Hi [[ session.user.profile.firstName ]]

Object Storage 201 - Understanding Architectural Trade-Offs

Object-based storage systems are fast becoming one of the key building blocks for a cloud storage infrastructure addressing shortcomings of traditional file- and block-based storage for unstructured data. Object storage systems are helping organizations gain much-needed control over managing the tremendous growth of unstructured data.

An object storage system design must accommodate growth, flexible provisioning, support multiple geographies, and cope with failure. How the data on these systems is organized and managed is key to performance and SLAs.

In this Webcast, experts from the SNIA Cloud Storage Initiative will discuss:

• The Evolution of Data Placement

• Design Considerations

• Pros and Cons of Hash Tables and Key-Value Databases

• And more

Register now! This live Webcast will take an unbiased, deep dive

into design considerations for an object storage architecture.
Recorded Oct 16 2014 65 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Paul Levy, System's Engineer & Architect, Intel; Vishnu Vardan, Senior Manager - Object Storage, NetApp
Presentation preview: Object Storage 201 - Understanding Architectural Trade-Offs

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Technology Implications of Internet of Payments Oct 14 2020 5:00 pm UTC 75 mins
    Glyn Bowden, HPE; Richard George, Health Life Prosperity Shared Ltd; Jim Fister, The Decision Place
    Electronic payments, once the purview of a few companies, have expanded to include a variety of financial and technology companies. Internet of Payment (IoP) enables payment processing over many kinds of IoT devices and has also led to the emergence of the micro-transaction. The growth of independent payment services offering e-commerce solutions, such as Square, and the entry of new ways to pay, such as Apple Pay mean that a variety of devices and technologies also have come into wide use.

    Along with the rise and dispersal of the payment eco-system, more of our assets that we exchange for payment are becoming digitized as well. When digital ownership is equivalent to physical ownership, security and scrutiny of those digital platforms and methods takes a leap forward in significance.

    Assets and funds are now widely distributed across multiple organizations. Physical asset ownership is even being shared between many stakeholders resulting in more ownership opportunities for less investment but in a distributed way.

    In this talk we look at the impact of all of these new principles across multiple use cases and how it impacts not only on the consumers driving this behavior but on the underlying infrastructure that supports and enables it. We will look particularly at:

    •The cloud network, applications and storage implications of Internet of Payments
    •Use of emerging blockchain capabilities for payment histories and smart contracts
    •Identity and security challenges at the device in addition to point of payment
    •Considerations on architecting IoP solutions for future scale
  • Using Data Literacy to Drive Insight Sep 17 2020 6:00 pm UTC 75 mins
    Glyn Bowden, HPE; Jim Fister, The Decision Place
    The pandemic has taught data professionals one essential thing. Data is like water when it escapes; it reaches every aspect of the community it inhabits. This fact becomes apparent when the general public has access to statistics, assessments, analysis and even medical journals related to the pandemic, at a scale never seen before.
    Insight understands information in context to the degree that you can gain an understanding beyond just the facts presented and instead make reasonable predictions and suppositions about new instances of that data.
    Having access to data does not automatically grant the reader knowledge of how to interpret that data or the ability to derive insight. It is even challenging to judge the accuracy or value in that data.
    The skill required is known as data literacy, and in this presentation, we will look at how access to one data source will inevitably drive the need to access more. We will examine:
    •How data literacy is defined by the ability to interpret and apply context
    •What supporting information is needed
    •How a data scientist approaches new data sources and the questions they ask of it
    •How to seek out supporting or challenging data to validate its accuracy and value for providing insight
    •How this impacts underlying information systems and how data platforms need to adjust to this purpose+ data eco-system where data sources are no longer single use
  • Optimizing NVMe over Fabrics Performance with Different Ethernet Transports Sep 16 2020 5:00 pm UTC 75 mins
    Fred Zhang, Intel; Eden Kim, Calypso Systems; David Woolf, UNH-IOL; Tom Friend, Illuminosi
    NVMe over Fabrics technology is gaining momentum and getting more tractions in data centers, but there are three kinds of Ethernet based NVMe over Fabrics transports: iWARP, RoCEv2 and TCP. How do we optimize NVMe over Fabrics performance with different Ethernet transports?

