The storage community on BrightTALK is made up of thousands of storage and IT professionals. Find relevant webinars and videos on storage architecture, cloud storage, storage virtualization and more presented by recognized thought leaders. Join the conversation by participating in live webinars and round table discussions.
Nope this is NOT another webinar on How to Protect Against Ransomware.
If you reckon that users (yes that includes you and me) are the first line of defence against ransomware! Sorry to break it to you but you are WRONG! We are all humans and we make mistakes and ransomware creators know that.
You have a choice.Hope and or pray that your awareness training protects your employees and your business from becoming a ransomware victim OR attend this webinar and learn what you can do to protect your business.
Note: This is not your typical webinar. Cyber Management Alliance’s unique and interactive approach to webinar’s allows everyone to have a say and share their knowledge. The host, Amar Singh firmly believes that every member of the audience has valuable input and that each attendee brings their own context and perspective. So, join in, share and learn.
Next-generation sequencing (NGS) technology has brought an influx of large-scale data and ever-growing demands for compute, resulting in a challenge for those in science informatics. To overcome these issues, laboratories need to be able to support researchers while managing data and the infrastructure needed to deliver mission-critical results and ultimately, positive patient outcomes.
At the NGS Data Analysis and Informatics Conference in February, attendees spoke about these challenges at length. This webinar, built from content shared at the event, will review potential approaches to cost-effective data growth using cloud compute and storage. Moving genomics workloads to the cloud can provide scale and affordability, while optimizing investments in existing resources. Adding that ability to allow researchers to easily collaborate while reducing latencies to these resources is pertinent to usability.
In this webinar, you’ll learn how to:
- Increase computation potential
- Optimize your physical infrastructure
- Diagram common use cases to meet specific research goals
- Increase flexibility by limiting data gravity
Quantum and Interica have teamed together to provide cost effective archive solutions, with responsive access to project content, data durability and seamless longevity of your highly valued digital assets. And yes, the solution includes cloud storage.
In about 30 minutes we will describe the solution and answer your questions about how you can integrate these solutions into your infrastructure.
Join Quantum and Interica for this joint webinar and learn:
•How to implement an effective project archive
•How easy it is to add cloud storage to your environment
•What are key trade-offs between private and public cloud
This webinar discusses how advances in all-flash storage technology can help improve the acceleration of Electronic Design Automation (EDA) and high performance workloads. It highlights current issues with storage bottlenecks in these environments and its impact on productivity. And then it covers a quick overview of FlashBlade, a revolutionary new storage system for high performance and high concurrency workloads that will drive tomorrow's next generation chip designs.
If you are starting to explore what Hyperconverged adoption could bring your business, then this is the webinar for you. Packed with hints and tips helping you to ascertain if it’s right for you, pitfalls to avoid and a typical, real-life hyperconverged install
We're generating data faster than we know how to use it - from the billion of smartphone users taking pictures and recording videos to the life sciences world, where genome sequencing could generate 2 to 40 Exabyte of storage by 2025.
If you are looking to better manage your mountains of data, build a future proof data lake, and/or use big data and analytics to improve time to business insight this webinar is for you! In this webinar we will discuss:
· Customer pain points around data growth
· Status quo on existing solutions and their challenges
· Value proposition of our big data & analytics solution
· Use case #1: Manufacturing
· Use case #2: Lifesciences
· Suggest easy next steps
You will leave this webinar understanding how the flexibility and scalability of our big data and analytics solutions are ideal for companies facing exponential data growth, across all industry verticals. It is time to turn your mountains of data into mountains of insight and business value.
For most enterprises, optimizing your Windows fileserver means buying a new, bigger server with more capacity and better network connections. Or it means buying a dedicated Network Attached Storage (NAS) system. Then they feel they need to add new ransomware and data protection software. All of these "solutions" are expensive, involve a costly data migration and don't really increase IT efficiency. In this webinar, experts from Storage Switzerland and Caringo will teach you how data management can eliminate the need for additional Windows file servers, capacity and protection.
