Trends in Data Protection and Restoration Technologies
Many disk technologies, both old and new, are being used to augment tried and true backup and data protection methodologies to deliver better information and application restoration performance. These technologies work in parallel with the existing backup paradigm,
This session will di
Many disk technologies, both old and new, are being used to augment tried and true backup and data protection methodologies to deliver better information and application restoration performance. These technologies work in parallel with the existing backup paradigm,
This session will discuss many of these technologies in detail. Important considerations of data protection include performance, scale, regulatory compliance, recovery objectives and cost. Technologies include contemporary backup, disk based backups, snapshots, continuous data protection and capacity optimized storage.
Detail of these technologies interoperate will be provided as well as best practices recommendations for deployment in today's heterogeneous data centers.
RecordedJul 30 2009
Your place is confirmed, we'll send you email reminders
Why choose between your datacenter and the cloud? A hybrid cloud solution gives you both.
You have already invested in server products that are on premises. You believe that Cloud is the future and the power of the Cloud can open up countless opportunities for people to do more and achieve more. But how can you leverage the Cloud given your current infrastructure?
Join this webcast to learn Hybrid Cloud options as well as how to extract value from your existing investments by:
- Expanding your options without adding complexity
- Easily moving workloads from your datacenter
- Building hybrid applications that leverage both on-premises and cloud resources
- Taking advantage of storage, backup, and recovery options with increased efficiency and reduced cost.
The protection needs for Healthcare and Life Sciences data evolve over time. The span of protection needs ranges from average for files that are easily reproduced to critical for files that need to be available for surgery or lifesaving research or that need to comply with regulations or be used in litigation. In this webinar, learn about some of the current protection methods, their pros and cons, and how to architect a storage solution that can evolve with your ever-changing protection needs.
The infrastructure you manage with Chef is a complex machine. This complexity is mirrored in the cookbooks you develop and the data stored in your Chef server. It is an ongoing effort to keep track of the state of that machine and to keep up with all the functionality included in your (many) cookbooks. However, the right tools can help. With them, you can develop code faster, maintain cleaner code, and better understand your existing code.
In this webinar, Franklin Webber, Training and Technical Content Lead at Chef, will demonstrate how better editor and debugger tools can improve your work life. He’ll show you how the right text editor can make it easier to write code. Next, he’ll demonstrate how tools like Rake and Guard can consolidate tasks and automate tests. Finally, he’ll show you how Pry can help you to debug your recipes.
Gestionar la salud en el centro de datos tiene 4 pilares principales: Monitoreo, Análisis, Diagnóstico y Resolución.
En esta sesión estaremos cubriendo estos 4 pilares y por qué son importantes. In this session we will cover these main pillars and why they are important. Les enseñaremos como podemos usar sensores embebidos en el silicio disponible a través de interfaces estandarizadas en sus servidores, ayudando a los profesionales de TI a comenzar a agregar estos pilares en su entorno ya que ayudarán a maximizar con la reducción del tiempo medio de reparación (MTTR) para evitar interrupciones. En el caso de los servidores actuales, vamos a explicar la forma de acceder a ellos de manera remota y solucionar sus problemas con Intel Virtual Gateway.
Aspectos Importantes de los 4 Pilares:
•Monitoreo: Monitoreo automatizado de la salud de los servidores, alertas de fallas, Tablero de visualización y más.
•Análisis: Causa raíz con los detalles de la salud de los servidores, reporte de fallas de dispositivos con indicador de severidad, historial de comportamiento.
•Diagnóstico: Acceso Remoto a través de vKVM, acceso “in-band” integrado, detalles de la salud a nivel componente.
•Resolución: Encendido y apagado remoto, vMedia remoto.
Today’s technology leaders need to tackle the big trends—cloud, big data, the Internet of Things, mobility, social media—while lowering IT spend year over year. That’s a tall order. Storage cost projections are becoming unsustainable, and organizations need new, more cost-effective ways of delivering storage. Nexenta provides a software-only storage solution that includes a rich feature set across all block, file, and object storage needs. This enables you to deliver software- defined infrastructure for legacy and next-generation enterprise applications, virtual workloads, file service applications, and more—all while maintaining the freedom to choose which platform to run on.
In this session you will learn more about the main kinds of software-defined storage technology landscape you’ll likely deploy:
Each solution is easy to support with Nexenta software and commercial off-the-shelf Intel-based hardware.
