Hi [[ session.user.profile.firstName ]]

Everything You Wanted To Know About Storage: Programming & Networking Had a Baby

In this, the sixth entry in the “Everything You Wanted To Know About Storage But Were Too Proud To Ask,” popular webcast series we look into some of the nitties and the gritties of storage details that are often assumed.

When looking at data from the lens of an application, host, or operating system, it’s easy to forget that there are several layers of abstraction underneath before the actual placement of data occurs. In this webcast we are going to scratch beyond the first layer to understand some of the basic taxonomies of these layers.

In this webcast we will show you more about the following:

•Storage APIs and POSIX
•Block, File, and Object storage
•Byte Addressable and Logical Block Addressing
•Log Structures and Journaling Systems

It’s an ambitious project, but these terms and concepts are at the heart of where compute, networking and storage intersect. Having a good grasp of these concepts ties in with which type of storage networking to use, and how data is actually stored behind the scenes.

Join us on July 6th for this session. We look forward to seeing you there!

Check out the Q&A blog: http://sniaesfblog.org/?p=636
Recorded Jul 6 2017 59 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Rob Peglar, Symbolic IO, J Metz, Cisco, Alex McDonald, NetApp, Dror Goldenberg, Mellanox
Presentation preview: Everything You Wanted To Know About Storage: Programming & Networking Had a Baby

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Storage Networking Security Series: Applied Cryptography Aug 5 2020 5:00 pm UTC 75 mins
    John Kim, NVIDIA; Eric Hibbard, SNIA Security TWG Chair; Olga Buchonina, SNIA Blockchain TWG Chair; Alex McDonald, NetApp
    The rapid growth in infrastructure to support the real time and continuous collection and sharing of data to make better business decisions has led to an age of unprecedented information access and storage. This proliferation of data sources and of high-density data storage has put volumes of data at one’s fingertips. While the collection of large amounts of data has increased knowledge and efficiencies for businesses, it has also made attacks upon that information—theft, modification, or holding it for ransom--more tempting and easier. Cryptography is often used to protect valuable data.

    This webcast will present an overview of applied cryptography techniques for the most popular use cases. We will discuss ways of securing data, the factors and trade-offs that must be considered, as well as some of the general risks that need to be mitigated, including:

    •Encryption techniques for authenticating users
    •Encrypting data—either at rest or in motion
    •Using hashes to authenticate/ Information coding and data transfer methodologies
    •Cryptography for Blockchain
  • Storage Networking Security Series: Security & Privacy Regulations Jul 28 2020 5:00 pm UTC 75 mins
    Thomas Rivera, VMware; Eric Hibbard, SNIA Security Technical Work Group Chair; J Metz, SNIA Board of Directors
    Worldwide, regulations are being promulgated and aggressively enforced with the intention of protecting personal data. These regulatory actions are being taken to help mitigate exploitation of this data by cybercriminals and other opportunistic groups who have turned this into a profitable enterprise. Failure to meet these data protection requirements puts individuals at risk (e.g., identity theft, fraud, etc.), as well as subjecting organizations to significant harm (e.g., legal penalties).

    This webcast highlights common privacy principles and themes within key privacy regulations. In addition, the related cybersecurity implications are explored. Lastly, the session will probe a few of the recent regulations/laws to outline interesting challenges due to over and under-specification of data protection requirements (e.g., “reasonable” security).

    After viewing this webcast, attendees should understand:
    •How privacy and security is characterized
    •Data retention and deletion requirements
    •Core data protection requirements of sample privacy regulations from around the globe
    •The role that security plays with key privacy regulations
    •Data breach implications and consequences
  • Notable Updates in NVMe-oF 1.1 Recorded: Jun 30 2020 53 mins
    Phil Cayton, Intel; John Kim; NVIDIA; David Peterson, Broadcom; Ilker Cebeli; Samsung; Tim Lustig, NVIDIA
    In the past couple of years since its introduction, NVMe™ over Fabrics (NVMe-oF™) has not been resting on any laurels. Work has been ongoing, and there are several updates that are worth talking about.

    There is more to a technology than its core standard, of course, and many different groups have been hard at work at improving upon, and fleshing out, many of the capabilities that are related to NVMe-oF.

