Hi [[ session.user.profile.firstName ]]

IT Trends for 2017

A recent Forbes survey shows that Digital Transformation will be the highest priority for both IT and line-of-business executives in 2017. Business outcomes will drive IT, and IT will shift its focus from infrastructure to application development and analytics. Some of the major trends for 2017 will redefine the data center and focus on a number of key technologies that will enable the transition from legacy systems to systems of innovation. Operational Technology (OT) from sensors will begin to integrate with IT, and the foundation will be established for Internet of Things (IoT) developments that are currently in the proof-of-concept stage.
Recorded Feb 1 2017 57 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Hu Yoshida, Vice President and Chief Technology Officer, Hitachi Data Systems
Presentation preview: IT Trends for 2017

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Is FC-NVMe Ready for Prime Time? Jun 9 2020 5:00 pm UTC 75 mins
    Mark Jones, Broadcom; Nishant Lodha, Marvell; Marcus Thordal, Broadcom
    The T11 specification for NVMe over Fibre Channel (FC-NVMe) was completed in 2018, since that time, the FCIA has held numerous plugfest events and products have been shipping for a few years. So where are we today with NVMe over Fibre Channel solutions?

    This webcast will take an early 2020 point-in-time snapshot of where the industry is, discuss products available today, and address common questions around:

    •Which host environments can use FC-NVMe
    •What is required from the fabric
    •Breadth of supporting storage solutions
    •Application benefits we have seen so far
    •FC-NVMe strengths and differentiators

    And most importantly, is FC-NVMe ready for prime time?
  • Storage Networking Security Series – Encryption 101 May 20 2020 5:00 pm UTC 75 mins
    Judy Furlong, Dell; Ed Pullin, Intel; Alex McDonald, NetApp
    Encryption has been used through the ages to protect stored secrets, authenticate messages, communicate secretly in broad daylight, and even to check that messages were properly transmitted and received without tamper. Now, it’s often our first go-to tool for making sure that data simply isn’t readable to prying eyes, ears or AI bots.

    But how does encryption actually work, what makes it tick, and how is it managed? How do we ensure compatibility? How do we protect the keys; i.e., “Who will guard the guards themselves?”

    It’s a big topic that we’re breaking down into three parts: Encryption 101, Key Management 101, and Applied Cryptography.

    Join us on May 20th for the first encryption webcast: Storage Networking Security: Encryption 101 where security experts will cover:

    •A brief history of Encryption
    •Cryptography basics
    •Definition of terms – Entropy, Cipher, Symmetric & Asymmetric Keys, Certificates and Digital signatures, etc.
    •Introduction to Key Management
  • NVMe and NVMe-oF Configuration and Manageability with Swordfish and Redfish May 13 2020 6:00 pm UTC 60 mins
    Rajalaxmi Angadi, Intel; Phil Cayton, Intel; Richelle Ahlvers, Broadcom
    SNIA Swordfish is an extension of the DMTF Redfish specification to provide a unified approach for the management of storage and services in converged, hyperconverged, hyperscale, and cloud infrastructure environments. Swordfish uses a client-centric approach to develop the dynamic resource models as part of the specification, which describes client needs, management requirements, and use cases.

    NVMe-oF currently support fabric transports like RDMA (iWarp, RoCE, IB), TCP, and FC. NVMe / NVMe-oF currently lacks efficient remote configuration and provisioning management mechanisms to enable NVMe-oF scaling to large converged infrastructures – something Redfish and Swordfish can provide.

    The SNIA Swordfish specification is currently growing to include full NVMe and NVMe-oF enablement and alignment across DMTF, NVMe, and SNIA for NVMe and NVMe-oF use cases. SNIA members are contributing to specification development and helping to shape the ecosystem. This presentation will provide an overview of the work in progress to map these standards together to ensure NVMe and NVMe-oF environments can be represented entirely in Swordfish and Redfish environments.

    Join us! We welcome your feedback, and encourage participation.
  • NGN [Ep.4] UnWired: How 5G and WiFi 6 are Transforming Network Architectures Apr 30 2020 3:00 pm UTC 60 mins
    Johna Till Johnson, CEO and Founder, Nemertes Research
    Next-Generation Networks [Ep.4]

    New wireless standards like 5G and Wifi 6 aren't just "more of the same". They're dramatically transforming how networks are designed, architected, and delivered.