What’s in a number? Well, when that number is 10 billion, I’d say it can mean quite a lot.
For some, 10 billion represents:
- The number of photos posted on Facebook (by 2008)
- The number of song downloads from Apple iTunes (by 2010)
- The number of Tweets issued by Twitter (by 2010)
- The number of times Shazam was used to tag songs (by 2013)
- The number of monthly emails being sent by MailChimp (by 2014)
- The number of monthly music video views on VEVO (by 2015)
- The number of quarterly streaming hours of content on Netflix (by 2015)
For Qumulo, we like to demonstrate how and why our customers create and manage 10+ billion files (in 1.2 million directories) in a single scale-out file system.
Join David Bailey, Qumulo’s Director of Systems Engineering, for this demo, and see why customers call Qumulo Core scale-out storage “the smartest storage product ever built.”
Storage that is protects itself aids in the data protection and disaster recovery processes without compromising traditional primary storage performance and features. It does this through a combination of its own capabilities (snapshots, basic replication as well as multi-site and synchronous replication) and by complementing or enhancing existing backup solutions – but not replacing them. While many storage systems have replication capabilities, self-protecting primary storage differs in the implementation of those replication tasks, the number of locations that can be a part of that task and the monitoring of those tasks to ensure successful completion.
Are you weary from fighting malware, ransomware, and other threats that your ineffective and tired antivirus software can’t stop?
If so, join us for our webinar, “Top Reasons Why Your Antivirus Isn’t Working Anymore” to hear why it’s time to rise up and overthrow traditional, reactive antivirus solutions in favor of proactive endpoint protection powered by artificial intelligence (AI).
During this webinar, you will see a live demo of AI in action with CylancePROTECT®, and cover the key reasons why your current antivirus solution probably isn’t working anymore:
- It’s Reactive: Legacy, signature-based antivirus products cannot prevent malware from executing. Cylance AI technology protects before the machine is infected.
- It’s Ineffective: Legacy security tools perform at a 70 – 90% success rate. Cylance routinely performs with near perfect efficacy, at 99%+.
- It’s Burdensome: On average, traditional endpoint security products use 50% to over 70% of CPU cycles during intensive scans. CylancePROTECT is outstandingly lightweight at just 1% – 3% CPU utilization.
- It’s Costly: Signature-based antivirus solutions impact the bottom line with more layers of unproductive technology. Cylance protects with a single agent and a single cloud-based management tool, and that translates into big cost savings.
If your organization is embarking on a refresh of your primary storage system this year, this is the one webinar that you will want to attend. IT evaluators that haven't looked at storage in a few years, will be impressed the use of flash to improve performance, while many claim to integrate file (NFS, SMB) and block (iSCSI, Fibre) protocols. These features though are now table stakes for the modern storage solution.
While all of these features are important (and not created equal), IT professionals should demand capabilities that solve today's organizational challenges like eliminating shadow IT, improving multi-site productivity and long term data retention as well as meeting increasingly strict compliance standards. IT professionals should look for not only high performance and universal protocol support but also enterprise file sync and share, inter-data center sync and secure archive with compliance.
What are the top 10 barriers to DevOps adoption and best practices to overcome these barriers.
Quali conducted a survey of 2045 professionals to gauge the state of DevOps and Cloud adoption, pain points and best practices. The survey concluded on Dec 31st 2016. This presentation will share the key insights from the survey, top 10 barriers to DevOps adoption as well as best practices that can help overcome these barriers. This will be an informative session for DevOps and Cloud architects, application owners, technologists as well as IT infrastructure professionals that are responsible for planning and deployment of DevOps tools and processes.
Quali builds software to create cloud sandboxes – these are on-demand, self-service environments that can automate and orchestrate Cloud and DevOps deployments.