    This webcast will explore a few of these projects and how they relate to implementing the technology. In particular, we’ll be looking at:

    •A summary of new items in NVMe-oF 1.1
    •Updates about what is happening in FC-NVMe-2
    •How SNIA’s provisioning model helps NVMe-oF Ethernet Bunch of Flash (EBOF) devices
    •Managing and provisioning NVMe-oF devices with SNIA Swordfish™
  • A Multi-tenant Multi-cluster Kubernetes Datapocalypse is Coming Recorded: Jun 23 2020 57 mins
    Paul Burt, Technical Product Marketing Engineer, NetApp; Jim Fister, Principal, The Decision Place
    The need for rapid deployment of scalable clusters is creating an opportunity for container solutions such as Kubernetes. But what are the implications of multiple Kubernetes clusters in a broad deployment? What happens if a cluster goes down? What’s the impact on business resiliency? Managing and securing multiple clusters is becoming a key topic and area of debate. Multi-cluster Kubernetes that provides robustness & resilience is rapidly moving from “best practice” to a “must have”.

    In this webcast we’ll dive into:
    •The history of multi-cluster Kubernetes
    •How multi-cluster setups could affect data heavy workloads (such as multiple microservices backed by independent data stores)
    •Managing multiple clusters
    •Keeping the business functioning if a cluster goes down
    •How to prepare for the coming datapocalypse
  • Storage Scalability in Hybrid Cloud and Multicloud Environments Recorded: Jun 11 2020 59 mins
    Robert Cone, Intel; Piyush Chaudhary, IBM; Pekon Gupta, SMART Modular
    As data growth in enterprises continues to skyrocket, datacenter cloud scalability, whether on premises, in hybrid cloud or in multicloud deployments, is key for businesses. So, what are enterprise IT organizations supposed to do, given that 'run anything anywhere' is becoming more important than ever? Customers are finding that hybrid cloud storage solutions better meet their IT and business growth needs, so they can rapidly scale their IT infrastructure and cover a wider array of services. This webcast will help architects and consumers of hybrid cloud storage solutions better understand:
    oTrends and benefits of hybrid cloud storage and multicloud deployments
    oThe range of technologies and capabilities under development to help enterprise hyperscalers and cloud service providers (CSPs) serve IT customers
    oHow scalability differs in block vs. file workloads
    oThe important requirements to keep in mind when considering a 'run anything anywhere' objective
  • Storage Networking Security Series – Key Management 101 Recorded: Jun 10 2020 61 mins
    Judy Furlong, Dell Technologies; J Metz, Rockport Networks
    In order to effectively use cryptography to protect information, one has to ensure that the associated cryptographic keys are also protected. Attention must be paid to how cryptographic keys are generated, distributed, used, stored, replaced and destroyed in order to ensure that the security of cryptographic implementations are not compromised.

    This webinar will introduce the fundamentals of cryptographic key management including key lifecycles, key generation, key distribution, symmetric vs asymmetric key management and integrated vs centralized key management models. Relevant standards, protocols and industry best practices will also be presented.

    After you watch the webcast, check-out the Q&A blog at: https://bit.ly/3dcnpId
  • Uniting Compute, Memory, and Storage Recorded: Jun 2 2020 60 mins
    Alex McDonald, Eli Tiomkin, Jonmichael Hands, Jim Fister
    Discover how the themes of computational storage, persistent memory, and solid state come together in a webcast from the new SNIA Compute, Memory, and Storage Initiative. We’ll explore how expertise in these three areas can help understand storage architectures, common solution areas, and their impacts on storage devices, systems, and software.
  • Storage Networking Security Series: Protecting Data at Rest Recorded: May 27 2020 40 mins
    Pierre Mouallem, Lenovo; Ahmad Atamli, Mellanox; Steve Vanderlinden, Lenovo
    One of the most important aspects of security is how to protect the data that is just “sitting there.” How easy is it to get to? Who can get to it? If someone does get access to the data, can they read it? What are the potential risks of the wrong people reading the data? These are just a few of the questions that we try to answer when we go through the process of securing data.