Innovation continues to accelerate at a breakneck pace. Smart cities, Connected Vehicles, smart sensors and devices are driving the transformation of networks such as 5G. New types of service providers need to support smart infrastructure and applications that drive more throughput, enhanced network intelligence and an evolving security landscape. F5 Networks is collaborating with Intel to deliver a network infrastructure design to scale and secure the Gi-LAN using the F5 BIG-IP platform and Intel® Architecture.
The need for a secure, extremely agile, fast, scalable, and standardized architecture to support new usage models, new services with low latency and error apps is vital in a 5G world. Together we provide the flexibility and capability to ensure that services and apps run smoothly, reliably and securely. Intel and F5 are working together to realize the vision of 5G by transforming networks and service models.
In this seminar, attendees will learn how F5’s Carrier class security and traffic steering platforms are helping SP’s transform their network around innovative around new services and F5’s virtualized platforms enable SP’s deploy, highly agile, secure and fast networks.
In un momento in cui le iniziative IT corrono di pari passo col business, l’abilità di comunicare i requisiti di business in un modo che sia direttamente comprensibile all’IT diventa un imperativo. CA ARD utilizza l’approccio Model Driven Testing per eliminare ambiguità nei requisiti, ottimizzando i cicli di test garantendo totale test coverage.
Many organizations are implementing server virtualization to reap the business benefits of simplifying operations, speeding up provisioning, and adapting to rapidly changing infrastructure needs, but this creates a new set of security challenges as network professionals race to keep up with the changes. To really take advantage of software-defined data architecture requires a partnership between a centralized management platform, easily integrated next-gen firewall solution, and an adaptive, simplified virtual environment. Enter VMware and Palo Alto Networks.
In this webinar, experts from Palo Alto Networks and VMware, along with members of their user communities Fuel and VMUG will provide an technical overview of the advantages of pairing Palo Alto Networks’ VM-series next-generation firewall and Panorama centralized management tools with VMware’s NSX network virtualization platform. With real-world customer examples and advice on the best way to protect your organization across on-prem and online environments, you’ll leave this webinar with an action plan for realizing the full opportunities of SDDC infrastructure.
Build a fundamentally more agile, efficient and secure application environment with VMware NSX network virtualization on powerful industry standard infrastructure featuring Intel® Xeon® processors and Intel® Ethernet 10GB/40GB Converged Network Adapters.
The movement away from electro-mechanical devices for primary storage to solid state technology continues. Flash technology has been immensely successful and continues to advance with greater density and less cost. It is also driving changes in the interfaces and protocols for storage from disk-based to memory-based. Additional solid state technology is entering the market and will create a hierarchy of different performance and cost storage. This presentation will discuss some of these changes and their potential impacts.
RSA’s Data Protection Manager (DPM), BSAFE and tokenization products are quickly approaching EOL/EOPS, presenting RSA customers with an opportunity to reassess their encryption key management architecture and needs. With so many technologies available today that seemingly offer the same capabilities, how do you select the vendor and solution that is right for you?
Join Stephen Kingston, Product Manager for SafeNet KeySecure, Gemalto, where you will learn how you can:
• Benefit from proven, successful RSA to Gemalto migration use cases, including Healthcare, PII Protection and Retail PoS applications
• Easily migrate with the same one-to-one functionality offered by SafeNet KeySecure and SafeNet Data Protection Connectors
• Avoid encryption silos with a centralized key manager whether on-premises, virtual, or in the cloud
• Painlessly expand your encryption solution as your future needs grow, be it files, databases, applications, or tokenization
• Quickly get started with our 5 easy migration steps
Cloud storage has transformed the storage industry, however interoperability challenges that were overlooked during the initial stages of growth are now emerging as front and center issues. Join this Webcast to learn the major challenges that businesses leveraging services from multiple cloud providers or moving from one cloud provider to another face.
The SNIA Cloud Data Management Interface standard (CDMI) addresses these challenges by offering data interoperability between clouds. SNIA and Tata Consultancy Services (TCS) have partnered to create a SNIA CDMI Conformance Test Program to help cloud storage providers achieve CDMI conformance.
As interoperability becomes critical, end user companies should include the CDMI standard in their RFPs and demand conformance to CDMI from vendors.