    Setting aside the consideration of network infrastructure, scalability, security requirement and complete solution stack, this webcast will explore the performance of different Ethernet-based transport for NVMe over Fabrics at micro benchmark level. We will show three key performance indicators: IOPs, Throughput, and Latency with different workloads including: Sequential Read/Write, Random Read/Write, 70%Read/30%Write, with different data size. We will compare the result of three Ethernet based transports: iWARP, RoCEv2 and TCP.

    Further, we will dig a little bit deeper to talk about the variables that will impact the performance of different Ethernet transports. There are a lot of variables that you can tune but these variables will impact the performance of each transport to different extents. We will cover the variables:
    1.How many CPU cores are needed (I’m willing to give)?
    2.Optane SSD or 3D NAND SSD?
    3.How deep should the Q-Depth be?
    4.Why do I need to care about MTU?

    This discussion won’t tell you which transport is the best. Instead we unfold the performance of each transport and tell you what it would take for each transport to get the best performance, so that you can make the best choice for your transport for NVMe over Fabrics solutions.
  • Composable Infrastructure and Computational Storage Sep 15 2020 5:00 pm UTC 75 mins
    Moderator: Alex McDonald, SNIA CMSI Co-Chair; Presenters: Eli Tiomkin, NGD Systems; Philip Kufeldt, Seagate Technology
    In this webcast, SNIA experts will discuss what composable infrastructure is, what prompted its development, solutions, enabling technologies, standards/products and who computational storage fits in.
  • Compression: Putting the Squeeze on Storage Sep 2 2020 6:00 pm UTC 75 mins
    John Kim, NVIDIA; Brian Will, Intel; Ilker Cebeli, Samsung
    Everyone knows data volumes are exploding faster than IT budgets. And customers are increasingly moving to flash storage, which is faster and easier to use than hard drives, but still more expensive. To cope with this conundrum and squeeze more efficiency from storage, storage vendors and customers can turn to data reduction techniques such as compression, deduplication, thin provisioning and snapshots. This webcast will specifically focus on data compression, which can be done at different times, at stages in the storage process, and using different techniques. We’ll discuss:

    •Where compression can be done: at the client, on the network, on the storage controller, or within the storage devices
    •What types of data should be compressed
    •When to compress: real-time compression vs. post-process compression
    •Different compression techniques
    •How compression affects performance

    Tune in to this compact and informative SNIA webcast, which packs in copious content .
  • The Key to Value: Understanding the NVMe Key-Value Standard Sep 1 2020 5:00 pm UTC 75 mins
    Bill Martin; Samsung; John Kim, NVIDIA
    The storage industry has many applications that rely on storing data as objects. In fact, it’s the most popular way that unstructured data is accessed. At the drive level, however, the devil is in the details. Normally, storage devices store information as blocks, not objects. This means that there is some translation that goes on between the data as it is consumed (i.e., objects) and the data that is stored (i.e., blocks).

    Naturally, being efficient means that there are performance boosts, and simplicity means that there are fewer things that can go wrong. Moving towards storing key value pairs that get away from the traditional block storage paradigm make it easier and simpler to access objects.

    Both The NVM Express™ group and SNIA have done quite a bit of work in standardizing this approach:

    •NVM Express™ has completed standardization of the Key Value Command Set
    •SNIA has standardized a Key Value API
    •Spoiler alert: these two work very well together!

    What does this mean? And why should you care? That’s what this webinar is going to cover! This presentation will discuss the benefits of Key Value storage, present the major features of the NVMe-KV Command Set and how it interacts with the NVMe standards. It will also cover the SNIA KV-API and open source work that is available to take advantage of Key Value storage.

