Hi [[ session.user.profile.firstName ]]

Enterprise Architecture

  • Date
  • Rating
  • Views
  • Clustered File Systems: No Limits Clustered File Systems: No Limits John Kim, SNIA-ESF Chair, James Coomer, DDN, Alex McDonald, SNIA-ESF Vice Chair Recorded: Oct 25 2016 64 mins
    Today's storage world would appear to have been divided into three major and mutually exclusive categories: block, file and object storage. Much of the marketing that shapes much of the user demand would appear to suggest that these are three quite distinct animals, and many systems are sold as exclusively either SAN for block, NAS for file or object. And object is often conflated with cloud, a consumption model that can in reality be block, file or object.

    But a fixed taxonomy that divides the storage world this way is very limiting, and can be confusing; for instance, when we talk about cloud. How should providers and users buy and consume their storage? Are there other classifications that might help in providing storage solutions to meet specific or more general application needs?

    This webcast will explore clustered storage solutions that not only provide multiple end users access to shared storage over a network, but allow the storage itself to be distributed and managed over multiple discrete storage systems. In this webcast, we’ll discuss:
    •General principles and specific clustered and distributed systems and the facilities they provide built on the underlying storage
    •Better known file systems like NFS, GPFS and Lustre along with a few of the less well known
    •How object based systems like S3 have blurred the lines between them and traditional file based solutions.

    This webcast should appeal to those interested in exploring some of the different ways of accessing & managing storage, and how that might affect how storage systems are provisioned and consumed. POSIX and other acronyms may be mentioned, but no rocket science beyond a general understanding of the principles of storage will be assumed. Contains no nuts and is suitable for vegans!
  • ESG's 7 Core Criteria for Comparing and Evaluating ITOA Platforms ESG's 7 Core Criteria for Comparing and Evaluating ITOA Platforms Shaun Henderson & Owen Cole, ExtraHop Networks Recorded: Oct 21 2016 25 mins
    As IT environments grow more sophisticated by the day, complexity rises and many CIOs and IT directors lose visibility of their assets and clarity into each asset's performance. The unfortunate result creates IT 'black boxes,' which bring detrimental hazards to enterprise customers when changes are required or things go wrong within interdependent environments. This problem extends beyond the walls of the data center and spans all offices and mobile workers.

    According to ESG analysts' Dan Conde and Nik Rouda - "Modern monitoring must be real-time, at scale, and capable of providing visibility wherever IT assets reside. IT Operations Analytics is at the forefront of this monitoring evolution, but understanding how these often diverse technologies fit together and what benefits they deliver to IT can be complex."

    Join us for a discussion on Conde & Rouda's seven core criteria for enterprise buyers currently evaluating ITOA and monitoring platforms.
  • Hyper-Converged System Optimized for Agility and OPEX Savings Hyper-Converged System Optimized for Agility and OPEX Savings Eitan Segal, Global Architect, Dell EMC Recorded: Oct 19 2016 46 mins
    Are you looking for a solution that will allow you to move fast and innovate quickly?

    In our session, we will explain how you can implement a flexible and modular architecture that will meet the performance and efficiency requirements of traditional and cloud-native applications. How you can start with a small deployment, and then flexibly scale out to support dynamic workloads and evolving business needs.

    From a recent IDC study; we will share with you the business value outcomes of using a Hyper Converged system along with the expected return of investment (ROI)
  • How to Avoid the Citrix Blame Game How to Avoid the Citrix Blame Game Colin Pittham, VP EMEA & Idjiwa Adjido, Head of Sales Engineering - ExtraHop Recorded: Sep 29 2016 29 mins
    When applications and desktops are delivered over Citrix, the Citrix administration team becomes the front-line for responding to complaints about slow performance. But more than 60 percent of the time, the root cause of the problem lies outside of the Citrix environment.

    In this webinar, you’ll learn how wire data analytics can enable Citrix administrators to not only see end-user experience for ICA sessions, but also dig into application and infrastructure performance to uncover the real reason for slowdowns.
  • Escaping Hidden Software Defined Storage Gotchas while Exploiting its Benefits Escaping Hidden Software Defined Storage Gotchas while Exploiting its Benefits Marc Staimer, Senior Anlayst, Dragon Slayer Consulting Recorded: Sep 22 2016 42 mins
    Attendees will learn what software defined storage (SDS) is and is not, as well as the different SDS variations. There will be an in-depth discussion about the strengths and weaknesses of each SDS variation including, but not limited to:

    • Hypervisor based SDS
    • Virtual storage appliances (VSA) SDS
    • Storage controller based SDS
    • Scale-out object/file/block storage SDS

    The common hidden gotchas for all of these will be revealed along with pragmatic practical ways to avoid them - while optimizing the benefits received from SDS regardless of SDS variation or vendor.

    We will also be hosting a 15 minute break out session at the end of the webinar via GoToMeeting. Instructions on how to attend this will be provided.

    About Marc Staimer:

    Marc is the founder and senior analyst of Dragon Slayer Consulting in Beaverton, OR.

    The consulting practice of 16 years has focused in the areas of strategic planning, product development, and market development.