Join us on July 19th to learn:
•Critical challenges that the cloud storage industry is facing
•Issues in a multi-cloud provider environment
•Addressing cloud storage interoperability challenges
•How the CDMI standard works
•Benefits of CDMI conformance testing
•Benefits for end user companies
Sam Fineberg, Distinguished Technologist, HPE, Ben Swartzlander, OpenStack Architect, NetApp, Thomas Rivera, SNIA DPCO Chair
This Webcast will focus on the data protection capabilities of the OpenStack Mitaka release, which includes multiple resiliency features. Join Dr. Sam Fineberg, Distinguished Technologist (HPE), and Ben Swartzlander, Project Team Lead OpenStack Manila (NetApp), as they discuss:
- Storage-related features of Mitaka
- Data protection capabilities – Snapshots and Backup
- Manila share replication
- Live migration
- Rolling upgrades
- HA replication
Our experts will be on hand to answer your questions.
This Webcast is co-sponsored by two groups within the Storage Networking Industry Association (SNIA): the Cloud Storage Initiative (CSI), and the Data Protection & Capacity Optimization Committee (DPCO).
Michelle Tidwell, SNIA Board Member, IBM Systems Storage, Business Line Manager, Software Defined Storage
We've heard it said that data is the new natural resource. In today's extremely dynamic, fast growing and interconnected world, businesses need more agile IT infrastructure to handle larger, faster, and growing variant types of Oceans of Data. The rise of cloud and hybrid cloud infrastructures, the common practice of server virtualization for efficiency and flexibility requires storage infrastructure that is equally flexible, to deliver, manage and protect data with superior performance to keep businesses operational through any data disruption or disaster. The IBM System Storage session will examine the IBM technologies that will help address the challenges and pain-points that IT professionals are experiencing to deliver dynamic insights for businesses and governments worldwide. Included in the IBM session are examples of how clients today are deploying Flash, Object and Software Defined Storage to rapidly and effectively deliver monetization of data.
Demand for data storage is growing exponentially, but the capacity of existing storage media is not keeping up. Using DNA to archive data is an attractive possibility because it is extremely dense, with a raw limit of 1 exabyte/mm3 (10^9 GB/mm3), and long-lasting, with observed half-life of over 500 years.
This work presents an architecture for a DNA-based archival storage system. It is structured as a key-value store, and leverages common biochemical techniques to provide random access. We also propose a new encoding scheme that offers controllable redundancy, trading off reliability for density. We demonstrate feasibility, random access, and robustness of the proposed encoding with wet lab experiments. Finally, we highlight trends in biotechnology that indicate the impending practicality of DNA storage.
In the era of data explosion in Cloud-Mobile convergence and Internet of Things, traditional architectures and storage systems will not be sufficient to support the transition of enterprises to cognitive analytics. The ever increasing data rates and the demand to reduce time to insights will require an integrated approach to data ingest, processing and storage to reduce end-to-end latency, much higher throughput, much better resource utilization, simplified manageability, and considerably lower energy usage to handle highly diversified analytics. Yet next-generation storage systems must also be smart about data content and application context in order to further improve application performance and user experience. A new software-defined storage system architecture offers the ability to tackle such challenges. It features seamless end-to-end data service of scalable performance, intelligent manageability, high energy efficiency, and enhanced user experience.
Camberley Bates, Managing Director and Senior Analyst, & Russ Fellows, Senior Partner and Senior Analyst, The Evaluator Group
Since the 90’s the storage architectures of SAN and NAS have been well understood and deployed with the focus on efficiency. With cloud-like applications, the massive scale of data and analytics, the introduction of solid state and HPC type applications hitting the data center, the architectures are changing, rapidly. It is a time of incredible change and opportunity for business and the IT staff that supports the change. Welcome to the new world of Enterprise Data Storage.
There are many permutations of technologies, interconnects and application level approaches in play with solid state storage today. It is becoming increasingly difficult to reason clearly about which problems are best solved by various permutations of these. In this webcast Doug Voigt, chair of the SNIA NVM Programming model will outline key architectural principals that may allow us to think about the application of networked solid state technologies more systematically.
Fred Knight, Standards Technologist, NetApp, Andy Banta, Storage Janitor, SolidFire/NetApp, David Fair, Chair, SNIA-ESF
iSCSI is an Internet Protocol standard for transferring SCSI commands across an Ethernet network, enabling hosts to link to storage devices wherever they may be. In this Webcast, we will discuss the evolution of iSCSI including iSER, which is iSCSI technology that takes advantage of various RDMA fabric technologies to enhance performance. Register now to hear:
•A brief history of iSCSI
•How iSCSI works
•IETF refinements to the specification
•Enhancing iSCSI performance with iSER
The Webcast will be live, so please bring your questions for our experts.
