Hi [[ session.user.profile.firstName ]]

SNIA Webcasts

  • Date
  • Rating
  • Views
  • Healthcare privacy and data protection regulations are among the most stringent of any industry. Join this Webcast to learn how healthcare organizations can securely share health data across different cloud services. Hear experts explore how Encrypted Objects and Delegated Access Control Extensions to the Cloud Data Management Interface (CDMI) standard permits objects to freely and securely move between clouds and clients with enhanced security and auditability.
    You’ll learn:
    •Protecting health data from alteration or disclosure
    •How Cloud Encrypted Objects work
    •How Delegated Access Control works
    •CDMI for Electronic Medical Records (EMR) applications
    •Healthcare use cases for implementing securely sharing data in the cloud
  • NVMe (Non-Volatile Memory Express) over Fabrics is of tremendous interest among storage vendors, flash manufacturers, and cloud and Web 2.0 customers, Because it offers efficient remote and shared access to a new generation of flash and other non-volatile memory storage, it requires fast, low latency networks, and the first version of the specification is expected to take advantage of RDMA (Remote Direct Memory Access) support in the transport protocol.

    Many customers and vendors are now familiar with the advantages and concepts of NVMe over Fabrics but are not familiar with the specific protocols that support it. This live webcast will explore and compare the Ethernet RDMA protocols and transports that support NVMe over Fabrics and the infrastructure needed to use them. You’ll hear:

    •Why NVMe Over Fabrics requires a low-latency network
    •How the NVMe protocol is mapped to the network transport
    •How RDMA-capable protocols work
    •Comparing available Ethernet RDMA transports: iWARP and RoCE
    •Infrastructure required to support RDMA over Ethernet
    •Congestion management methods
  • Your encrypted data is only as secure as your encryption keys. A strong encryption key management strategy is essential for a comprehensive security policy, as well as meeting compliance requirements. Attendees of this presentation will learn:

    - Principles and best practices for encryption key management including key management, key storage, secure key retrieval, key escrow, key mirroring, industry standards, compliance guidelines, and system audit
    - Why certifications are important for meeting compliance regulations such as PCI-DSS and HIPAA/HITECH
    - How key management systems work and how to evaluate vendor solutions.

    This is a non-technical session but will be of value to developers and implementers. Attendees will learn the core principles of effective and secure encryption key management. These principles can be used in developing in-house key management solutions or in evaluating vendor solutions.

    What you'll learn:

    - What is encryption key management and why is it important?
    - Principles of industry-standard key management
    - Industry must-haves for effective key management
    - Challenges of home grown key management solutions
    - Important certifications for meeting compliance and evaluation vendors
  • Non-volatile Dual In-line Memory Modules (NVDIMMs) have emerged as a go-to technology for boosting performance for next generation storage platforms. The standardization efforts around NVDIMMs have paved the way to simple, plug-n-play adoption. If you're a developer or integrator who hasn't yet realized the benefits of NVDIMMs in your products, this presentation from the SNIA NVDIMM Special Interest Group is for you!. Learn about the different kinds of NVDIMMs and their functionality, applications, and benefits. You'll come away with an understanding of how NVDIMMs fit into the persistent memory landscape.
  • Non-Volatile Memory Express (NVMe) has piqued the interest of many people in the storage world. Using a robust, efficient, and highly flexible transportation protocol for SSDs, Flash, and future Non-Volatile Memory storage devices, the NVM Express group is working on extending these advantages over a networked Fabric.
    This live Webcast will explain not only what NVMe over Fabrics is, but also specifically pay attention to how it works. We’ll be exploring:
    •Key terms and concepts
    •Differences between NVMe-based fabrics and SCSI-based fabrics
    •Practical examples of NVMe over Fabrics solutions
    •Important future considerations

    Come join us as we discuss the next iteration of NVMe.
  • Digital storage plays a significant role in the professional media and entertainment industry. As the resolution and frame rate for video increase flash memory is staring to play a significant role for content capture, post production and content delivery. This presentation will include material from the 2015 Digital Storage in Media and Entertainment Report from Coughlin Associates (and the associated 2015 digital media professional survey) on the growing use of flash memory in all aspects of professional media and entertainment and put flash use in context with other storage technologies in this industry. As the price and availability of flash memory grows flash memory will enable future generations of media that is even more immersive than today as video moves to 8K and virtual reality begins to play an increasing role in entertainment.
  • This tutorial covers technologies introduced by popular papers about Google File System and BigTable, Amazon Dynamo or Apache Hadoop. In addition, Parallel, Scale-out, Distributed and P2P approaches with Lustre, PVFS and pNFS with several proprietary ones are presented as well.

    This tutorial adds also some key features essential at large scale to help understand and differentiate industry vendor's offerings.
  • When we talk about “Storage” in the context of data centers, it can mean different things to different people. Someone who is developing applications will have a very different perspective than, say, someone who is responsible for managing that data on some form of media. Moreover, someone who is responsible for transporting data from one place to another has their own view that is related to, and yet different from, the previous two.
    Add in virtualization and layers of abstraction, from file systems to storage protocols, and things can get very confusing very quickly. Pretty soon people don’t even know the right questions to ask!
    How do applications and workloads get the information? What happens when you need more of it? Or faster access to it? Or move it far away? This webinar will take a step back and look at “storage” with a “big picture” approach, looking at the whole piece and attempt to fill in some of the blanks for you. We’ll be talking about:
    - Applications and RAM
    - Servers and Disks
    - Networks and Storage Types
    - Storage and Distances
    - Tools of the Trade/Offs
    The goal of the webinar is not to make specific recommendations, but equip the viewer with information that helps them ask the relevant questions, as well as get a keener insight to the consequences of storage choices.
  • Governments across the globe are proposing and enacting strong data privacy and data protection regulations by mandating frameworks that include noteworthy changes like defining a data breach to include data destruction, adding the right to be forgotten, mandating the practice of breach notifications, and many other new elements. The implications of this and other proposed legislation on how the cloud can be utilized for storing data are significant. Join this live Webcast to hear:

    •EU “directives” vs. “regulation”
    •General data protection regulation summary
    •How personal data has been redefined
    •Substantial financial penalties for non-compliance
    •Impact on data protection in the cloud
    •How to prepare now for impending changes
  • There are various new ways to perform data protection using the Cloud and many advantages of using the Cloud this way. However, IT managers need to carefully study all the alternative approaches and the experiences of others (good and bad) to avoid the pitfalls, especially during the transition from strictly local resources to cloud resources. In this live Webcast we will discuss:
    •Critical cloud data protection challenges
    •How to use the cloud for data protection
    •Pros and cons of various cloud data protection strategies
    •Experiences of others (good and bad) to avoid common pitfalls
    •Cloud standards in use – and why you need them

    The short presentation will be followed by a panel discussion with audience participation.

Embed in website or blog