Solving the SAN Storage / VMware Performance Puzzle
It’s falsely assumed that VMware is the source of many performance problems since it is relatively new in the datacenter. Others will claim it’s not VMware but the underlying storage. To break this cycle there are now many new acronyms being introduced to the SAN Storage / VMware environment such as VAAI, NPIV, SIOC, SATP and PSP - but what do they all mean and how do they benefit the IT organization?
How does one guarantee that these new storage initiatives will easily fit your existing environment, reduce performance problems, and reap benefits instead of adding more complexity and a new set of problems? Even without such initiatives, how does one maintain an application’s performance once it’s been virtualized and how does one accurately determine how many VMs to deploy on an ESX server in I/O-intensive environments?
Join Scott Lowe, VMware-Cisco Solutions Principal for EMC and Archie Hendryx, Senior Solutions Consultant for Virtual Instruments, as they address these issues and provide insights as to how a comprehensive view, from the VM to the LUN, is imperative for further consolidation and safe Physical to Virtual migrations of your Tier 1 applications.
RecordedSep 8 201158 mins
Your place is confirmed, we'll send you email reminders
Kubernetes has emerged as a hugely important foundation for edge computing. But should you incorporate Kubernetes and Containers into your Edge computing strategy? And if so, how?
Join this expert panel on BrightTALK, where we discuss why Kubernetes is ideal for running containers in edge computing environments. We’ll cover:
- The impact of using containers and orchestration as tools for enterprises to create small server farms at the edge
- How Kubernetes enables developers and DevOps engineers to deploy applications and services in a standard way at the edge
- Which orchestration tools make it easy to install Kubernetes on the edge infrastructure
Paul Burt, Technical Product Marketing Engineer, NetApp; Jim Fister, Principal, The Decision Place
The need for rapid deployment of scalable clusters is creating an opportunity for container solutions such as Kubernetes. But what are the implications of multiple Kubernetes clusters in a broad deployment? What happens if a cluster goes down? What’s the impact on business resiliency? Managing and securing multiple clusters is becoming a key topic and area of debate. Multi-cluster Kubernetes that provides robustness & resilience is rapidly moving from “best practice” to a “must have”.
In this webcast we’ll dive into:
•The history of multi-cluster Kubernetes
•How multi-cluster setups could affect data heavy workloads (such as multiple microservices backed by independent data stores)
•Managing multiple clusters
•Keeping the business functioning if a cluster goes down
•How to prepare for the coming datapocalypse
The days of manually deploying infrastructure are over. IT teams need automation tools to modernize towards IT-as-Code. This is achieved through flexibility; IT teams must operate on a platform that accommodates CI/CD pipelines. The pipelines, in turn, must meld with DevOps tools to integrate with ticketing systems, run security remediation playbooks, deploy Kubernetes with a security benchmark, and even harden on-premise sensors.
- What is DevSecOps and what are CI/CD pipelines
- How CI/CD Pipelines work for DevSecOps
- Why enterprises need hybrid CI/CD pipelines
- Use cases
David Ginsburg, Aryaka VP of Product and Solutions Marketing
COVID-19 was (and is) a wake-up call for CIOs and their teams as to the flexibility, resiliency, and scalability of their hybrid cloud and WAN infrastructures. We look at how enterprises prepared for this ‘black swan’ event, how they were able to quickly adapt in a ‘lights-out’ operation, and best practices for the future. I’ll cover architectures, support for remote workers and remote operations, and what we’ve learned for the future.
John Burke, CIO and Principal Research Analyst, Nemertes Research
Enterprises accumulate new cloud solutions rapidly, but still run 40% of their workloads in their own data centers. Without a plan, the result is an unsupportable mess. Join Nemertes Research as we discuss how to pull all the pieces together to make a coherent hybrid multicloud IT can manage, and use to deliver real business value.
Jo Peterson, Clarity360 | Bobby Allen, CloudGenera | Matthew Douglas, Sentara Healthcare
Discover how to adopt, migrate, scale and secure a multi-cloud infrastructure.
Adoption of multi cloud is soaring. According to ITPro, 76% of the organisations surveyed reported that they were already using from two to 15 hybrid clouds. The transition to cloud introduces a very different operating model for IT.