    Whether you're an equipment provider, a carrier, or an enterprise user, you'll want to get the insight from Nemertes' hot-off-the-presses research into success strategies and best practices for those early adopters rolling out these technologies.

    You'll learn the use cases and vertical industries that are seeing the greatest success, and find out the hiccups and stumbling blocks that organizations are experiencing. And you'll walk away with a blueprint for success when it comes to deploying these next-generation technologies.
  • Storage Networking Security Series: Protecting Data at Rest Apr 29 2020 5:00 pm UTC 75 mins
    Pierre Mouallem, Lenovo; Ahmad Atamhl, Mellanox; Steve Vanderlinden, Lenovo
    One of the most important aspects of security is how to protect the data that is just “sitting there.” How easy is it to get to? Who can get to it? If someone does get access to the data, can they read it? These are just a few of the questions that we try to answer when we go through the process of securing data.

    Contrary to popular belief, however, securing “data at rest” is not simply encrypting the data. While it is true that data encryption plays a major role in securing “data at rest,” there are several other factors that come into play and are equally as important – if not more so.

    For this webcast, we’re going to talk about those other factors (Encryption is deserving of its own, specific webcast). We will present the end-to-end process to securing “data at rest,” and discuss all the factors and trade-offs that must be considered, and some of the general risks that need to be mitigated, discussing:

    • How requirements for “data at rest” differ from “data in flight”
    • Understanding the costs of ransomware
    • How to protect cryptographic keys from malicious actors
    • Using key managers to properly manage cryptographic keys
    • Strengths and weaknesses of relying on government security recommendations
    • The importance of validating data backups... how stable is your media?
  • Fundamentals of 5G Transformation: Security and other Associated Challenges Apr 22 2020 5:00 pm UTC 32 mins
    Jacob Andreas Roya, Director of IT Operations, Phoenix IS-IT Corporation
    Jacob will discuss the ramifications of 5G transformation and associated challenges from a security standpoint.

    He will also cover the fundamentals of industry transformation to 5G, SDN and NGA, both industrial and commercial, and what to expect from such a technological shift.

    About the presenter:
    Jacob has been the IT Director at Phoenix IS-IT Corporation, a subsidiary of Phoenix Communications, since 2016. Phoenix is an MSP, offering a wide range of IT/IS services for small to mid-sized business organizations in the mid-south. Phoenix Communications was founded in 1994 in Memphis TN and have since received nationwide recognition for custom designed automation systems.

    Jacob has spent the last eight years in network engineering and systems administration, with a focus on cybersecurity and penetration testing in the past four.

    He is also heavily focused on threat management, attack simulations and remediation technologies. Jacob's background also includes signal processing and RF design, primarily in the 3GPP and 802.11 domain, which he's now included as part of his ongoing security research.
  • Next-Gen Storage Technology Apr 21 2020 3:00 pm UTC 60 mins
    Stanley Zaffos, Senior Vice President Product Marketing, Infinidat
    Digital business initiatives, AI, core to edge deployment models, security considerations and privacy laws are causing users to gradually shift their focus from building and managing data centers, to using them to deliver competitive advantage to their organizations. Creating a self-managing storage infrastructure shifts the measurement of product attractiveness away from traditional metrics like reliability, availability, performance and scale, to a storage system’s ability to autonomically meet service level agreements (SLAs); seamlessly move data between on premises storage systems and the cloud; and make upgrades and refreshes properties of the infrastructure. In other words, they want an intelligent, living infrastructure that makes data migrations a thing of the past.
    Since all storage vendors use the same components, competitive advantage will derive from differences in vendor business models, target markets and architectural innovation, and be measured by ease-of-use, ecosystem breadth, cloud integration, post-sales support effectiveness and cost. This presentation will help users to optimize their future storage infrastructure visions by exploring:

