What a Year It Was – and Where We Need To Go on Emerging Memory
Get prepared for SNIA’s Persistent Memory Summit with this webcast from Objective Analysis and Coughlin Associates. Following up on their 2018 groundbreaking report on emerging memories, Jim Handy and Tom Coughlin will update us on 2019 advances in support from SNIA, the launch of Optane memory on DIMMs, new MRAM types, and more. You won’t want to miss their analysis on the progress made, and their perspective on the groundwork that still needs to be covered to bring persistent memory to mainstream computing.
RecordedJan 14 202055 mins
Your place is confirmed, we'll send you email reminders
Michael McManus, Intel; Christopher Davidson, HPE; Torben Kling Petersen, HPE; Alex McDonald, SNIA CSTI Chair
The use of genomics in modern biology has revolutionized the speed of innovation for the discovery of medicines. The COVID pandemic response has quickened genetic research and driven the rapid development of vaccines. Genomics, however, requires a significant amount of compute and data storage to aid discovery. This session is for IT professionals who are faced with delivering and supporting IT solutions for the required compute and data storage for genomics workflows. It will feature viewpoints from both the bioinformatics and technology perspectives with a focus on some of these compute and data storage challenges.
We will discuss:
• How to best store and manage these large genomics datasets
• Methods for sharing these large datasets for collaborative analysis.
• Legal and ethical implications of storing shareable data in the cloud
• Transferring large data sets and the impact on storage and networking
Erin Farr, IBM; Vincent Hsu, IBM; Jim Fister, The Decision Place
Data gravity has pulled computing to the Edge and enabled significant advances in hybrid cloud deployments. The ability to run analytics from the datacenter to the Edge, where the data is created and lives, also creates new use cases for nearly every industry and company. However, this movement of compute to the Edge is not the only pattern to have emerged. How might these other use cases impact your storage strategy?
This interactive webcast by the SNIA CSTI will focus on the following topics:
• Emerging patterns of data movement and the use cases that drive them
• Cloud Bursting
• Federated Learning across the Edge and Hybrid Cloud
• Considerations for distributed cloud storage architectures to match these emerging patterns
Steve Van Lare, Anjuna; Anand Kashyap, Fortanix; Michael Hoard Intel
To counter the ever-increasing likelihood of catastrophic disruption and cost due to enterprise IT security threats, data center decision makers need to be vigilant in protecting their organization’s data. Confidential Computing is architected to provide security for data in use to meet this critical need for enterprises today.
This webcast provides insight into how data center, cloud and edge applications may easily benefit from cost-effective, real-world Confidential Computing solutions. This educational discussion will provide end-user examples, tips on how to assess systems before and after deployment, as well as key steps to complete along the journey to mitigate threat exposure. Presenting are Steve Van Lare (Anjuna), Anand Kashyap (Fortanix), and Michael Hoard (Intel), who will discuss:
· What would it take to build-your-own Confidential Computing solution?
· Emergence of easily deployable, cost-effective Confidential Computing solutions
· Real world usage examples and key technical, business and investment insights
Moderator: Tim Lustig, NVIDIA; Panelists: Kfir Wolfson, Pliops and John F. Kim, NVIDIA
Thanks to big data, artificial intelligence (AI), the Internet of things (IoT), and 5G, demand for data storage continues to grow significantly. The rapid growth is causing storage and database-specific processing challenges within current storage architectures. New architectures, designed with millisecond latency, and high throughput, offer in-network and storage computational processing to offload and accelerate data-intensive workloads.
Join technology innovators as they highlight how to drive value and accelerate SSD storage through the specialized implementation of key value technology to remove inefficiencies through a Data Processing Unit for hardware acceleration of the storage stacks, and a hardware-enabled Storage Data Processor to accelerate compute-intensive functions.
By joining, you will learn why SSDs are a staple in modern storage architectures. These disaggegated systems use just a fraction of computational load and power while unlocking the full potential of networked flash storage.
