storage
The Security policy management maturity model can help you better understand your current network environment and provide you with a roadmap for improving both your security AND agility. In this webcast, Eric Ogren of the Ogren Group and AlgoSec’s VP Strategy and Marketing, Nimmy Reichenberg, examine:
- The four stages of the maturity model
- How to compare your environment to the different stages
- Tips for orchestrating security policy management
- Examples of benefits achieved by "moving up the curve"
Most organisations are investigating moving some internally hosted services to cloud service providers such as Amazon Web Services, Colt, Sungard, Century Link, to increase agility and reduce complexity. The key to this for all service providers is data centre automation. OpenStack is a Cloud Operating System that can help you quickly build and automate your own Cloud Infrastructure and gain the benefits of automation and agility it brings.
There are many choices to make when building your OpenStack environment. Andy will introduce OpenStack, then review in detail the storage choices that need to be made. He will look at how SolidFire Agile Infrastructure for OpenStack simplifies and dramatically reduces OpenStack project deployment times.
Measuring performance of Solid State requires different approaches, tools and methodologies to accurately model characteristics of the data sets, access patterns, and data streams. The SNIA Solid State Storage System (S4) TWG was created for the purpose of addressing the unique performance behavior of solid state storage systems. Join Leah and Peter as they provide the guidelines that are vendor agnostic and will support all major solid state storage system technologies.
Start delivering on your key datacenter initiatives with peak efficiency, agility, and lower costs. Join our panel of experts as they discuss the transformative technologies that are putting datacenters on the fast track to fitness.
Join the panel discussion and learn:
- How Empire Life lowered their infrastructure costs by 60% and reduced their datacenter footprint by 16:1
- The questions you should be asking to assess your environment’s current fitness level
- How technologies like server virtualization, hyperconverged architectures, and hybrid cloud strategy can help
Generally, risks associated with continuity planning, from physical to cyber-security, are part of an ever-evolving threat to our systems and technologies. Continuity planning is simply the good business practice of ensuring the execution of essential functions through all circumstances, and it is a fundamental responsibility of public institutions and private entities responsible to their stakeholders. What are some of the risks associated with continuity planning? Why is managing risk important for continuity? What are some of the methods used to mitigate risks in continuity planning?
The COOP presentation will provide an understanding of Continuity and Continuity of Operations, explain the importance of a viable Continuity capability, and emphasize the need for a viable Continuity capability in all organizations, to demonstrate some of the linkages between continuity programs and:
Join us on April 21 as NCP’s senior continuity practitioner shares resilient continuity programs and outreach efforts. Hear from Eric Kretz, NCP, as he talks about Information Integration: Leveraging Risk, Physical and Cyber Security and Continuity Planning.
There is a great deal of information available about solid state storage but what is important for IT professionals to know when making decisions?
In this presentation, we will explain:
•What is important for IT with solid state storage
•Where has solid state been exploited most effectively so far
•Likely deployment options for IT
•Future developments for IT usage
•Economic justifications for solid state in IT
Enterprises of all sizes have started using the public cloud for some workloads. Backup and recovery and archiving are two prime examples of such workloads. But can the public cloud be used as a disaster recovery site? What are the pros and cons of such an approach? What best practices should apply? Is it only for small businesses that do not have a secondary site of their own? Or is there relevance even for larger organizations?
Ranga Rajagopalan, Director of Product Management; Symantec
Mark Campbell, CMO & CTO; Unitrends
Rick Vanover, Product Strategy Specialist; Veeam
Joshua Stenhouse, Technology Evangelist; Zerto
Today, storage efficiency features like deduplication and compression are table stakes for delivering compelling economics for Enterprise customers. The next level of value comes from the data management capabilities, implemented correctly, and based on matching architectural platforms. This talk will highlight how Solid-State Storage Systems can go beyond Storage Efficiency to deliver better storage economics than possible with spinning disks.
Many broadcast and streaming products that run on x86 technology haven’t yet scaled to their maximum potential density or met the need for lower cost. The network growth for video services is driven by many factors such as multiscreen OTT, video on demand, higher resolutions, more codec support needed, all pushing transcoding functions needed in MSO, ISP, CSP, CDN networks. Greater density is needed to scale these applications, and x86 technology running on standard servers can meet much higher density levels and much lower cost points to be competitive. The time is now for those applications to multiply density (by a factor of 6-8X) without any change needed to the underlying x86 architecture.
