QUIC is a new UDP-based transport protocol for the Internet, and specifically, the web. Originally designed and deployed by Google, it already makes up 35% of Google's egress traffic, which corresponds to about 7% of all Internet traffic. The strong interest by many other large Internet players in the ongoing IETF standardization of QUIC is likely to lead to an even greater deployment in the near future. This webcast will highlight:
•Unique design aspects of QUIC
•Differences to the conventional HTTP/TLS/TCP web stack
•Early performance numbers
•Potential side effects of a broader deployment of QUIC
After you watch the presentation, check out the Q&A blog at https://bit.ly/QUICQ-A
RecordedApr 2 202061 mins
Your place is confirmed, we'll send you email reminders
With the growth of data generation at the Edge and need to get value from that data quickly, the market has run into a hurdle on how to get enough compute and processing with the available space, power and budget. The ability to deploy compute resources within the storage devices with Computational Storage is key to the growth of this market.
This presentation will discuss the deployment of small form factor, asic-based, solutions that bring value to end customers and platform developers. Including a specific use case to be showcased.
Jean-François Marie, Chief Solution Achitect, Data Center Business Unit Kalray
The variety of architectures, use-cases and workloads to be managed by Data Center appliances is increasing. It is driving a need for storage and compute disaggregation, while at the same time forcing IT pros to simplify Data Center management and move to hyper-converged infrastructure. However the HCI approach results in siloing of storage that leads to capacity waste and scalability issue. This presentation describes how Kalray’s fully programmable Smart Storage adapter leverages NVMe-oF technology to offload servers from heavy storage disaggregation task, and pave the way toward a fully Composable Infrastructure.
Paul Stringfellow, Technical Director Gardner Systems
In our digitally focussed world, we constantly hear about how data is the new oil and how it has become a crucial data asset. Yet many of us still do not have a strategy that focusses on our data and ensuring we get the best from it. In this session we will look at why it’s crucial to have a data strategy in todays modern business, what we need to consider and how we build a platform that is appropriate to meet our data demands. A strategy that is centred upon our data and not restricted by our location, technology or working practices. For those businesses who want to be the successes of tomorrow, data will be at the core of that success, but without a data centric strategy you have already conceded ground to your competition, where’s yours?
Marcus Thordal, Broadcom; Craig Carlson, Marvell; Mark Jones, Broadcom
Why do we need enhanced error recovery? And, how does it work? In this webcast we explore the fact that “bit errors happen” and how that occurs. We also do a deep dive into the mechanism of the enhanced error recovery added to FC-NVMe-2. Join FCIA experts as they guide you through the intricacies of error detection and recovery to provide the most reliable NVMe over Fibre Channel deployment possible.
Greg Orme - Author of The Human Edge and Harriet Jamieson - Senior Content Manager, BrightTALK
Join Greg Orme, author of the Business Book of the Year 2020 and innovation guru, in conversation with Harriet Jamieson. Greg will be sharing why creativity and curiosity are superpowers in the digital economy, along with the skills you need to survive and thrive in a world of artificial intelligence.
Join this interview to learn why you should stop competing - and instead do things machines can't.
This webinar is brought to you by the Vivit Project and Portfolio Management (PPM) Special Interest Group (SIG).
Whether you’re using waterfall, agile, or some of each, you need to be able to assign work, track progress, and make adjustments as needed. In this webinar, we’ll go over the new Team Management features in Micro Focus Product and Portfolio Management (PPM) and discuss how they fit into your existing Resource Management practice. You’ll see how the features work, hear about real use-cases, and learn:
•How to track capacity across multiple teams and projects
•How to check that you have the right roles filled for upcoming needs
•The best way to make sure you have the right balance for your strategic initiatives
Fred Zhang, Intel; Eden Kim, Calypso Systems; David Woolf, UNH-IOL; Tom Friend, Illuminosi
NVMe over Fabrics technology is gaining momentum and getting more tractions in data centers, but there are three kinds of Ethernet based NVMe over Fabrics transports: iWARP, RoCEv2 and TCP. How do we optimize NVMe over Fabrics performance with different Ethernet transports?
Setting aside the consideration of network infrastructure, scalability, security requirement and complete solution stack, this webcast will explore the performance of different Ethernet-based transport for NVMe over Fabrics at micro benchmark level. We will show three key performance indicators: IOPs, Throughput, and Latency with different workloads including: Sequential Read/Write, Random Read/Write, 70%Read/30%Write, with different data size. We will compare the result of three Ethernet based transports: iWARP, RoCEv2 and TCP.
Further, we will dig a little bit deeper to talk about the variables that will impact the performance of different Ethernet transports. There are a lot of variables that you can tune but these variables will impact the performance of each transport to different extents. We will cover the variables:
1.How many CPU cores are needed (I’m willing to give)?
2.Optane SSD or 3D NAND SSD?
3.How deep should the Q-Depth be?
4.Why do I need to care about MTU?
This discussion won’t tell you which transport is the best. Instead we unfold the performance of each transport and tell you what it would take for each transport to get the best performance, so that you can make the best choice for your transport for NVMe over Fabrics solutions.
After you watch the presentation, check out the Q&A blog: https://bit.ly/36A44AU
Fausto Vaninetti, Cisco Systems and SNIA EMEA Board Advisor; Igor Konopko, Intel; Paul Talbut, SNIA EMEA
RAID on CPU is an enterprise RAID solution specifically designed for NVMe-based solid state drives (SSDs). This innovative technology provides the ability to directly connect NVMe-based SSD’s to PCIe lanes and make RAID arrays using those SSD’s without the need for a RAID Host Bus Adapter (HBA). As a result, customers gain NVMe SSD performance and data availability without the need of a traditional RAID HBA.