During this session the focus areas will include:
- Utilizing a multi cloud strategy, formal multi cloud architecture and tooling
- Discussion around running, connecting and securing workloads in this model
- Defining the unique challenges for operations, security, networking, and development teams in the multi cloud model
Jo Perterson, Vice President, Cloud and Security Services, Clarify360
Bobby Allen, CTO & Chief Evangelist at CloudGenera, Inc.
Matthew Douglas, Chief Enterprise Architect, Sentara Healthcare
One panelist to be announced
Robert Cone, Intel; Piyush Chaudhary, IBM; Pekon Gupta, SMART Modular
As data growth in enterprises continues to skyrocket, datacenter cloud scalability, whether on premises, in hybrid cloud or in multicloud deployments, is key for businesses. So, what are enterprise IT organizations supposed to do, given that 'run anything anywhere' is becoming more important than ever? Customers are finding that hybrid cloud storage solutions better meet their IT and business growth needs, so they can rapidly scale their IT infrastructure and cover a wider array of services. This webcast will help architects and consumers of hybrid cloud storage solutions better understand:
oTrends and benefits of hybrid cloud storage and multicloud deployments
oThe range of technologies and capabilities under development to help enterprise hyperscalers and cloud service providers (CSPs) serve IT customers
oHow scalability differs in block vs. file workloads
oThe important requirements to keep in mind when considering a 'run anything anywhere' objective
In order to effectively use cryptography to protect information, one has to ensure that the associated cryptographic keys are also protected. Attention must be paid to how cryptographic keys are generated, distributed, used, stored, replaced and destroyed in order to ensure that the security of cryptographic implementations are not compromised.
This webinar will introduce the fundamentals of cryptographic key management including key lifecycles, key generation, key distribution, symmetric vs asymmetric key management and integrated vs centralized key management models. Relevant standards, protocols and industry best practices will also be presented.
Mark Jones, Broadcom; Nishant Lodha, Marvell; Marcus Thordal, Broadcom, Joe Kimpler, Independent Expert
The T11 specification for NVMe over Fibre Channel (FC-NVMe) was completed in 2018, since that time, the FCIA has held numerous plugfest events and products have been shipping for a few years. So where are we today with NVMe over Fibre Channel solutions?
This webcast will take an early 2020 point-in-time snapshot of where the industry is, discuss products available today, and address common questions around:
•Which host environments can use FC-NVMe
•What is required from the fabric
•Breadth of supporting storage solutions
•Application benefits we have seen so far
•FC-NVMe strengths and differentiators
And most importantly, is FC-NVMe ready for prime time?
Johna Till Johnson, CEO and Founder, Nemertes Research; Russell Rice, VP Product Strategy at Ordr
IoT initiatives are exploding. Nemertes has found that companies with successful IoT initiatives are increasing both the number of projects and the device count, with growth that ranges up to 100%+ year over year.
Scaling these initiatives requires scaling not only the IoT solutions, but also the infrastructure and cybersecurity environments in which they operate. As enterprise technologists begin to apply next-generation cybersecurity approaches like zero-trust, they need to think seriously about how to automate the control and management of their cybersecurity and infrastructure.
The answer? Automation. Successful organizations are more likely to automate earlier, more aggressively, and more comprehensively—with dramatic improvements in performance, security, and reliability.
Find out why automation is critical to securing, managing, and scaling IoT—and what best practices can help ensure success in implementing it.
Get an overview of the possibilities and ways of Industry 4.0 – starting with how you can benefit from IO-Link.
IO-Link is a key pillar in the path to Industry 4.0. What exactly is it? And are you already embracing IO-Link? Let us show you how to get the most out of your IO-Link investment and how you can use it to enable real Industry 4.0 use-cases. You will walk away with know-how on real industrial applications of IO-Link and get set on a sustainable path to Industry 4.0
What you will learn:
- The Basics of IO-Link
- How to use IO-Link in Automation Systems
- Visualization of sensor data for efficient troubleshooting and predictive maintenance
- Read/write process and service data as basis for flexible production (keyword lot size 1)
- Outlook REST API - the way to the cloud (ERP, MES)
Live demonstrations of:
- Sensor self-diagnosis in action with IO-Link
- REST API in action with an IO-Link Master
- Data visualization and recording for Cloud applications
Ruchir Shastri (SoftSys Hosting), Philip Ng (BitCyber), Adnyesh Dalpati (4 Marketing Technology Venture) + Okta speaker
The APAC region reportedly spent $375 billion on Digital Transformation projects in 2019. According to IDC, “The adoption of emerging technologies supporting digital transformation strategies in APAC is shaping up as it’s helping organizations reimagine their businesses, re-evaluate their value chain, reconnect with their customers, and rebuild their organization into a digital native enterprise”.