    We’ll be going deep under the covers to discuss:
    •How this approach is different than traditional block-based storage
    •Why doing this makes sense for certain types of data (and, of course, why doing this may not make sense for certain types of data)
    •How this simplifies the storage stack
    •Who should care about this, why they should care about this, and whether or not you are in that group
  • Does Your Storage Need a Cyber Insurance Tune-Up? Aug 27 2020 5:00 pm UTC 75 mins
    Eric Hibbard, SNIA Security Technical Work Group Chair; Casey Boggs, ReputationUS; Paul Talbut, SNIA EMEA
    Protection against cyber threats is recognized as a necessary component of an effective risk management approach, typically based on a well-known cybersecurity framework. A growing area to further mitigate risks and provide organizations with the high level of protection they need is cyber insurance. However, it’s not as simple as buying a pre-packaged policy.

    This webcast will provide an overview of how cyber insurance fits in a risk management program. It will identify key terms and conditions that should be understood and carefully negotiated. Cyber insurance policies may not cover all types of losses, so it is critical to identify what risks and conditions are excluded from a cyber insurance policy before you buy.

    Join this webcast to learn:
    •General threat tactics, risk management approaches, cybersecurity frameworks
    •How cyber insurance fits within an enterprise data security strategy
    •Nuances of cyber insurance – exclusions, exemption, triggers, deductibles and payouts
    •Challenges associated with data stored in the cloud
  • IT Modernization with AIOps: The Journey Aug 25 2020 5:00 pm UTC 75 mins
    Parviz Peiravi, Intel; Alex McDonald, NetApp
    The almost overnight shift of resources toward remote work introduces the need for far more flexible, dynamic and seamless end-to-end applications, putting us on a path that requires autonomous capabilities using AIOps – Artificial Intelligence for IT Operations.

    This webcast will provide an overview of concepts and strategies to accelerate the digitalization of critical enterprise IT resources, and help architects rethink what applications and underlying infrastructure are needed to support an agile, seamless end-to-end data centric environment.  This session will specifically address migration from monolithic to microservices, transition to Cloud Native services, and the platform requirements to help accelerate AIOps application delivery within our dynamic hybrid and multi-cloud world.   

    Join this webcast to learn:

    • Use cases and design patterns: Data Fabrics, Cloud Native and the move from Request Driven to Event Driven

    •    Foundational technologies supporting observability: how to build a more consistent scalable framework for governance and orchestration

    •    The nature of an AI data centric enterprise: data sourcing, ingestion, processing, and distribution
  • Everything You Wanted to Know...But Were Too Proud to Ask: Data Reduction Aug 18 2020 5:00 pm UTC 75 mins
    John Kim, NVIDIA; Alex McDonald, NetApp
    Everyone knows data volumes are growing rapidly, far faster than IT budgets, which range from flat to minimal annual growth. One of the drivers of such rapid data growth is storing multiple copies of the same data. Developers copy data for testing and analysis. Users email and store multiple copies of the same files. Administrators typically back up the same data over and over, often with minimal to no changes.

    To avoid a budget crisis and paying more than once to store the same data, storage vendors and customers want to use data reduction techniques such as deduplication, compression, thin provisioning and snapshots.

    This webcast will specifically focus on the fundamentals of data reduction, which can be performed in different places and at different stages of the data lifecycle. Like most technologies, there are related means to do this, but with enough difference to cause confusion. For that reason, we’re going to be looking at:

    •How companies end up with so many copies of the same data
    •Difference between deduplication and compression – when should you use one vs. the other?
    •Where to reduce data: application-level, networked storage, backups, and during data movement
    •When to collapse the copies: real-time vs. post-process deduplication
    •Performance considerations

    Tune in to this efficient and educational SNIA webcast, which covers valuable concepts with minimal repetition or redundancy.
  • Storage Networking Security Series: Applied Cryptography Recorded: Aug 5 2020 59 mins
    John Kim, NVIDIA; Eric Hibbard, SNIA Security TWG Chair; Olga Buchonina, SNIA Blockchain TWG Chair; Alex McDonald, NetApp
    The rapid growth in infrastructure to support the real time and continuous collection and sharing of data to make better business decisions has led to an age of unprecedented information access and storage. This proliferation of data sources and of high-density data storage has put volumes of data at one’s fingertips. While the collection of large amounts of data has increased knowledge and efficiencies for businesses, it has also made attacks upon that information—theft, modification, or holding it for ransom--more tempting and easier. Cryptography is often used to protect valuable data.