    How NVMe-oF, AIOPs and hybrid cloud are reshaping infrastructure designs
    The pros and cons of scale-up, scale-out, 3-tier, and HCI architectures
    The strengths and weaknesses of hybrid vs AFA arrays
  • So You Wanna Program Persistent Memory? Meet the PM Programming Contest Winner! Apr 14 2020 6:00 pm UTC 75 mins
    Jim Fister, Director, SNIA Persistent Memory Software Enabling
    SNIA’s Persistent Memory Hackathon Program enters its second year with 300+ developers up to speed on the latest in programming persistent memory -- and SNIA’s NVDIMM Programming Challenge just announced its first winner of distinction. Join our webcast to learn the latest developments in PM, new resources available to learn more about programming to PM, and a dive into the winning application introduced at the recent Persistent Memory Summit.
  • QUIC – Will it Replace TCP/IP? Recorded: Apr 2 2020 61 mins
    Lars Eggert, NetApp; Tim Lustig, Mellanox
    QUIC is a new UDP-based transport protocol for the Internet, and specifically, the web. Originally designed and deployed by Google, it already makes up 35% of Google's egress traffic, which corresponds to about 7% of all Internet traffic. The strong interest by many other large Internet players in the ongoing IETF standardization of QUIC is likely to lead to an even greater deployment in the near future. This webcast will highlight:

    •Unique design aspects of QUIC
    •Differences to the conventional HTTP/TLS/TCP web stack
    •Early performance numbers
    •Potential side effects of a broader deployment of QUIC
  • The Impact of Artificial Intelligence on Storage and IT Recorded: Apr 1 2020 54 mins
    Glyn Bowden, HPE; James Myers, Intel; Alex McDonald, NetApp
    Artificial intelligence (AI) and machine learning (ML) have been having quite the impact on most industries in the last couple of years, but what about our own IT industry? In this webcast find out how the rise of machine learning has created a new type of demand on IT operations teams as well as how those same teams can utilize new insights and capabilities driven by machine learning. We will explore:
    •The demand on infrastructure
    •Storage and data pipelines
    •The growing field of IT operations leveraging AI (aka AIOps)
  • The Making of Fibre Channel Standards Recorded: Mar 31 2020 58 mins
    Barry Maskas, HPE; Joe Kimpler, Independent Industry Expert
    We rely on technical standards for all facets of daily life. Yet it is easy to take technology standards for granted, forgetting that they underpin the technology used every day. As participants in the IT sector it is important for us to learn how standards are developed, why standards matter and how we all benefit from them.

    In this webcast, we’ll pull back the curtain on the standard development process, explain what makes something a standard, and decode a few funky common acronyms. You’ll learn:

    •The differences between a standard and a specification
    •Who is INCITS and what’s their role?
    •T11 Fibre Channel standards development process
    •T11 Fibre Channel Standards
    •Current Fibre Channel standards under development
    •Benefits of standards when architecting Fibre Channel solutions
  • Ethernet-attached SSDs—Brilliant Idea or Storage Silliness? Recorded: Mar 17 2020 68 mins
    Mark Carlson, Kioxia; Rob Davis, Mellanox; John Kim, Mellanox; Ted Vojnovich, Lenovo
    Several SSD and networking vendors have recentl¬y demonstrated ways to connect SSDs directly to an Ethernet network. They propose that deploying Ethernet SSDs will be more scalable, easier to manage, more performant, and/or lower cost than traditional storage networking solutions that use a storage controller (or hyperconverged node) between the SSDs and the network.

    Who would want to attach SSDs directly to the network? Are these vendors brilliant or simply trying to solve a problem that doesn’t exist? What are the different solutions that could benefit from Ethernet SSDs? Which protocols would one use to access them? And how do Ethernet SSDs relate to computational storage? Join this SNIA Networking Storage Forum webcast to learn all this and more as SNIA experts discuss:

    •What are the appropriate use cases for Ethernet SSDs?
    •Why Ethernet SSDs could be appealing and more efficient
    •How Ethernet SSDs compare to other forms of storage networking
    •Different ways Ethernet SSDs can be accessed, such as JBOF/NBOF, NVMe-oF, and Key Value
    •How do Ethernet-attached SSDs enable composable infrastructures?
  • Surviving Ransomware Recorded: Mar 11 2020 51 mins
    Ensono | Zerto | Crisis Team | Cybersec Innovation Partners | Meta Defence Labs
    The estimated cost of ransomware for 2019 is $11.5bn, more than many global industries and markets. Think about that, the total cost of ransomware for this year will be more than many Fortune 1000 organizations make in revenue.