But with reimagining and reevaluating comes the challenge of navigating what’s currently in place. Nowhere is this more apparent than with technology and legacy systems. For organisations that have been around since before the internet, Digital Transformation has a whole host of extra challenges.
Join this expert panel as they address these challenges, including:
- How the functionality of legacy systems can make it tricky to know when to stick or twist
- How to ensure your Digital Transformation strategy is robust enough to avoid failures and gain competitive advantage
- How to manage the impact of Millennials in the workplace - who expect continuous change and evolution
Digital transformation has now become an important strategic choice for business and governments to deliver secure and fit for purpose solutions fast. Implementation methodologies like Agile and DevOps are tools in this transformational tool kit. You and your team’s creativity and innovation underpin success, and quality data is the currency that will create trust and unlock delighted customer and citizenry experiences, delivered quickly.
Speed of implementation, ability to pivot and delivery resilience of the teams and the delivery environment have become foundational to how we need to approach delivery. Without a robust delivery chain in the SaaS implementation, you will be vulnerable - it is just a matter of time before the rainy day turns into a perfect storm. Data, data sovereignty and increasing awareness of privacy and social contracting is vital to create trust, and to keep it. SaaS vendors need to be able to respond regardless of set ideas, their economies of scale plans may have to be thought of from a geo-social perspective now also, not just a one-sided business argument. Customers and users vote with clicks and their feet. Ensure you are the on the receiving end of the shopping cart.
Kobus Dippenaar, Director & Digital Transformation Implementer, The Practitioners Limited
Blair Loveday, Co-Founder & Chief People Officer, CultureXP
Rod Crowder, Managing Director, OpsCentre & Chris Shannon, Manager Product Development, 5G Networks
The current pandemic has forced all organisations to face into the new normal. The survivors are already restarting by adapting to new market opportunities, optimising change and preparing for uncertainty. This dramatic shift has also changed the face of digital transformation (DX).
Learn from industry experts Rod Crowder and Chris Shannon as they guide us through the key learnings from previous events and apply these to reshaping the new face of DX. They will analyse key requirements every market is demanding right now in the search for control, agility and speed.
The presentation will also explore the key success factors for organisations considering changes to their digital strategy and outline why Digital Resilience has become the new currency for strategic transformation.
Alex McDonald, Eli Tiomkin, Jonmichael Hands, Jim Fister
Discover how the themes of computational storage, persistent memory, and solid state come together in a webcast from the new SNIA Compute, Memory, and Storage Initiative. We’ll explore how expertise in these three areas can help understand storage architectures, common solution areas, and their impacts on storage devices, systems, and software.
Pierre Mouallem, Lenovo; Ahmad Atamli, Mellanox; Steve Vanderlinden, Lenovo
One of the most important aspects of security is how to protect the data that is just “sitting there.” How easy is it to get to? Who can get to it? If someone does get access to the data, can they read it? What are the potential risks of the wrong people reading the data? These are just a few of the questions that we try to answer when we go through the process of securing data.
Contrary to popular belief, however, securing “data at rest” is not simply encrypting the data. While it is true that data encryption plays a major role in securing “data at rest,” there are several other factors that come into play and are equally as important – if not more so.
For this webcast, we’re going to talk about those other factors (Encryption is deserving of its own, specific webcast). We will present the end-to-end process to securing “data at rest,” and discuss all the factors and trade-offs that must be considered, and some of the general risks that need to be mitigated, discussing:
• How requirements for “data at rest” differ from “data in flight”
• Legal and regulatory reasons to protect (or delete) data at rest
• Where and how data could be attacked
• Understanding the costs of ransomware
• How to protect cryptographic keys from malicious actors
• Using key managers to properly manage cryptographic keys
• Strengths and weaknesses of relying on government security recommendations
• The importance of validating data backups... how stable is your media?