    Contrary to popular belief, however, securing “data at rest” is not simply encrypting the data. While it is true that data encryption plays a major role in securing “data at rest,” there are several other factors that come into play and are equally as important – if not more so.

    For this webcast, we’re going to talk about those other factors (Encryption is deserving of its own, specific webcast). We will present the end-to-end process to securing “data at rest,” and discuss all the factors and trade-offs that must be considered, and some of the general risks that need to be mitigated, discussing:

    • How requirements for “data at rest” differ from “data in flight”
    • Legal and regulatory reasons to protect (or delete) data at rest
    • Where and how data could be attacked
    • Understanding the costs of ransomware
    • How to protect cryptographic keys from malicious actors
    • Using key managers to properly manage cryptographic keys
    • Strengths and weaknesses of relying on government security recommendations
    • The importance of validating data backups... how stable is your media?
  • Storage Networking Security Series – Encryption 101 Recorded: May 20 2020 60 mins
    Judy Furlong, Dell Technologies; Ed Pullin, Intel; Alex McDonald, NetApp
    Encryption has been used through the ages to protect stored secrets, authenticate messages, communicate secretly in broad daylight, and even to check that messages were properly transmitted and received without tamper. Now, it’s often our first go-to tool for making sure that data simply isn’t readable to prying eyes, ears or AI bots.

    But how does encryption actually work, what makes it tick, and how is it managed? How do we ensure compatibility? How do we protect the keys; i.e., “Who will guard the guards themselves?”

    It’s a big topic that we’re breaking down into three parts: Encryption 101, Key Management 101, and Applied Cryptography.

    Join us on May 20th for the first encryption webcast: Storage Networking Security: Encryption 101 where security experts will cover:

    •A brief history of Encryption
    •Cryptography basics
    •Definition of terms – Entropy, Cipher, Symmetric & Asymmetric Keys, Certificates and Digital signatures, etc.
    •Introduction to Key Management

    After you watch the webcast, check out the Encryption 101 Q&A blog at https://bit.ly/2ZGMisl
  • The Influence of IoT on Data Strategy Recorded: May 14 2020 61 mins
    Glyn Bowden, HPE, Eric Hibbard, Co-Chair, ABA, IoT Committee; Alex McDonald, NetApp
    More and more we are seeing compute and inference move to the edge. This is driven by the growth in capability to not only generate data from sensors, devices and by people operating in the field, but also by the interaction between those devices.

    This new source of data and information brings with it unique challenges to the way we store and transmit data as well as the way we need to curate it. In this webcast we will look at:
    •New patterns generated by the explosion of the Internet of Things
    •How IoT is impacting storage and data strategies
    •Security and privacy issues and considerations
    •How to think about the lifecycle of our information in this new environment

    After you watch the webcast, check out the Q&A blog: https://bit.ly/2XUvFIp
  • NVMe and NVMe-oF Configuration and Manageability with Swordfish and Redfish Recorded: May 13 2020 53 mins
    Rajalaxmi Angadi, Intel; Phil Cayton, Intel; Richelle Ahlvers, Broadcom
    SNIA Swordfish is an extension of the DMTF Redfish specification to provide a unified approach for the management of storage and services in converged, hyperconverged, hyperscale, and cloud infrastructure environments. Swordfish uses a client-centric approach to develop the dynamic resource models as part of the specification, which describes client needs, management requirements, and use cases.

    NVMe-oF currently support fabric transports like RDMA (iWarp, RoCE, IB), TCP, and FC. NVMe / NVMe-oF currently lacks efficient remote configuration and provisioning management mechanisms to enable NVMe-oF scaling to large converged infrastructures – something Redfish and Swordfish can provide.

    The SNIA Swordfish specification is currently growing to include full NVMe and NVMe-oF enablement and alignment across DMTF, NVMe, and SNIA for NVMe and NVMe-oF use cases. SNIA members are contributing to specification development and helping to shape the ecosystem. This presentation will provide an overview of the work in progress to map these standards together to ensure NVMe and NVMe-oF environments can be represented entirely in Swordfish and Redfish environments.