    The cost of ransomware isn’t simply the requested ransom, something most will recommend you don’t pay. It’s the cost of recovery, the cost of data loss, the loss in productivity, the intangible damage to your reputation and the most direct cost: a disruption of your services. With the prevalence and also ingenuity behind Ransomware attacks prevention isn’t the answer.

    Organizations have never had success stopping attacks. To survive, they need to build a strong internal security culture that mitigates risk. Surviving the accident is what’s important, not preventing it in the first place.

    Panel moderated by: Simon Ratcliffe, Technology Evangelist, Ensono
    Panelists: Steve Blow, UK Systems Engineering Manager, Zerto
    Bill Mew, CEO & Founder, Crisis Team
    Chani Simms, Managing Director, Meta Defence Labs
  • Enterprise Security in a Multi-Cloud World Recorded: Mar 11 2020 53 mins
    Simon Ratcliffe, Ensono | Kevin Bailey, Omnisperience | Martin McCloskey, Octopus Labs
    Due to the fast pace of cloud adoption, enterprises worldwide are looking to employ cloud security solutions to safeguard their data and workloads. Join industry experts as they discuss and debate the best strategies for breach prevention and how to make sure your practicing cyber hygiene in a world of multi-cloud computing.

    Topics for discussion will include:

    - How to adopt a multi-cloud security strategy
    - Addressing your cyber risks and challenges
    - Managing vulnerabilities, detecting breaches and responding to incidents
    - Recommendations for improving enterprise cloud security
    - Why prevention has failed insider threat

    Moderated by: Simon Ratcliffe, Technology Evangelist, Ensono
    Martin McCloskey, Senior Security Operations Analyst, Octopus Labs
    Kevin Bailey, Managing Director & Principal - Security Research, Omnisperience
  • [Panel] Exploring Real World Digital Transformation at the Edge Recorded: Feb 20 2020 45 mins
    Michelle Ruyle | Fred Hintermister | Dr. Lorraine Basset | Dale Tucker
    Edge computing is key to meeting Digital Transformation demands, and at the dawn of this new decade, nearly every industry will be able to take advantage of edge technology to propel their Digital Transformation programs.

    Join this panel, live or on demand, to take a closer look at how real businesses and verticals are implementing edge computing, and the challenges and successes they’re seeing.

    From understanding the business requirements, and overcoming the complex technical requirements, we’ll look at:

    - Dealing with the hyper-converged infrastructure demands of edge computing for digital transformation
    - Automation and remote management capabilities for edge sites
    - Navigating how edge computing requires organizations to change their thinking around new revenue streams, products, services, and business models
    - And more

    Moderator: Michelle Ruyle, CEO & Founder, Optimized Channel
    Fred Hintermister, Vice President, Energy Protection, Global Resilience Federation
    Dr. Lorraine Bassett, Principal, WWPS Technical Business Development Leader, IoT, Amazon Web Services
    Dale Tucker, Senior Director Global Alliances, Equinix
  • Smart Cities’ Digital Transformation: Hosted Edge IOT Platforms Recorded: Feb 20 2020 44 mins
    Chris Davis Vice President, Smart Cities and Strategic Alliances CIMCON Lighting, Inc.
    Smart cities are driving towards Digital Transformation to improve city operations and citizen services. Innovative outdoor Edge technologies deployed on smart streetlights will accelerate that transformation by powering connected sensors and controls, collecting data, managing devices and cybersecurity, local processing, backhaul over wireless networks, and cloud applications for user displays, alerts, reporting and data analytics.
    This webinar introduces an Innovative, outdoor Smart City Edge IoT Platform. Installed on a luminaire, the Edge-based platform performs multiple data functions for connected sensors – capture, analysis, aggregation from multiple sensors, and communication – to cloud SaaS applications. In addition, the Edge platform delivers network flexibility, communicating data to the cloud over both wireless smart grid and cellular networks.
    Technology factors driving Edge platform adoption and wireless infrastructures for smart city applications will be discussed:
    •Improve security
    •Speed data analysis
    •Reduce the volume of data transmissions
    •Lower hardware compute and storage costs
    •Edge Analytics
    oDiagnostic analysis
    oMetrics and measurement for real-time analysis
    oData analysis plus Artificial Intelligence and Machine Learning

    Real and installed “smart” applications using this technology – urban planning, traffic statistics, bicycle and people counting, road condition monitoring, environmental air quality, power line monitoring, video and audio analytics – and their associated benefits will be highlighted.
  • Cloud to Edge: Architecting for the Next Generation of the Internet Recorded: Feb 20 2020 43 mins
    Wesley Reisz, VP of Technology at Section, Chair of QCon San Francisco, & Co-Host of the InfoQ Podcast
    Edge computing continues to make headlines as leading enterprises, including Amazon and Walmart, announce differentiation strategies centered around this emerging compute paradigm.