With Intel tools offered such as Quick Synch and Media SDK, developers can advance the migration to the highest density, while preserving application development. Using Artesyn SharpStreamer technology developers can preserve existing application software and achieve 6-8 times the density/RU in standard PCIE, 1U, 2U and larger form factors that fit standard rack server and cloud environments. Using two example applications, Next-Day TV OTT content delivery and Real-time Broadcast ABR transcoding, CAPEX savings are dramatic, giving applications the ability to use only one server vs. 16 or 24 to handle equal densities, also consuming far less OPEX costs derived from power and cooling required. Through OpenStack and the SharpStreamer technology applications can also encompass cloud provisioning and management so they are not constrained to baremetal hardware and can be virtually deployed.
HP’s new Automation solution offering for the mid-market is an excellent way for customers to manage their day-to-day tasks and operations with ease, all from a single virtual appliance.
Register for this webinar to hear more about HP Data Center Automation Appliance and how the new virtual appliance combines HP’s market leading Data Center Automation strengths from HP Server Automation (SA) and HP Operations Orchestration (OO), into a production-ready virtual appliance that can be easily personalized.
During this webinar we will also highlight key use cases behind the new virtual appliance, such as:
• Powered change management using industry leading out of the box content
• Process IT Operations made easy
• Frontline defense (control access to servers as well as securing exploits or open server and application vulnerabilities in the datacenter)
The growth of unstructured data, especially files, continues unabated and strains datacenter resources. Not just storage of that data, but protecting it, providing for disaster recovery, and making that data available in remote offices for collaboration all wreak havoc on staff and budgets. It’s time for a new approach to NAS that takes advantage of the cloud, while still providing local access and performance in the datacenter.
Learn about this new generation of NAS that solves the challenges of file data storage, protection and access across the enterprise, costs less to own and manage, and ends the cycle of NAS hardware refreshes forever.
It is no secret that we live in a 24/7 world that demands information be always available, always accurate and always secure. In order to meet these demands a comprehensive risk management program must be in place. At the forefront of these efforts are the preventive measures that try to reduce the probability of a disruptive incident occurring. But as has been all too often the case, these protective actions may not be enough. Whether it be the force of nature, the actions of terrorists, the fragility of infrastructures or so many other disruptive events will and do happen.
Left with the reality that we must prepare for interruptions to occur, the job of the Business Continuity Professional is to minimize the resulting impacts. Creating environments that will provide connectivity, processing and data integrating, more and more organizations are looking toward the clouds. Whether it be to ensure that data can be shared or looking for full automated recovery cloud computing has a possible answer. This presentation will discuss what the cloud is, how it can make organizations more resilient and some of the issues pertaining to its usage.
Migration to solid state Tier 1 storage can be straightforward and simple with some upfront planning. Considerations for workload demands both today and into the future including performance and availability requirements, growth expectations and budget play a role in planning your move to solid state storage. This session describes what you should think about when you evaluate and size flash-based storage solutions to ensure the best migration experience and the best ROI.
A pre-selection proof of concept or on-site vendor comparison can be a valuable tool as part of the solid state selection process. However, it is critical to all parties involved that the POC is setup and run correctly and efficiently. In this session, you will learn:
•POC process - How to avoid alienating your CIO or your vendors
•POC Technologies - Choosing the tools, technologies and tests to utilize
•POC Evaluation - Communicating valid and meaningful conclusions from your POC
Implementing a communication system for a growing business is no easy task. Between the time of design and implementation, a magnitude of factors may arise that require on-the-fly changes to the process. In this short video, hear about “zero-down implementation” that allows for flexibility in deploying a reliable system that is able to support the growing needs of the business. Learn more about:
- Assembling an experienced team
- Planning and designing phase
- Deployment and training
In March 2012, the San Diego Supercomputer Center (SDSC) deployed the Gordon supercomputer, which was specifically designed for data-intensive workloads. The most notable feature of Gordon was the inclusion of 300 TB of flash SSD storage. In this talk, we will briefly introduce the Gordon architecture and then describe how a variety of applications made use of the SSDs. We conclude with lessons learned from our experiences with Gordon and how they influenced the design of Comet, SDSC’s most recent HPC system.
In the face of massive data growth and aggressive application performance demands, maintaining peak storage health and adapting the infrastructure to meet changing SLAs are crucial endeavors for IT teams.
For many datacenter professionals, these challenges are exacerbated by the reactive, error-prone nature of managing and supporting storage systems that lack automation, efficiency and intelligence.
In this webinar, Industry Analyst and Chief Data Scientist Howard Marks of DeepStorage.net, along with several Nimble Storage customers, will lead an in-depth discussion examining the ways in which the storage experience needs to be redefined, and how Nimble InfoSight dramatically simplifies the entire storage lifecycle for customers via powerful data sciences and automation.