    Join us! We welcome your feedback, and encourage participation.
  • Your Storage Infrastructure on AI Recorded: May 11 2020 58 mins
    Glyn Bowden, HPE; Alex McDonald, Chair, SNIA EMEA and NetApp; Paul Talbut, SNIA EMEA
    In this webcast, we will explore why your storage may be acting strangely now that it’s been subjected to the whims of data scientists. We’ll look at how and why the I/O patterns have changed, where this will lead, and some of the tactics and strategies you can deploy now to prevent impact from this new movement of storage saboteurs! We’ll discuss:

    •Why are data scientists here? (the benefits a data scientist brings to the organisation)
    •How to spot a data scientist in the wild (data patterns to look out for)
    •Feeding and watering your data scientist (what they need and how to provide it)
    •Planning for more data scientists (how to make your infrastructure data scientist ready)
    •How does data flow through an AI/ML system?
    •Is the data packaged in unusual or specific ways?
    •What stresses does it place on the storage system? Capacity? Performance? Or both?
  • Storage Wars: Object vs. File vs. Block Recorded: Apr 21 2020 78 mins
    Alex McDonald, Tom Christensen, Anne Blanchard, Sanjay Jagad, Bill Martin
    Research firm IDC projects that by the end of 2020, the world will generate 44 zettabytes (44 trillion gigabytes) of data per year. Data storage, therefore, is no longer simple, and in the age of cloud maturity and Digital Transformation, storage infrastructure strategies are shifting. With object stores having a very different set of characteristics than file and block storage, it can be confusing to know which is the right strategy that will keep up with an expanding digital universe.

    Even small businesses struggle to manage the ever-growing pile of files stored on various networks and systems, so the challenges for enterprise companies can be hard to wrap your head around.

    Join this panel of object, file and block storage experts as they discuss:

    - The best way to manage unstructured data
    - Are there deceptive costs in a file storage strategy?
    - Use cases for object storage

    Speakers:
    Alex McDonald - SNIA Networking Storage Forum and Office of the CTO, NetApp (Moderator)
    Tom Christensen, CTO & Customer Advocacy - Northern EMEA, Hitachi Vantara
    Anne Blanchard, Sr. Director of Product Marketing, Nasuni
    Sanjay Jagad, Senior Director of Products and Solutions, Cloudian
    Bill Martin, SNIA Technical Council Co-Chair and Samsung
  • So You Wanna Program Persistent Memory? A Challenge Primer Recorded: Apr 14 2020 45 mins
    Alex McDonald, SNIA CMSI Co-Chair, Jim Fister, Director, SNIA Persistent Memory Software Enabling
    SNIA’s Persistent Memory Hackathon Program enters its second year with 300+ developers up to speed on the latest in programming persistent memory -- and SNIA’s NVDIMM Programming Challenge just announced its first winner of distinction. Join our webcast to learn the latest developments in PM, new resources available to learn more about programming to PM, and a dive into the winning application introduced at the recent Persistent Memory Summit.
  • QUIC – Will it Replace TCP/IP? Recorded: Apr 2 2020 61 mins
    Lars Eggert, NetApp; Tim Lustig, Mellanox
    QUIC is a new UDP-based transport protocol for the Internet, and specifically, the web. Originally designed and deployed by Google, it already makes up 35% of Google's egress traffic, which corresponds to about 7% of all Internet traffic. The strong interest by many other large Internet players in the ongoing IETF standardization of QUIC is likely to lead to an even greater deployment in the near future. This webcast will highlight:

    •Unique design aspects of QUIC
    •Differences to the conventional HTTP/TLS/TCP web stack
    •Early performance numbers
    •Potential side effects of a broader deployment of QUIC

    After you watch the presentation, check out the Q&A blog at https://bit.ly/QUICQ-A
  • The Impact of Artificial Intelligence on Storage and IT Recorded: Apr 1 2020 54 mins
    Glyn Bowden, HPE; James Myers, Intel; Alex McDonald, NetApp
    Artificial intelligence (AI) and machine learning (ML) have been having quite the impact on most industries in the last couple of years, but what about our own IT industry? In this webcast find out how the rise of machine learning has created a new type of demand on IT operations teams as well as how those same teams can utilize new insights and capabilities driven by machine learning. We will explore:
    •The demand on infrastructure
    •Storage and data pipelines
    •The growing field of IT operations leveraging AI (aka AIOps)