    Centralized cloud infrastructure, as we know it today, isn’t equipped to handle the amount of data being generated by an explosion of connected devices. At the same time, user expectations around speed, availability, security, privacy, personalization and more are driving application developers to seek new ways to differentiate themselves in crowded markets. Many software architects are turning to edge computing as a path to innovation.

    Join Wes Reisz (VP of Technology at Section and Co-host of the InfoQ Podcast) as he demonstrates why now is the time to adopt an effective edge strategy and what it means to architect, build and deploy edge-aware distributed systems.

    Key Takeaways:

    - Understand the current state of edge computing and common use cases driving adoption, including real-world stories of how organizations are leveraging application architecture as a competitive advantage.
    - Gain tactical insights on how to evaluate your current application architecture to identify opportunities and begin implementing an effective edge strategy today.
    - Learn how to speed up development cycles, eliminate operational overhead, and improve developer experience using automation techniques such as GitOps at the edge.
  • Digital Transformation at the Edge enabled by standardization Recorded: Feb 20 2020 37 mins
    Cristina Badulescu, Vice Chair, NFV ISG, ETSI
    As 5G roll-outs take off, enabling a variety of new applications and services running at the network Edge plays an essential role in establishing new business models and revenue streams. Digital transformation becomes a pre-requisite for the 5G networks offering automation, zero-touch management and orchestration of not only the necessary resources and connectivity needed for edge computing and of the edge computing platforms offered, but also the applications running at the edge.

    Multi-vendor deployments require interoperability, enabled by the current standardization work support as well as its further evolution in support of emerging business models and their required deployment models. Standards Developing Organizations such as ETSI NFV, ETSI ZSM as well as 3GPP and open source initiatives are building blocks for multi-vendor deployments and for rapidly adding new edge applications and services.
  • Using Network Orchestration to Build an Open, Elastic Edge Recorded: Feb 20 2020 36 mins
    Diego R. Lopez, Senior Technology Expert at Telefonica I+D, chair ETSI ISGs NFV and PDL
    The most promising use cases for edge computing, related to demanding network features and scenarios like industrial IoT, require to go beyond current network services, and support a much more dynamic way of consuming them.

    The traditional borders between local and wide area networks, between network segments, and between application and network services themselves tend to blur into a continuum of network services supporting user applications.

    Techniques like the emerging In-Network Computing paradigm require multi-dimensional openness (among computing environments, across network segments, along geographical areas and operators…) and have to rely on holistic network orchestration to achieve the promise of an elastic edge.
  • Digital Transformation at the Edge Recorded: Feb 20 2020 33 mins
    Simon Ratcliffe, Technology Evangelist, Ensono
    This webinar will examine Edge Computing across a variety of environments and discuss how to build a stable, secure and manageable Edge environment that can form the foundation for transformational change within organisations. Edge is not a new idea but exploiting the Edge effectively does require some new thinking some of which is counter-intuitive in the modern cloud centric world in which we operate. 5G is going to unleash a whole new wave of possibilities around remote devices and as IT functions we are going to be under more and more pressure to deliver on the promise so we need to get our houses in order and build a platform that will act as a springboard and not pitch us flat on our faces.
Best practices for achieving Enterprise IT and operational efficiency.
The Enterprise Architecture channel presents the next generation of Enterprise IT: recognizing the strategic importance of digital transformation and the data center to make companies more nimble and competitive. These presentations will help demanding IT and BizOps professionals achieve flexibility, scalability and performance with reduced risk and complexity.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: IT Trends for 2017
  • Live at: Feb 1 2017 2:00 pm
  • Presented by: Hu Yoshida, Vice President and Chief Technology Officer, Hitachi Data Systems
  • From:
Your email has been sent.
or close