Judy Furlong, Dell Technologies; Ed Pullin, Intel; Alex McDonald, NetApp
Encryption has been used through the ages to protect stored secrets, authenticate messages, communicate secretly in broad daylight, and even to check that messages were properly transmitted and received without tamper. Now, it’s often our first go-to tool for making sure that data simply isn’t readable to prying eyes, ears or AI bots.
But how does encryption actually work, what makes it tick, and how is it managed? How do we ensure compatibility? How do we protect the keys; i.e., “Who will guard the guards themselves?”
It’s a big topic that we’re breaking down into three parts: Encryption 101, Key Management 101, and Applied Cryptography.
Join us on May 20th for the first encryption webcast: Storage Networking Security: Encryption 101 where security experts will cover:
•A brief history of Encryption
•Definition of terms – Entropy, Cipher, Symmetric & Asymmetric Keys, Certificates and Digital signatures, etc.
•Introduction to Key Management
After you watch the webcast, check out the Encryption 101 Q&A blog at https://bit.ly/2ZGMisl
John Burke, CIO and Principal Research Analyst, Nemertes Research
Next-Generation Networking [Ep.5]: The New WAN Economics
Enterprise WAN traffic patterns are shifting. The application mix is changing. And the WAN is becoming core to digital transformation (and to resilience in the post-COVID-19 era).
The two fundamental questions that network and telecom managers must answer right now are these: How much should I be spending on my WAN to achieve measurable success, and what services and solutions deliver the greatest bang for the buck (in terms of quantitative success per dollars invested)?
This webinar shares the findings of the 2020-2021 Next Generation Networks research study and compares a cost analysis of solutions such as:
*WAN Cloud Exchanges (WAN-CX)
* Direct Cloud Connect (DCC)
* Carrier Ethernet
* Business and Broadband Internet
* Fiber and wavelength services
We compare the network spend by users of solutions and services from providers such as AT&T, Centurylink, Cisco, Citrix, Comcast, Juniper, Oracle/Talari, VMWare Velocloud, Verizon and others. And we correlate the spend and provider with success overall.
Glyn Bowden, HPE, Eric Hibbard, Co-Chair, ABA, IoT Committee; Alex McDonald, NetApp
More and more we are seeing compute and inference move to the edge. This is driven by the growth in capability to not only generate data from sensors, devices and by people operating in the field, but also by the interaction between those devices.
This new source of data and information brings with it unique challenges to the way we store and transmit data as well as the way we need to curate it. In this webcast we will look at:
•New patterns generated by the explosion of the Internet of Things
•How IoT is impacting storage and data strategies
•Security and privacy issues and considerations
•How to think about the lifecycle of our information in this new environment
Robin Gareiss, President and Founder, Nemertes Research
Cost-Benefit Analysis - Workplace Collaboration Series [Ep.3] Contact Center Costs & Provider Ratings
As companies increase their focus on the customer experience, contact centers are front-and-center to any technology decision. Nemertes conducted a study of 564 organizations to gather real-world operational costs and provider ratings. In this webinar, you'll learn:
*How much do companies spend on contact center licensing and IT staff to support the technology?
*Do cloud contact center services cost less to operate than on-premises platforms?
*Which contact center providers deliver the highest-rated customer service, technology, analytics, and more?
*What do companies spend on operational costs, by provider?
You'll be armed with information to make provider and architecture decisions based on costs and ratings from actual customers of contact center providers.
Best practices for achieving Enterprise IT and operational efficiency.
The Enterprise Architecture channel presents the next generation of Enterprise IT: recognizing the strategic importance of digital transformation and the data center to make companies more nimble and competitive. These presentations will help demanding IT and BizOps professionals achieve flexibility, scalability and performance with reduced risk and complexity.
Solving the SAN Storage / VMware Performance PuzzleScott Lowe, VMware-Cisco Solutions Principal at EMC & Archie Hendryx, Senior Solutions Consultant for Virtual Instruments[[ webcastStartDate * 1000 | amDateFormat: 'MMM D YYYY h:mm a' ]]58 mins