Jeff Chang, AgigA Tech; Arthur Sainio, SMART Modular; Doug Voigt, HP-E; Mat Young, Netlist
The IT industry has made tremendous progress innovating up and down the computing stack to enable and take advantage of non-volatile memory (NVM). But questions still remain on where NVM plays in the memory stack, how it will evolve in the CPU architecture, and where operating systems will need to be enhanced. Join the SNIA NVDIMM Special Interest Group to learn about the latest developments in NVDIMM, understand how the SNIA NVM Programming Model can be applied in NVM development work, and find your NVM answers!
Wayne Adams, SNIA Board of Directors; Mark Carlson, SNIA Technical Council; Camberley Bates, Evaluator Group General Mgr
This webcast will feature an interactive discussion with the subject matter experts who have organized the Data Storage Innovation Conference, planned for June 13-15, 2016.
Get an overview of the Conference agenda that addresses the most pressing data storage and cloud trends spanning storage class memory, data security, data protection, cloud development and management, new hyper-converged storage systems, big data and analytics, storage networks and protocols, file-systems, technology standards, software defined storage and best practices as they apply to networked storage, data management and data protection.
Attendees will also become aware of conference highlights including Hot Topic sessions, state of the market research study on Enterprise Hyper-converged Storage Deployment, and recently released solutions featured in the Innovation Spotlight. Webcast attendees will be encouraged to follow SNIA developments and webcasts live on June 13-14 , as well as attend the Conference.
Alex McDonald, SNIA-ESF Vice Chair, Chad Hintz, SNIA-ESF Board Member
The popular & ubiquitous Network File System (NFS) is a standard protocol that allows applications to store and manage data on a remote computer or server. NFS provides two services; a network part that connects users or clients to a remote system or server; and a file-based view of the data. Together these provide a seamless environment that masks the differences between local files and remote files.
This SNIA Ethernet Storage Forum Webcast is an introduction and overview presentation to NFS for technologists and tech managers interested in understanding:
oNFS history and development
oThe facilities and services NFS provides
oWhy NFS rose in popularity to dominate file based services
oWhy NFS continues to be important in the cloud
Originally presented at SNIA’s 2015 Storage Developer Conference, this webcast will discuss how Facebook’s massive and continuously growing corpus of photos, videos, and other Binary Large OBjects (BLOBs) need to be reliably stored and quickly accessed.
As the footprint of BLOBs increases, storing them in their traditional storage system, Haystack, is becoming increasingly inefficient. To increase Facebook’s storage efficiency, measured in the effective-replication-factor of BLOBs, they examine the underlying access patterns of BLOBs and identify temperature zones that include hot BLOBs that are accessed frequently and warm BLOBs that are accessed far less often.
Facebook’s overall BLOB storage system is designed to isolate warm BLOBs and enable them to use a specialized warm BLOB storage system, f4. f4 is a new system that lowers the effective-replication-factor of warm BLOBs while remaining fault tolerant and able to support the lower throughput demands.
Eric Slack, Sr. Analyst, Evaluator Group, Alex McDonald, Chair, SNIA Cloud Storage, Glyn Bowden, SNIA Cloud Storage Board
A Software Defined Data Center (SDDC) is a compute facility in which all elements of the infrastructure - networking, storage, CPU and security - are virtualized and removed from proprietary hardware stacks. Deployment, provisioning and configuration as well as the operation, monitoring and automation of the entire environment is abstracted from hardware and implemented in software.
The results of this software-defined approach include maximizing agility and minimizing cost, benefits that appeal to IT organizations of all sizes. In fact, understanding SDDC concepts can help IT professionals in any organization better apply these software-defined concepts to storage, networking, compute and other infrastructure decisions.
If you’re interested in Software-Defined Data Centers and how such a thing might be implemented – and why this concept is important to IT professionals who aren’t involved with building data centers - then please join us on March 15th as Eric Slack, Sr. Analyst with Evaluator Group, will explain what “software-defined” really means and why it’s important to all IT organizations and join a discussion with Alex McDonald, Chair for SNIA’s Cloud Storage Initiative about how these concepts apply to the modern data center.
