Hi [[ session.user.profile.firstName ]]

SNIA Webcasts

  • Date
  • Rating
  • Views
  • The IT industry has made tremendous progress innovating up and down the computing stack to enable and take advantage of non-volatile memory (NVM). But questions still remain on where NVM plays in the memory stack, how it will evolve in the CPU architecture, and where operating systems will need to be enhanced. Join the SNIA NVDIMM Special Interest Group to learn about the latest developments in NVDIMM, understand how the SNIA NVM Programming Model can be applied in NVM development work, and find your NVM answers!
  • This webcast will feature an interactive discussion with the subject matter experts who have organized the Data Storage Innovation Conference, planned for June 13-15, 2016.

    Get an overview of the Conference agenda that addresses the most pressing data storage and cloud trends spanning storage class memory, data security, data protection, cloud development and management, new hyper-converged storage systems, big data and analytics, storage networks and protocols, file-systems, technology standards, software defined storage and best practices as they apply to networked storage, data management and data protection.

    Attendees will also become aware of conference highlights including Hot Topic sessions, state of the market research study on Enterprise Hyper-converged Storage Deployment, and recently released solutions featured in the Innovation Spotlight. Webcast attendees will be encouraged to follow SNIA developments and webcasts live on June 13-14 , as well as attend the Conference.
  • The popular & ubiquitous Network File System (NFS) is a standard protocol that allows applications to store and manage data on a remote computer or server. NFS provides two services; a network part that connects users or clients to a remote system or server; and a file-based view of the data. Together these provide a seamless environment that masks the differences between local files and remote files.

    This SNIA Ethernet Storage Forum Webcast is an introduction and overview presentation to NFS for technologists and tech managers interested in understanding:
    oNFS history and development
    oThe facilities and services NFS provides
    oWhy NFS rose in popularity to dominate file based services
    oWhy NFS continues to be important in the cloud
  • Originally presented at SNIA’s 2015 Storage Developer Conference, this webcast will discuss how Facebook’s massive and continuously growing corpus of photos, videos, and other Binary Large OBjects (BLOBs) need to be reliably stored and quickly accessed.

    As the footprint of BLOBs increases, storing them in their traditional storage system, Haystack, is becoming increasingly inefficient. To increase Facebook’s storage efficiency, measured in the effective-replication-factor of BLOBs, they examine the underlying access patterns of BLOBs and identify temperature zones that include hot BLOBs that are accessed frequently and warm BLOBs that are accessed far less often.

    Facebook’s overall BLOB storage system is designed to isolate warm BLOBs and enable them to use a specialized warm BLOB storage system, f4. f4 is a new system that lowers the effective-replication-factor of warm BLOBs while remaining fault tolerant and able to support the lower throughput demands.
  • A Software Defined Data Center (SDDC) is a compute facility in which all elements of the infrastructure - networking, storage, CPU and security - are virtualized and removed from proprietary hardware stacks. Deployment, provisioning and configuration as well as the operation, monitoring and automation of the entire environment is abstracted from hardware and implemented in software.

    The results of this software-defined approach include maximizing agility and minimizing cost, benefits that appeal to IT organizations of all sizes. In fact, understanding SDDC concepts can help IT professionals in any organization better apply these software-defined concepts to storage, networking, compute and other infrastructure decisions.

    If you’re interested in Software-Defined Data Centers and how such a thing might be implemented – and why this concept is important to IT professionals who aren’t involved with building data centers - then please join us on March 15th as Eric Slack, Sr. Analyst with Evaluator Group, will explain what “software-defined” really means and why it’s important to all IT organizations and join a discussion with Alex McDonald, Chair for SNIA’s Cloud Storage Initiative about how these concepts apply to the modern data center.

    In this webinar we’ll be exploring:

    •How a SDDC leverages this concept to make the private cloud feasible
    •How we can apply SDDC concepts to an existing data center
    •How to develop your own software-defined data center environment
  • The third installment of our performance benchmarking Webcast series, “Storage Performance Benchmarking: Block Components” aims to continue educating anyone untrained in the storage performance arts to ascend to a common base with the experts. In this Webcast, you will gain an understanding of the block components of modern storage arrays and learn storage block-world terminology, including:

    •How storage media affects block storage performance
    •Integrity and performance trade-offs for data protection: RAID, Erasure Coding, etc.…
    •Terminology updates: seek time, rebuild time, garbage collection, queue depth and service time

    After the Webcast, visit our Webcast Q&A blog too http://sniaesfblog.org/?p=521
  • Here is the highlight reel of SNIA's 2015 SDC Conference and Data Storage Security Conference!
  • Healthcare privacy and data protection regulations are among the most stringent of any industry. Join this Webcast to learn how healthcare organizations can securely share health data across different cloud services. Hear experts explore how Encrypted Objects and Delegated Access Control Extensions to the Cloud Data Management Interface (CDMI) standard permits objects to freely and securely move between clouds and clients with enhanced security and auditability.
    You’ll learn:
    •Protecting health data from alteration or disclosure
    •How Cloud Encrypted Objects work
    •How Delegated Access Control works
    •CDMI for Electronic Medical Records (EMR) applications
    •Healthcare use cases for implementing securely sharing data in the cloud
  • NVMe (Non-Volatile Memory Express) over Fabrics is of tremendous interest among storage vendors, flash manufacturers, and cloud and Web 2.0 customers, Because it offers efficient remote and shared access to a new generation of flash and other non-volatile memory storage, it requires fast, low latency networks, and the first version of the specification is expected to take advantage of RDMA (Remote Direct Memory Access) support in the transport protocol.

    Many customers and vendors are now familiar with the advantages and concepts of NVMe over Fabrics but are not familiar with the specific protocols that support it. This live webcast will explore and compare the Ethernet RDMA protocols and transports that support NVMe over Fabrics and the infrastructure needed to use them. You’ll hear:

    •Why NVMe Over Fabrics requires a low-latency network
    •How the NVMe protocol is mapped to the network transport
    •How RDMA-capable protocols work
    •Comparing available Ethernet RDMA transports: iWARP and RoCE
    •Infrastructure required to support RDMA over Ethernet
    •Congestion management methods
  • Your encrypted data is only as secure as your encryption keys. A strong encryption key management strategy is essential for a comprehensive security policy, as well as meeting compliance requirements. Attendees of this presentation will learn:

    - Principles and best practices for encryption key management including key management, key storage, secure key retrieval, key escrow, key mirroring, industry standards, compliance guidelines, and system audit
    - Why certifications are important for meeting compliance regulations such as PCI-DSS and HIPAA/HITECH
    - How key management systems work and how to evaluate vendor solutions.

    This is a non-technical session but will be of value to developers and implementers. Attendees will learn the core principles of effective and secure encryption key management. These principles can be used in developing in-house key management solutions or in evaluating vendor solutions.

    What you'll learn:

    - What is encryption key management and why is it important?
    - Principles of industry-standard key management
    - Industry must-haves for effective key management
    - Challenges of home grown key management solutions
    - Important certifications for meeting compliance and evaluation vendors

Embed in website or blog