    This webcast will present an overview of applied cryptography techniques for the most popular use cases. We will discuss ways of securing data, the factors and trade-offs that must be considered, as well as some of the general risks that need to be mitigated, including:

    •Encryption techniques for authenticating users
    •Encrypting data—either at rest or in motion
    •Using hashes to authenticate/ Information coding and data transfer methodologies
    •Cryptography for Blockchain
  • Enterprise and Data Center SSD Form Factor - the end of the 2.5-inch disk era? Recorded: Aug 4 2020 78 mins
    J.Hands, SSD SIG; B.Lynn, Dell; R Stenfort, FB ,P, Kaler, HPE; J. Geldman, Kioxia; J. Hinkle, Lenovo;J. Adrian, Microsoft
    The Enterprise and Data Center SSD Form Factor (EDSFF) is designed natively for data center NVMe SSDs to improve thermal, power, performance, and capacity scaling. EDSFF has different variants for flexible and scalable performance, dense storage configurations, general purpose servers, and improved data center TCO. At the 2020 Open Compute Virtual Summit OEMs, cloud service providers, hyperscale data center, and SSD vendors showcased products and their vision for how this new family of SSD form factors solves real data challenges.

    Join this SNIA Compute Memory and Storage Initiative webcast where expert panelists from companies that have been involved in EDSFF since the beginning discuss how they will use the EDSFF form factor. OEMs will discuss their goals for E3 and the new updated version of the E3 specification! (SFF-TA-1008) Hyperscale data center and cloud service providers will discuss how E1.S (SFF-TA-1006) helps solve performance scalability, serviceability, capacity, and thermal challenges for future NVMe SSDs and persistent memory in 1U servers.
  • Storage Networking Security Series: Security & Privacy Regulations Recorded: Jul 28 2020 61 mins
    Thomas Rivera, Co-Chair, SNIA Data Protection & Privacy; Eric Hibbard, SNIA Security TWG Chair; J Metz, SNIA Board Chair
    Worldwide, regulations are being promulgated and aggressively enforced with the intention of protecting personal data. These regulatory actions are being taken to help mitigate exploitation of this data by cybercriminals and other opportunistic groups who have turned this into a profitable enterprise. Failure to meet these data protection requirements puts individuals at risk (e.g., identity theft, fraud, etc.), as well as subjecting organizations to significant harm (e.g., legal penalties).

    This webcast highlights common privacy principles and themes within key privacy regulations. In addition, the related cybersecurity implications are explored. Lastly, the session will probe a few of the recent regulations/laws to outline interesting challenges due to over and under-specification of data protection requirements (e.g., “reasonable” security).

    After viewing this webcast, attendees should understand:
    •How privacy and security is characterized
    •Data retention and deletion requirements
    •Core data protection requirements of sample privacy regulations from around the globe
    •The role that security plays with key privacy regulations
    •Data breach implications and consequences
  • Notable Updates in NVMe-oF 1.1 Recorded: Jun 30 2020 53 mins
    Phil Cayton, Intel; John Kim; NVIDIA; David Peterson, Broadcom; Ilker Cebeli; Samsung; Tim Lustig, NVIDIA
    In the past couple of years since its introduction, NVMe™ over Fabrics (NVMe-oF™) has not been resting on any laurels. Work has been ongoing, and there are several updates that are worth talking about.