Paul O’Neill, Intel; Parviz Peiravi, Intel; Glyn Bowden, HPE
As noted in our panel discussion “What is Confidential Computing and Why Should I Care?,” Confidential Computing is an emerging industry initiative focused on helping to secure data in use. The efforts can enable encrypted data to be processed in memory while lowering the risk of exposing it to the rest of the system, thereby reducing the potential for sensitive data to be exposed while providing a higher degree of control and transparency for users.
As computing moves to span multiple environments from on-premises to public cloud to edge, organizations need protection controls that help safeguard sensitive IP and workload data wherever the data resides. In this live webcast we’ll cover:
• How Confidential Computing works in multi-tenant cloud environments
• How sensitive data can be isolated from other privileged portions of the stack
• Applications in financial services, healthcare industries, and broader enterprise applications
• Contributing to the Confidential Computing Consortium
John Kim, NVIDIA; Tom Friend, Illuminosi; Alex McDonald, Independent Consultant Vice Chair SNIA NSF
So much of what we discuss in SNIA is the latest emerging technologies in storage. While it’s good to know all about the coming technologies, it’s also important to understand those technologies being sunsetted. In this series, we cover obsolete hardware, protocols, interfaces and other aspects of storage
In our second installment of our Storage Technologies & Practices Ripe for Refresh, we will cover older HDD device interfaces and file systems. Advice will be given on how to replace these in production environments as well as why these changes are recommended. Also, we will be covering protocols that you should consider removing from your networks, either older versions of protocols where only newer versions should be used, or protocols that have been supplanted by superior options and should be discontinued entirely.
Finally, we will look at physical networking interfaces and cabling that are popular today but face an uncertain future as networking speeds grow ever faster.
Mike Bursell, Co-founder, Enarx Project; David Kaplan, AMD; Ronald Perez, Intel; Jim Fister, The Decision Place
In the "arms race" of security, new defensive tactics are always needed. One significant approach is Confidential Computing: a technology that can isolate data and execution in a secure space on a system, which takes the concept of security to new levels. This SNIA Cloud Storage Technologies Initiative (CSTI) webcast will provide an introduction and explanation of Confidential Computing and will feature a panel of industry architects responsible for defining Confidential Compute. It will be a lively conversation on topics including:
• The basics of hardware-based Trusted Execution Environments (TEEs) and how they work to enable confidential computing
• How to architect solutions based around TEEs
• How this foundation fits with other security technologies
• Adjacencies to storage technologies
Moderator: Jim Fister, SNIA CMSI; Panelists: Eli Tiomkin, Chair, SNIA CS SIG, Nidish Kamath, KIOXIA, David McIntyre, Samsung
In modern analytics deployments, latency is the fatal flaw that limits the efficacy of the overall system. Solutions move at the speed of decision, and microseconds could mean the difference between success and failure against competitive offerings. Artificial Intelligence, Machine Learning, and In-Memory Analytics solutions have significantly reduced latency, but the sheer volume of data and its potential broad distribution across the globe prevents a single analytics node from efficiently harvesting and processing data.This panel discussion will feature industry experts discussing the different approaches to distributed analytics in the network and storage nodes. How does the storage providers of HDDs and SSD view the data creation and movement between the edge compute and the cloud? And how can computational storage be a solution to reduce data movement?
Claudio DeSanti, Dell; Nishant Lodha, Marvell; Hrishikesh Sathawane, Samsung; Eric Hibbard, Samsung; John Kim, NVIDIA
With ever increasing threat vectors both inside and outside the data center, a compromised customer dataset can quickly result in a torrent of lost business data, eroded trust, significant penalties, and potential lawsuits. Vulnerabilities exist at every point when scaling out NVMe, which require data to be secured every time it leaves a server or the storage media, not only when leaving the data center. NVMe over Fabrics is poised to be the one of the most dominant transports of the future and securing and validating the vast amounts of data that would traverse this fabric is not just prudent, but paramount.
Join the webcast to hear Industry experts discuss current and future strategies to secure and protect your mission critical data.