You know 60%+ of data in your organization is inactive or cold, yet it continues to consume expensive primary storage resources. Cloud offers an opportunity to store this cold data and achieve 70%+ savings – but how do you identify the cold data and who owns it, who is using it, and move it without any disruption to users or applications?
Join this webinar to learn:
- How data is growing and being used across your storage (NFS and SMB/CIFS) using software from Komprise, a Google Cloud Technology partner
- How to project ROI of moving cold data to Google Cloud Storage based on your policies
- How to move data transparently to Google Cloud Storage without changing file-based access for users and applications
Webinar attendees will qualify for a special free trial (up to 100TB) to get a customized analysis of your storage environment and ROI of moving to the cloud
To learn more about Komprise and Google cloud storage, click here: https://www.komprise.com/google/
Caringo Product Manager Ryan Meek explains how object storage can be used for storing digital evidence and the benefits of using it as a secure, compliant repository for use in law enforcement, government, and health IT use cases.
Disaster Recovery as a Service (DRaaS) is changing the way data center administrators think about disaster recovery. A DR site and equipment no longer need to be bought in advance. DRaaS instead enables DR to be on-demand. The concept is so appealing that vendors are racing into the market claiming to offer DRaaS capabilities. But DRaaS is more than a simple check mark for a DR requirement. Organizations need to realize that how well the service performs is critical to successfully surviving a disaster.
Digital transformation is the new imperative but easier said than done. Watch this video as Hitachi Data Systems CTO for Asia Pacific, Russell Skingsley explains how to create business value with the right data foundation.
Russell delves into the details of a successful enterprise data strategy that accelerates access, agility and value of your existing data, drawing on real world use cases of organisations that have achieved digital maturity around the world.
You will also hear from Paul Bruton, Solutions Director, Content and Data Analytics about the emerging technologies for intelligent data discovery to improve workforce productivity and surface actionable business insights.
Exchange to system pocztowy, którego awaria jest błyskawicznie zauważana przez użytkowników biznesowych.
Zapraszam na krótką 30-minutową sesję w trakcie której:
•Porównany różne metody zabezpieczenia środowisk Exchange.
•Zobaczymy jak użytkownicy sami mogą odtwarzać pojedyncze maile.
•Przyjrzymy się kosztom wdrożenia poszczególnych podejść.
Całość uatrakcyjni pokaz demo.
The time has come to modernize NAS so that it meets the realities of data growth, the demands for data retention and the mobility of the modern workforce. Watch George Crump, lead analyst at Storage Switzerland in this ChalkTalk Video on how to modernize NAS.
W trakcie tej sesji zostaną przedstawione założenia, które stały u podstaw zbudowania przez firmę Dell EMC rewolucyjnego i otwartego sieciowego systemu operacyjnego znanego pod kryptonimem OS10. Omówiona zostanie jego architektura, funkcjonalności oraz praktyczne zastosowania. System OS10 to nastepny krok w promowanej od 3 lat przez firmę Dell idei otwartej sieciowości (Dell EMC Open Networking) rozdzialając i standaryzując obecnie już nawet warstwy w samym sieciowym systemie operacyjnym!
Storage Switzerland will tackle one of the biggest challenges facing IT professionals today during a special, live podcast. We will explain what vendors mean when they use terms like converged, hyperconverged, hybrid cloud, instant recovery, continuous data protection, the list goes on. Its confusing because many vendors use the same terms to describe different capabilities or technologies. Join to Storage Switzerland and we’ll sort the whole thing out. You, the listener, get to drive the conversation. You'll vote for the terms you want to discuss and we'll talk about them!
Join Peter McCallum and Gavin McLaughlin as they reconvene for part two in their discussion series on the state of the modern storage industry. For this segment, Gavin and Pete will discuss the convoluted reality of white-box or commodity storage hardware, and how it couples with software to provide real storage services for businesses. Ultimately, this overview should arm you with the concepts to look for as you shop across build-it-yourself, packaged open-source, decoupled heterogeneous, and proprietary storage paradigms. We’ll look at cost factors, gotchas, and key considerations as we review the incumbent and new players in our industry.