    There is more to a technology than its core standard, of course, and many different groups have been hard at work at improving upon, and fleshing out, many of the capabilities that are related to NVMe-oF.

    This webcast will explore a few of these projects and how they relate to implementing the technology. In particular, we’ll be looking at:

    •A summary of new items in NVMe-oF 1.1
    •Updates about what is happening in FC-NVMe-2
    •How SNIA’s provisioning model helps NVMe-oF Ethernet Bunch of Flash (EBOF) devices
    •Managing and provisioning NVMe-oF devices with SNIA Swordfish™

    After you watch the webcast, check out the Q&A log at https://bit.ly/2Wi2KwR
  • A Multi-tenant Multi-cluster Kubernetes Datapocalypse is Coming Recorded: Jun 23 2020 57 mins
    Paul Burt, Technical Product Marketing Engineer, NetApp; Jim Fister, Principal, The Decision Place
    The need for rapid deployment of scalable clusters is creating an opportunity for container solutions such as Kubernetes. But what are the implications of multiple Kubernetes clusters in a broad deployment? What happens if a cluster goes down? What’s the impact on business resiliency? Managing and securing multiple clusters is becoming a key topic and area of debate. Multi-cluster Kubernetes that provides robustness & resilience is rapidly moving from “best practice” to a “must have”.

    In this webcast we’ll dive into:
    •The history of multi-cluster Kubernetes
    •How multi-cluster setups could affect data heavy workloads (such as multiple microservices backed by independent data stores)
    •Managing multiple clusters
    •Keeping the business functioning if a cluster goes down
    •How to prepare for the coming datapocalypse

    After you watch the webcast, check out the Q&A blog at: https://bit.ly/2DE91fL
  • Storage Scalability in Hybrid Cloud and Multicloud Environments Recorded: Jun 11 2020 59 mins
    Robert Cone, Intel; Piyush Chaudhary, IBM; Pekon Gupta, SMART Modular
    As data growth in enterprises continues to skyrocket, datacenter cloud scalability, whether on premises, in hybrid cloud or in multicloud deployments, is key for businesses. So, what are enterprise IT organizations supposed to do, given that 'run anything anywhere' is becoming more important than ever? Customers are finding that hybrid cloud storage solutions better meet their IT and business growth needs, so they can rapidly scale their IT infrastructure and cover a wider array of services. This webcast will help architects and consumers of hybrid cloud storage solutions better understand:
    oTrends and benefits of hybrid cloud storage and multicloud deployments
    oThe range of technologies and capabilities under development to help enterprise hyperscalers and cloud service providers (CSPs) serve IT customers
    oHow scalability differs in block vs. file workloads
    oThe important requirements to keep in mind when considering a 'run anything anywhere' objective
  • Storage Networking Security Series – Key Management 101 Recorded: Jun 10 2020 61 mins
    Judy Furlong, Dell Technologies; J Metz, Rockport Networks
    In order to effectively use cryptography to protect information, one has to ensure that the associated cryptographic keys are also protected. Attention must be paid to how cryptographic keys are generated, distributed, used, stored, replaced and destroyed in order to ensure that the security of cryptographic implementations are not compromised.

    This webinar will introduce the fundamentals of cryptographic key management including key lifecycles, key generation, key distribution, symmetric vs asymmetric key management and integrated vs centralized key management models. Relevant standards, protocols and industry best practices will also be presented.

    After you watch the webcast, check-out the Q&A blog at: https://bit.ly/3dcnpId
  • Uniting Compute, Memory, and Storage Recorded: Jun 2 2020 60 mins
    Alex McDonald, Eli Tiomkin, Jonmichael Hands, Jim Fister
    Discover how the themes of computational storage, persistent memory, and solid state come together in a webcast from the new SNIA Compute, Memory, and Storage Initiative. We’ll explore how expertise in these three areas can help understand storage architectures, common solution areas, and their impacts on storage devices, systems, and software.
  • Storage Networking Security Series: Protecting Data at Rest Recorded: May 27 2020 40 mins
    Pierre Mouallem, Lenovo; Ahmad Atamli, Mellanox; Steve Vanderlinden, Lenovo
    One of the most important aspects of security is how to protect the data that is just “sitting there.” How easy is it to get to? Who can get to it? If someone does get access to the data, can they read it? What are the potential risks of the wrong people reading the data? These are just a few of the questions that we try to answer when we go through the process of securing data.