In this webinar we’ll be exploring:
•How a SDDC leverages this concept to make the private cloud feasible
•How we can apply SDDC concepts to an existing data center
•How to develop your own software-defined data center environment
Ken Cantrell, Mngr, Performance Engineering, NetApp; Mark Rogov, Advisory Systems Engineer, EMC; David Fair - Chair, SNIA-ESF
The third installment of our performance benchmarking Webcast series, “Storage Performance Benchmarking: Block Components” aims to continue educating anyone untrained in the storage performance arts to ascend to a common base with the experts. In this Webcast, you will gain an understanding of the block components of modern storage arrays and learn storage block-world terminology, including:
•How storage media affects block storage performance
•Integrity and performance trade-offs for data protection: RAID, Erasure Coding, etc.…
•Terminology updates: seek time, rebuild time, garbage collection, queue depth and service time
After the Webcast, visit our Webcast Q&A blog too http://sniaesfblog.org/?p=521
Martin Rosner, Standardization Officer, Philips, David Slik, Co-Chair, SNIA Cloud Storage TWG, Alex McDonald, Chair SNIA CSI
Healthcare privacy and data protection regulations are among the most stringent of any industry. Join this Webcast to learn how healthcare organizations can securely share health data across different cloud services. Hear experts explore how Encrypted Objects and Delegated Access Control Extensions to the Cloud Data Management Interface (CDMI) standard permits objects to freely and securely move between clouds and clients with enhanced security and auditability.
•Protecting health data from alteration or disclosure
•How Cloud Encrypted Objects work
•How Delegated Access Control works
•CDMI for Electronic Medical Records (EMR) applications
•Healthcare use cases for implementing securely sharing data in the cloud
David Fair, Chair, SNIA-ESF, John Kim, Director of Storage Marketing, Mellanox
NVMe (Non-Volatile Memory Express) over Fabrics is of tremendous interest among storage vendors, flash manufacturers, and cloud and Web 2.0 customers, Because it offers efficient remote and shared access to a new generation of flash and other non-volatile memory storage, it requires fast, low latency networks, and the first version of the specification is expected to take advantage of RDMA (Remote Direct Memory Access) support in the transport protocol.
Many customers and vendors are now familiar with the advantages and concepts of NVMe over Fabrics but are not familiar with the specific protocols that support it. This live webcast will explore and compare the Ethernet RDMA protocols and transports that support NVMe over Fabrics and the infrastructure needed to use them. You’ll hear:
•Why NVMe Over Fabrics requires a low-latency network
•How the NVMe protocol is mapped to the network transport
•How RDMA-capable protocols work
•Comparing available Ethernet RDMA transports: iWARP and RoCE
•Infrastructure required to support RDMA over Ethernet
•Congestion management methods
Liz Townsend, Director of Business Development, Townsend Security
Your encrypted data is only as secure as your encryption keys. A strong encryption key management strategy is essential for a comprehensive security policy, as well as meeting compliance requirements. Attendees of this presentation will learn:
- Principles and best practices for encryption key management including key management, key storage, secure key retrieval, key escrow, key mirroring, industry standards, compliance guidelines, and system audit
- Why certifications are important for meeting compliance regulations such as PCI-DSS and HIPAA/HITECH
- How key management systems work and how to evaluate vendor solutions.
This is a non-technical session but will be of value to developers and implementers. Attendees will learn the core principles of effective and secure encryption key management. These principles can be used in developing in-house key management solutions or in evaluating vendor solutions.
What you'll learn:
- What is encryption key management and why is it important?
- Principles of industry-standard key management
- Industry must-haves for effective key management
- Challenges of home grown key management solutions
- Important certifications for meeting compliance and evaluation vendors
Arthur Sainio,SMART Modular; Jeff Chang, AgigA Tech and Jerome McFarland, Diablo Technologies
Non-volatile Dual In-line Memory Modules (NVDIMMs) have emerged as a go-to technology for boosting performance for next generation storage platforms. The standardization efforts around NVDIMMs have paved the way to simple, plug-n-play adoption. If you're a developer or integrator who hasn't yet realized the benefits of NVDIMMs in your products, this presentation from the SNIA NVDIMM Special Interest Group is for you!. Learn about the different kinds of NVDIMMs and their functionality, applications, and benefits. You'll come away with an understanding of how NVDIMMs fit into the persistent memory landscape.
The Storage Networking Industry Association (SNIA) is a not-for-profit global organization, made up of some 400 member companies spanning virtually the entire storage industry. SNIA's mission is to lead the storage industry worldwide in developing and promoting standards, technologies, and educational services to empower organizations in the management of information.