Are you considering converged infrastructure, but unsure how it can be protected? Look no further. Cisco has just released an end-to- end, Cisco Validated Design (CVD), leveraging Commvault Data Protection. FlashStack now offers industry-leading Commvault data protection running on UCS Servers, for protection of all FlashStack supported applications.
According to IDC, Commvault Data protection software delivers:
1. 42–52% reduction in annual spending on data infrastructure, software, services, and compliance
2. 47–62% reduction in weekly administrative hours across cloud, disaster recovery (DR), backup, snapshots, discovery, reporting, and scripts
3. 15–30% reduction in data management point solutions
4. 55% reduction in annual unplanned downtime
Join us on April 4th for an exclusive webinar hosted jointly by Pure Storage and Commvault where you’ll learn:
1 How FlashStack compares to other converged infrastructure platforms.
2 What applications can be deployed and protected on FlashStack, combined with Commvault Data Protection.
Server Message Block (SMB) is the core file-transfer protocol of Windows, MacOS and Samba, and has become widely deployed. It’s ubiquitous - a 30-year-old family of network code.
However, the latest iteration of SMB3 is almost unrecognizable when compared to versions only a few years old. Extensive reengineering has led to advanced capabilities that include multichannel, transparent failover, scale out, and encryption. SMB Direct makes use of RDMA networking, creates block transport system and provides reliable transport to zetabytes of unstructured data, worldwide.
SMB3 forms the basis of hyper-converged and scale-out systems for virtualization and SQL Server. It is available for a variety of hardware devices, from printers, network-attached storage appliances, to Storage Area Networks (SANs). It is often the most prevalent protocol on a network, with high-performance data transfers as well as efficient end-user access over wide-area connections.
In this SNIA-ESF Webcast, Microsoft’s Ned Pyle, program manager of the SMB protocol, will discuss the current state of SMB, including:
•Brief background on SMB
•An overview of the SMB 3.x family, first released with Windows 8, Windows Server 2012, MacOS 10.10, Samba 4.1, and Linux CIFS 3.12
•What changed in SMB 3.1.1
•Understanding SMB security, scenarios, and workloads
•The deprecation and removal of the legacy SMB1 protocol
•How SMB3 supports hyperconverged and scale-out storage
Red Hat® OpenShift Container Platform is a complete container application platform that provides all aspects of the application development process in one consistent solution that can span across multiple infrastructure footprints. OpenShift integrates all the architecture, processes, platforms, and services needed to help development and operations teams traverse traditional siloed structures and produce applications that help businesses to succeed.
Using OpenShift with Project Trident, NetApp’s open-source dynamic storage provisioner, extends this experience to simplify and automate persistent storage volumes. Trident's integration with OpenShift allows infrastructure teams to define storage capabilities while simultaneously enabling application teams to consume storage based on their needs - when they need it, where they need it, and how they need it.
Learn how OpenShift and NetApp Project Trident can empower the development and deployment of applications in an environment which meets customers’ needs with simplicity and ease.
Healthcare & Life Sciences are transforming to become more precise, personalized and outcome-based. This involves analyzing a variety of different patient data, one of the most important being genomics data. Analyzing and managing this is a huge challenge for IT departments.
Edico Genome, creator of the world’s first bio-IT processor designed to analyze next-generation sequencing (NGS) data, and Dell EMC have collaborated to offer an end-to-end solution: with ability to manage PBs of data, & offer rapid, cost-effective and accurate analysis of NGS data.
Join the Dell EMC & Edico Genome webcast, & learn how you can analyze a whole human 30x genome in as little as 22 minutes.
Fibre Channel is the most well known dedicated storage networking protocol in use in data centers today, and is considered the gold standard for storage in terms of availability, reliability, and scalability. However, it does require some specific design and planning requirements. For that, storage administrators use the Fibre Channel Speedmap in order to plan.