You will learn:
- Industry trends and regulations around data security
- Potential threats and vulnerabilities
- Existing security mechanisms and best practices
- How to secure NVMe in flight and at rest
- Ecosystem and market dynamics
- Upcoming standards
After you watch the presentation, check out the Q&A blog https://bit.ly/2Wnrk1Y
Christine McMonigal, Intel; John Kim, NVIDIA; Walt O'Brien, Dell; David McIntyre, Samsung
In the ongoing evolution of the datacenter, a popular debate involves how storage is allocated and managed. There are three competing visions about how storage should be done; those are Hyperconverged Infrastructure (HCI), Disaggregated Storage, and Centralized Storage.
IT architects, storage vendors, and industry analysts argue constantly over which is the best approach and even the exact definition of each. Isn’t Hyperconverged constrained? Is Disaggregated designed only for large cloud service providers? Is Centralized storage only for legacy applications?
Tune in to debate these questions and more:
• What is the difference between centralized, hyperconverged, and disaggregated infrastructure, when it comes to storage?
• Where does the storage controller or storage intelligence live in each?
• How and where can the storage capacity and intelligence be distributed?
• What is the difference between distributing the compute or application and distributing the storage?
• What is the role of a JBOF or EBOF (Just a Bunch of Flash or Ethernet Bunch of Flash) in these storage models?
• What are the implications for data center, cloud, and edge?
Join us for another SNIA Networking Storage Forum Great Storage Debate as leading storage minds converge to argue the definitions and merits of where to put the storage and storage intelligence.
After you watch the debate, check out the Q&A blog: https://bit.ly/3kcAwA3
Parmeshwr Prasad, Dell; Olga Buchonina, Chair SNIA Blockchain Storage Technical Work Group, ActionSpot
The storage industry is working on ways to meet the demand for the very high throughput required for the volume of transactions per second in Blockchain operations.
There have been numerous advancements in Field Programmable Gate Array (FPGA) and Application Specific Integrated Circuit (ASIC) logics to improve the number of transactions per second for Blockchain operations. But these FPGA/ASIC improvements will not be sufficient for increasing the demand of hardware resources required for Blockchain. Smart network interface cards (NICs) offload low-level functions from server CPUs, dramatically increasing network and application performance, offloading all network related processing.
In this webcast, you will learn:
• The features of a Smart Network Interface Card (SMART-NIC) and how this will improve Blockchain transactions
• Why using SCM is ideal for in-memory databases
• Advantages of direct data movement without involving filesystems
• Benefits of using SCM to improve Blockchain transactions
Davis Frank, Co-creator Jasmine Test Framework; Alex McDonald, Chair, SNIA CSTI
In the world of cloud services development, it's necessary to gain an edge on the myriad of competition facing your product or service. Volume and variety are not just characteristics of cloud data, but also of the software needed to deliver accurate decisions. While a variety of software techniques exist to create effective development teams, sometimes it's worthwhile to look elsewhere for additional success factors. In this webcast, we'll be focusing on adapting some of the principles of modern manufacturing to add to the development toolbox. A Continuous Delivery methodology ensures that the product is streamlined in its feature set while building constant value to the customer via the cloud. Attendees will learn the following:
- Structuring development and testing resources for Continuous Delivery
- A flexible software planning cycle for driving new features throughout the process
- A set of simple guidelines for tracking success
- Ways to ensure new features are delivered before moving to the next plan
Large-scale computing designs are increasingly multi-node and linked together through high-speed networks. These networks may be comprised of different types of technologies, fungible, and morphing. Over time, many different types of high-performance networking devices will evolve to participate in these modern, coupled-computing platforms. New fabric management capabilities, orchestration, and automation will be required to deploy, secure, and optimally maintain these high-speed networks.
Join this presentation to gain insights from experts representing the Storage Networking Industry Association (SNIA), and the OpenFabrics Alliance (OFA) on how the two organizations are collaborating to improve and promote the vendor neutral, standards-based management of open source fabrics and remote network services or devices in high performance data center infrastructures.
As part of this joint effort, a new open source fabric management framework is being developed by the OpenFabrics Alliance which will integrate with DMTF Redfish® and SNIA Swordfish™ specifications for comprehensive management of servers, storage and fabrics including NVMe® and NVMe over Fabrics (NVMe-oF) technology environments.