    After you watch the webcast, check out the Q&A blog at: https://bit.ly/3fsj45e
  • Ethernet-attached SSDs—Brilliant Idea or Storage Silliness? Recorded: Mar 17 2020 68 mins
    Mark Carlson, Kioxia; Rob Davis, Mellanox; John Kim, Mellanox; Ted Vojnovich, Lenovo
    Several SSD and networking vendors have recentl¬y demonstrated ways to connect SSDs directly to an Ethernet network. They propose that deploying Ethernet SSDs will be more scalable, easier to manage, more performant, and/or lower cost than traditional storage networking solutions that use a storage controller (or hyperconverged node) between the SSDs and the network.

    Who would want to attach SSDs directly to the network? Are these vendors brilliant or simply trying to solve a problem that doesn’t exist? What are the different solutions that could benefit from Ethernet SSDs? Which protocols would one use to access them? And how do Ethernet SSDs relate to computational storage? Join this SNIA Networking Storage Forum webcast to learn all this and more as SNIA experts discuss:

    •What are the appropriate use cases for Ethernet SSDs?
    •Why Ethernet SSDs could be appealing and more efficient
    •How Ethernet SSDs compare to other forms of storage networking
    •Different ways Ethernet SSDs can be accessed, such as JBOF/NBOF, NVMe-oF, and Key Value
    •How do Ethernet-attached SSDs enable composable infrastructures?
  • Object Storage: What, How and Why Recorded: Feb 19 2020 64 mins
    Chris Evans, Architecting IT; Rick Vanover, Veeam; Alex McDonald, NetApp; John Kim, Mellanox
    There are many types of storage technologies, both in how they are interconnected, consumed and designed. Object storage is no different in that it brings its own set of unique characteristics to the market. In this webinar, storage experts Rick Vanover and Chris Evans will explain:

    •What object storage is and what it does
    •How to use object storage
    •Essential characteristics of typical consumption
    •Why object storage is important to the future of storage and computing technologies

    After you watch the webcast, check out the Q&A blog at https://bit.ly/2xa63fH
  • Cloud Standards: What They Are, Why You Should Care Recorded: Feb 13 2020 60 mins
    Eric Hibbard, ISO Editor; Alex McDonald, NetApp
    Since the initial publication of the National Institute of Standards and Technology (NIST) definition of cloud computing in 2011, international standards development organizations (SDOs) have sought to refine and expand the cloud computing landscape. This webinar will:

    •Identify key published and draft cloud standards
    •Discuss their interdependencies
    •Highlight their importance
    •Identify potential future work.

    In addition, related technologies such as virtualization, federation, and fog/edge computing will be addressed. Lastly, the relevance of the standards will be explored to help organizations understand ways these documents can be exploited.
  • What a Year It Was – and Where We Need To Go on Emerging Memory Recorded: Jan 14 2020 55 mins
    Jim Handy, Objective Analysis and Tom Coughlin, Coughlin Associates
    Get prepared for SNIA’s Persistent Memory Summit with this webcast from Objective Analysis and Coughlin Associates. Following up on their 2018 groundbreaking report on emerging memories, Jim Handy and Tom Coughlin will update us on 2019 advances in support from SNIA, the launch of Optane memory on DIMMs, new MRAM types, and more. You won’t want to miss their analysis on the progress made, and their perspective on the groundwork that still needs to be covered to bring persistent memory to mainstream computing.
SNIA
The Storage Networking Industry Association (SNIA) is a non-profit organization made up of member companies spanning information technology. A globally recognized and trusted authority, SNIA’s mission is to lead the storage industry in developing and promoting vendor-neutral architectures, standards and educational services that facilitate the efficient management, movement and security of information.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Everything You Wanted To Know About Storage: Programming & Networking Had a Baby
  • Live at: Jul 6 2017 5:00 pm
  • Presented by: Rob Peglar, Symbolic IO, J Metz, Cisco, Alex McDonald, NetApp, Dror Goldenberg, Mellanox
  • From:
Your email has been sent.
or close