In this webcast, you will learn how to use the Fibre Channel Speedmap, what the numbers mean, and why its useful:
- Why do storage administrators use the Speedmap?
- What’s the difference between throughput, bandwidth, baud rates, and speed?
- Why does this matter for Fibre Channel and not, say, Ethernet?
This live webcast will be useful for anyone who wants to separate the wheat from the chaff when it comes to “speeds and feeds,” and make sense of the numbers.
Today’s IT professional is stuck in the middle of a file sharing tug of war. One side has the end users who want the improved productivity that mobility and collaboration promises. The other side consists of corporate governance that wants to eliminate data breaches and improve data protection. In this live webinar, join experts from Storage Switzerland, CTERA and IBM as we discuss the "5 Must-Haves" so IT can make both sides of the issue happy while at the same time making its job easier.
A familiar buzz word over the past few years has been the Internet of Things (IoT). We have all heard the talk about it being the next big thing, its massive growth potential and the benefits to everyone. The IoT will generate more data, connect more devices and enable more users, and somehow these interactions will be safe and secure.
We take a pragmatic view of IoT, cutting through the hype to uncover the core objective. Furthermore, we take a persona based approach to IoT security, and have identified four main ones: cloud service providers, consumers, device makers and third-party service providers. Each persona faces the obstacle of securing different parts of the ecosystem whether its access, the device, data and/or the user. However, it is necessary that security is provided holistically, as the weakest security link in the chain could compromise it all. In addition to security, the personas are used to demonstrate the ‘Stages of IoT’ from the digital identity of physical products to actualization of new business opportunities. No matter what persona in the IoT ecosystem you are (or are not), the webinar cuts through the hype to understand the real business opportunities and share with attendees the technology tool box (predictive analytics, security, connectivity, data collection and business intelligence) to create and improve services and leverage the generated data internally and externally.
Join us for the webinar, “IoT Security Over Tea: Steeping out the Hype”, to learn more about:
•A grounded perspective on IoT
•Why IoT security matters for everyone
•The persona analysis of IoT security
•Key considerations as it begins to take off
•How to protect what matters most to you
Modern release management teams pride themselves on setting up a seamless workflow for continuous integration and delivery. However, continuous testing – which is one of the most critical components of the workflow is often taken for granted or marginalized without clear ownership leading to impediments in quality. With the advent of DevOps and the movement to break down silos between developers and operations, it becomes critically important that all members of an IT team - regardless of what tools they use, or role they play - understand the essentials of continuous testing.
The Always-on Enterprise is a data center that faced with even the most severe disaster can return applications to full working order in a matter of minutes. Service level objectives (SLOs) are the means by which IT and the organization communicate how the protection and recovery process will work. The challenge is the status quo SLO won't meet the new "always-on" expectation. You need to protect data more frequently, recover more rapidly and provide better performance in the recovered state.
It is time for IT to re-think SLOs and the solutions to meet them. Join experts from Storage Switzerland, Veeam and NetApp as they review the NEW SLO requirements and how you can meet those requirements while controlling costs.
Lenovo and DataCore have collaborated to create a Software-defined Storage (SDS) appliance. This validated, turnkey appliance provides easy scalability and single pane management at a fraction of the cost of legacy systems—without trade-offs in availability, reliability or functionality.
Join this webinar to learn more about the Lenovo Storage DX8200D Powered by DataCore.
and How To Start Winning
Organizations managing data have a competitive advantage over organizations that don't. But most organizations don't have the time or tools available to implement a successful data management strategy. It’s not for a lack of trying. Many organizations fight a losing battle when trying to implement a data management solution. In this webinar Storage Switzerland and Dternity/StrongBox Data Solutions will discuss the three reasons why organizations are losing the data management battle, and provide guidance on how to start winning the battle.