    With over 34 years of marketing, sales and business experience in infrastructure, storage, server, software, databases, and virtualization, he’s considered one of the industry’s leading experts.
  • How a utilities company went from 'classic' to a Software Defined Infrastructure How a utilities company went from 'classic' to a Software Defined Infrastructure Luisa Rodriguez, Systems Engineer, Dell EMC Software Defined Division Recorded: Sep 21 2016 31 mins
    This real life case study will explain the challenges a utility company faced with a classic infrastructure, and the huge benefits gained from implementing a Software Defined solution.
  • Everything You Wanted To Know About Storage But Were Too Proud To Ask/Chartreuse Everything You Wanted To Know About Storage But Were Too Proud To Ask/Chartreuse J Metz, Cisco, Alex McDonald, NetApp, John Kim, Mellanox, Chad Hintz, Cisco, Fred Knight, NetApp Recorded: Sep 7 2016 56 mins
    Welcome to this first part of the webcast series, where we’re going to take an irreverent, yet still informative look, at the parts of a storage solution in Data Center architectures. We’re going to start with the very basics – The Naming of the Parts. We’ll break down the entire storage picture and identify the places where most of the confusion falls. Join us in this first webcast – Part Chartreuse – where we’ll learn:

    •What an initiator is
    •What a target is
    •What a storage controller is
    •What a RAID is, and what a RAID controller is
    •What a Volume Manager is
    •What a Storage Stack is

    With these fundamental parts, we’ll be able to place them into a context so that you can understand how all these pieces fit together to form a Data Center storage environment.

    Oh, and why are the parts named after colors, instead of numbered? Because there is no order to these webcasts. Each is a standalone seminar on understanding some of the elements of storage systems that can help you learn about technology without admitting that you were faking it the whole time! If you are looking for a starting point – the absolute beginning place – start with this one. We’ll be using these terms in all the other presentations.
  • Using your Load Balancer for Application Performance Monitoring Using your Load Balancer for Application Performance Monitoring Ashish Shah, Director of Product, Avi Networks Recorded: Aug 25 2016 47 mins
    Load balancers occupy an important position (in the path of application traffic) on the enterprise network. Yet, traditional application delivery controllers (ADCs) are unable to provide meaningful application insights to drive business decisions. Avi Networks’ software-defined architecture for load balancing separates the control plane (management layer) from the data plane (load balancers) to generate continuous insights about applications.

    In this 30 minute presentation from Avi Networks, learn how you can get rich analytics and actionable insights into end user experience, application performance, resource utilization, security, and anomalous behavior. See how you can benefit from:

    • A “Network DVR” to record and replay traffic events to pinpoint app issues
    • At-a-glance view of all virtual services throughout the system
    • Real-time visibility into DDoS attacks, SSL versions and ciphers used in transactions
    • Health scores that give you immediate feedback on application performance
  • The GRC Evolution of Digital Enterprises with Convergence of ERM & Cybersecurity The GRC Evolution of Digital Enterprises with Convergence of ERM & Cybersecurity Colin Whittaker, Informed Risk Decisions; Yo Delmar, MetricStream; Chris McClean, Forrester; Sanjay Agrawal, CIMCON Software Recorded: Aug 25 2016 62 mins
    Cybersecurity has jumped to the top of companies’ risk agenda after a number of high profile data breaches, and other hacks. In an increasingly digitized world, where data resides in the cloud, on mobiles and Internet of Things enabling multitude of connected devices, the threat vectors are multiplying, threatening the firms’ operations and future financial stability.

    Organizations with the ability to view cybersecurity breaches as a risk, with associated probabilities and impacts, can strike the right balance between resilience and protection. By bringing together leadership and capabilities across fraud, IT, cybersecurity and operational risk, organizations can connect the dots and manage their GRC program more effectively. Organizations need to employ a proactive approach to review their existing risk management processes, roles and responsibilities with respect to cybersecurity to re-align them into an overall ERM strategy with boardroom backing.

    Attend this panel webinar, as we discuss these issues and address ways to develop an evolving GRC program to cope with the growing threat landscape.
  • Traditional Storage vs. HCI: The Storage Admin’s Perspective Traditional Storage vs. HCI: The Storage Admin’s Perspective Jase McCarty, Technical Marketing Architect VMware Recorded: Aug 23 2016 38 mins
    Are you a storage admins running business-critical workloads on vSphere? Replacing a traditional storage environment with hyper-converged infrastructure (HCI) solutions can give you a simpler, more efficient way to manage resources—and eliminate the guesswork that often leads to overprovisioning.

    Learn what HCI can do to alleviate some pressure. We’ll discuss how VMware Virtual SAN 6.2 powers HCI with a new operational model for shared storage, including features that complement high-end SANS.

    By offloading just one virtualized workload from SAN to Virtual SAN, you can save more expensive SAN or NAS for higher value workloads.

    Topics in the webcast include:

    -The advantages of VM-centric, policy-based storage
    - Avoiding frequent storage requests for transient workloads
    - Simplifying capacity planning by scaling compute and storage in tandem
    - Focusing on optimizing production workloads

    Easy to learn, and with the broadest set of consumption models, see how Virtual SAN hyper-converged storage powers radically simple HCI solutions that solve critical problems for storage admins.

Embed in website or blog