Reserve your spot today!
Ben Howard, KinectAir; Glyn Bowden, HPE; Jim Fister, The Decision Place
Start-up companies interested in using business analytics have a series of choices regarding different hardware, software, and services available in the cloud. The decision process for established companies, though, is more significant. Considering whether to use existing practices or start anew creates multiple decision points in any process. This SNIA webcast will feature views from both start-up and established companies on how to make the analytics decision. Attendees should expect to learn:
• Real-world examples of the analytics decision process
• How to use cloud resources in unique ways to accomplish business and engineering goals
• Starting from the perspective of business requirements and developing technical metrics
• Thoughts on when to start new vs. adapt existing analytics processes
After you watch the presentation, check out the Q&A blog: https://bit.ly/3u5pNtm
Erik Smith, Dell Technologies; Rob Davis, NVIDIA; Nishant Lodha, Marvell; Alex McDonald, SNIA NSF Vice Chair
Over the past several years, many in the NVMe over Fabrics (NVMe-oF) ecosystem have used test results demonstrating NVMe-oF’s dramatic reduction in latency as a way to extrapolate the benefit it can provide to application consumers. To date, the focus has been on specialized fabrics like RDMA and Fibre Channel (FC).
Unfortunately, the more important questions have been left as an exercise for the buyer: “How does the transport really impact application performance?” and “How does the transport holistically fit into my environment?”
RDMA based fabrics (e.g., RoCE) provide the lowest possible latency, and FC provides the most reliability, but with the introduction of NVMe/TCP this conversation must also include scale, cost and operations. This webcast will attempt to answer these questions beyond “it depends.”
Gain insights from an industry wide panel of NVMe and fabric technology experts as they discuss the thought process you can use to determine pros and cons of a fabric for your environment, including:
• Use cases driving fabric choices
• NVMe transports and their strengths
• Industry dynamics driving adoption
• Considerations for scale, security, and efficiency
After you watch the webcast, check out the Q&A blog at: bit.ly/3wRPeQV
Rob Enderle, Enderle Group; Eric Hibbard, SNIA Security Technical Work Group; Jim Fister, The Decision Place
Artificial Intelligence technologies are possibly the most substantive and meaningful change to modern business. The ability to process large amounts of data with varying degrees of structure and form enables large leaps in insight to drive revenue and profit. Likewise, governments and civil society have significant opportunity for improvement of the lives of the populace. However, with the power that AI brings comes the risks of any technology innovation. This interactive session will cover some of the ethical issues that AI can bring. Attendees should expect to learn:
• How making decisions at the speed of AI could be ethically challenging
• Examples of how companies have structures to approach AI policy
• The pitfalls of managing the human side of AI development
• Potential legal implications of using AI to make decisions
• Advice for addressing potential ethics issues before they are unsolvable
After you watch the webcast, check out the Q&A blog https://bit.ly/3vW5WOF
20-year SNIA veteran Mike Walker has created a series of videos titled “SMI-S Quick Start Guides” that provides developers using the SMI-S storage management specification instructions on how to find useful information in a SMI-S server using the python-based PyWBEM open source tool. This video covers SMI-S mockup
20-year SNIA veteran Mike Walker has created a series of videos titled “SMI-S Quick Start Guides” that provides developers using the SMI-S storage management specification instructions on how to find useful information in an SMI-S server using the python-based PyWBEM open source tool. Watch this short trailer for a preview of the content you can expect to see in the series.
The Storage Networking Industry Association (SNIA) is a non-profit organization made up of member companies spanning information technology. A globally recognized and trusted authority, SNIA’s mission is to lead the storage industry in developing and promoting vendor-neutral architectures, standards and educational services that facilitate the efficient management, movement and security of information.
What a Year It Was – and Where We Need To Go on Emerging MemoryJim Handy, Objective Analysis and Tom Coughlin, Coughlin Associates[[ webcastStartDate * 1000 | amDateFormat: 'MMM D YYYY h:mm a' ]]55 mins