DataON MUST provides infrastructure visibility and management for Microsoft’s new suite of software-defined storage stack technologies like Storage Spaces Direct (S2D), Storage Replica, and Storage quality of service (QoS) which, based on your policy, monitors hardware and software storage infrastructure to identify potential problems.
In this webinar, we’ll show you how MUST provides on-demand access to curated collections of hyper-converged clusters, storage performance, and capacity metrics:
• Dashboard-level metrics
• System alerts based on Health Service faults
• Automated email services for administrators
• OOBE wizard for cluster configuration and setup
• Mobile-friendly user interface
The massive opening shot to the hit movie La La Land presented a unique and highly complicated challenge. At more than five minutes long and over 8,000 frames, the opening sequence dwarfs the film industry’s average of two to five seconds and a hundred frames between cuts.
Powerhouse visual effects studio Crafty Apes- known for films like Marvel's Doctor Strange and Disney's Pete's Dragon- turned to Qumulo to deliver cost-effective performance, scalability and support for this Academy Award winning film.
In this webinar, Anh Quach, Qumulo Director of Customer Success, and 12-year media & entertainment tech veteran, tells the true Hollywood story of creative challenge and technical breakthrough that contributed to 7 Golden Globes and 5 Academy Awards.
Public Key Infrastructure (PKI) is a well-known security protocol used by some of the world’s largest governments and top enterprises, but it’s a technology that also affords many possibilities in new and growing industries. Even small to medium sized businesses can greatly benefit from PKI. However, PKI is also often mistakenly perceived as being difficult to deploy. Gemalto is addressing this common misconception. The next webinar in our PKI series, DIY PKI, will walk attendees through the entire process of setting up a PKI environment and how to manage it. We have developed a five step process to make it easy for security professionals to get their PKI system up and running with minimal time spent. The five step implementation method will give you an idea of how to set up a two tier Microsoft PKI infrastructure with Gemalto SafeNet Authentication Manager and SafeNet Luna HSM to perform smart card log on for small to medium sized enterprises.
Attendees of the DIY PKI webinar will see in five simple steps how to:
-Install and configure a Hardware Security Module (HSM)
-Install the root CA and configure it with the HSM
-Install and configure the issuing CA
-Configure the permissions of users and create certificate templates
-Install and configure an authentication manager
For the purpose of this webinar and using Gemalto’s five step propriety approach, we will use our SafeNet line of technologies, however attendees will be able to see firsthand how PKI technology has evolved into a do it yourself or service based model, making upgrading, implementing or scaling your PKI infrastructure easier to meet the demands of new and innovative technologies.
Many organizations are looking to virtual desktops and apps to improve productivity, security, and control — but building infrastructure for large-scale Citrix XenDesktop and XenApp deployments can be challenging. While some infrastructure approaches are limited in reliability or ability to scale, this session will present a highly performant, highly available and easy to manage approach to Citrix XenDesktop and XenApp deployments with the FlashStack Converged Infrastructure from Cisco and Pure Storage. In this session, Cisco and Pure Storage VDI solution architects will share test results of a recent Cisco Validated Design for FlashStack with XenDesktop and XenApp for 5000 users. Specifically discussed is how real world users can quickly deploy Citrix virtual apps and desktops, scale performance with user demand, and keep costs low through a repeatable, reliable converged infrastructure approach to VDI. This is also the first FlashStack CVD using Windows® 10 64-bit and Office® 2016 as the base OS desktop and Office Suite, respectively, proving that FlashStack delivers the horsepower needed to power the latest innovations from Microsoft.
In this webinar, you will learn how to:
Successfully deploy Citrix XenDesktop and XenApp at scale faster to support high-productivity user workspaces
Leverage the power of Cisco UCS stateless computing to deploy your network, storage and compute faster and more consistently than any other platform on the market
Leverage FlashStack to complement Citrix by keeping virtual desktops and apps online and high-performing with minimal admin effort