    Contrary to popular belief, however, securing “data at rest” is not simply encrypting the data. While it is true that data encryption plays a major role in securing “data at rest,” there are several other factors that come into play and are equally as important – if not more so.

    For this webcast, we’re going to talk about those other factors (Encryption is deserving of its own, specific webcast). We will present the end-to-end process to securing “data at rest,” and discuss all the factors and trade-offs that must be considered, and some of the general risks that need to be mitigated, discussing:

    • How requirements for “data at rest” differ from “data in flight”
    • Legal and regulatory reasons to protect (or delete) data at rest
    • Where and how data could be attacked
    • Understanding the costs of ransomware
    • How to protect cryptographic keys from malicious actors
    • Using key managers to properly manage cryptographic keys
    • Strengths and weaknesses of relying on government security recommendations
    • The importance of validating data backups... how stable is your media?

    After you watch the webcast, check out the Q&A blog at: https://bit.ly/2CWbh1J
  • Storage Networking Security Series – Encryption 101 Recorded: May 20 2020 60 mins
    Judy Furlong, Dell Technologies; Ed Pullin, Intel; Alex McDonald, NetApp
    Encryption has been used through the ages to protect stored secrets, authenticate messages, communicate secretly in broad daylight, and even to check that messages were properly transmitted and received without tamper. Now, it’s often our first go-to tool for making sure that data simply isn’t readable to prying eyes, ears or AI bots.

    But how does encryption actually work, what makes it tick, and how is it managed? How do we ensure compatibility? How do we protect the keys; i.e., “Who will guard the guards themselves?”

    It’s a big topic that we’re breaking down into three parts: Encryption 101, Key Management 101, and Applied Cryptography.

    Join us on May 20th for the first encryption webcast: Storage Networking Security: Encryption 101 where security experts will cover:

    •A brief history of Encryption
    •Cryptography basics
    •Definition of terms – Entropy, Cipher, Symmetric & Asymmetric Keys, Certificates and Digital signatures, etc.
    •Introduction to Key Management

    After you watch the webcast, check out the Encryption 101 Q&A blog at https://bit.ly/2ZGMisl
  • The Influence of IoT on Data Strategy Recorded: May 14 2020 61 mins
    Glyn Bowden, HPE, Eric Hibbard, Co-Chair, ABA, IoT Committee; Alex McDonald, NetApp
    More and more we are seeing compute and inference move to the edge. This is driven by the growth in capability to not only generate data from sensors, devices and by people operating in the field, but also by the interaction between those devices.

    This new source of data and information brings with it unique challenges to the way we store and transmit data as well as the way we need to curate it. In this webcast we will look at:
    •New patterns generated by the explosion of the Internet of Things
    •How IoT is impacting storage and data strategies
    •Security and privacy issues and considerations
    •How to think about the lifecycle of our information in this new environment

    After you watch the webcast, check out the Q&A blog: https://bit.ly/2XUvFIp
SNIA
The Storage Networking Industry Association (SNIA) is a non-profit organization made up of member companies spanning information technology. A globally recognized and trusted authority, SNIA’s mission is to lead the storage industry in developing and promoting vendor-neutral architectures, standards and educational services that facilitate the efficient management, movement and security of information.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Object Storage 201 - Understanding Architectural Trade-Offs
  • Live at: Oct 16 2014 6:00 pm
  • Presented by: Paul Levy, System's Engineer & Architect, Intel; Vishnu Vardan, Senior Manager - Object Storage, NetApp
  • From:
Your email has been sent.
or close