This webcast will recall key concepts for NVMe SSDs and RAID levels and will take a deep dive into RAID on the CPU technology and the way it compares to traditional Software and Hardware RAID solutions. Learn more about this new technology and how it is implemented, and gain a clear insight into the advantages of RAID on the CPU.
John Kim, NVIDIA; Brian Will, Intel; Ilker Cebeli, Samsung
Everyone knows data volumes are exploding faster than IT budgets. And customers are increasingly moving to flash storage, which is faster and easier to use than hard drives, but still more expensive. To cope with this conundrum and squeeze more efficiency from storage, storage vendors and customers can turn to data reduction techniques such as compression, deduplication, thin provisioning and snapshots. This webcast will specifically focus on data compression, which can be done at different times, at stages in the storage process, and using different techniques. We’ll discuss:
•Where compression can be done: at the client, on the network, on the storage controller, or within the storage devices
•What types of data should be compressed
•When to compress: real-time compression vs. post-process compression
•Different compression techniques
•How compression affects performance
Tune in to this compact and informative SNIA webcast, which packs in copious content .
The storage industry has many applications that rely on storing data as objects. In fact, it’s the most popular way that unstructured data is accessed. At the drive level, however, the devil is in the details. Normally, storage devices store information as blocks, not objects. This means that there is some translation that goes on between the data as it is consumed (i.e., objects) and the data that is stored (i.e., blocks).
Naturally, being efficient means that there are performance boosts, and simplicity means that there are fewer things that can go wrong. Moving towards storing key value pairs that get away from the traditional block storage paradigm make it easier and simpler to access objects.
Both The NVM Express™ group and SNIA have done quite a bit of work in standardizing this approach:
•NVM Express™ has completed standardization of the Key Value Command Set
•SNIA has standardized a Key Value API
•Spoiler alert: these two work very well together!
What does this mean? And why should you care? That’s what this webinar is going to cover! This presentation will discuss the benefits of Key Value storage, present the major features of the NVMe-KV Command Set and how it interacts with the NVMe standards. It will also cover the SNIA KV-API and open source work that is available to take advantage of Key Value storage.
We’ll be going deep under the covers to discuss:
•How this approach is different than traditional block-based storage
•Why doing this makes sense for certain types of data (and, of course, why doing this may not make sense for certain types of data)
•How this simplifies the storage stack
•Who should care about this, why they should care about this, and whether or not you are in that group
Eric Hibbard, SNIA Security Technical Work Group Chair; Casey Boggs, ReputationUS; Paul Talbut, SNIA EMEA
Protection against cyber threats is recognized as a necessary component of an effective risk management approach, typically based on a well-known cybersecurity framework. A growing area to further mitigate risks and provide organizations with the high level of protection they need is cyber insurance. However, it’s not as simple as buying a pre-packaged policy.
This webcast will provide an overview of how cyber insurance fits in a risk management program. It will identify key terms and conditions that should be understood and carefully negotiated. Cyber insurance policies may not cover all types of losses, so it is critical to identify what risks and conditions are excluded from a cyber insurance policy before you buy.
Join this webcast to learn:
•General threat tactics, risk management approaches, cybersecurity frameworks
•How cyber insurance fits within an enterprise data security strategy
•Nuances of cyber insurance – exclusions, exemption, triggers, deductibles and payouts
•Challenges associated with data stored in the cloud
After you watch the webcast, check out the Q&A blog: https://bit.ly/36ijYzI
David Peterson, Broadcom; Barry Maskas, HPE; Kiran Ranabhor, Cisco
Fibre Channel Services such as the Fabric Login Server, Fabric Controller, and Name Server are used to support management and operation of a Fibre Channel Fabric by providing a method of registering and maintaining devices connected in the network. As the need for additional Fabric Services, such as traffic flow analysis and congestion management have surfaced, Fibre Channel continues to evolve to ensure easy data center scalability.
In this webcast, FCIA experts will provide context to the terminology and dive into Fibre Channel Services, including device and topology discovery, zoning, security, clock synchronization and management. It will also decode some common acronyms like, FC-CT, FC-GS-9, and FC-SW-8.
Join us to learn:
•What are Fabric Services?
•Overview of long-standing Fabric Services and what the newer Fabric Services provide
•What is FC-CT? And how does it relate to Fibre Channel Fabric Services?
•Fibre Channel Generic Services and Switch Fabric functionality
Damian Corbet - Author, The Social CEO and Harriet Jamieson - Senior Content Manager, BrightTALK
There remains a huge gulf in understanding by many leaders of what some are calling the Social Age – huge changes going on in society, enabling anyone with a smartphone to sign up to a social network and comment on anything and everything. Despite this revolution, which has been embraced by the masses, it is the people at the top of organizations who have been slowest to understand and adapt to it.
While business leaders may feel that it's enough to hire social media managers and amend their marketing strategies, Damian Corbet shows why organizations need to do more to succeed in the Social Age – why CEOs need to 'get social' to survive.
Damian's book, "The Social CEO", sets out to educate and inspire senior leaders to embrace the Social Age, teaching them the hows and whys of utilising social media in order to make them stronger leaders. Social CEOs can effectively encourage engagement from their employees as well as other stakeholders and customers; they're better able to communicate their organization's objectives and values, gauge the climate in which they operate and improve their brand image.
Join this live interview with Damian, where he shares the many aspects of leading in the Social Age, such as storytelling, personal branding, managing risk and public relations.
Sarah Duncan - Sustainable Business Development and Ethical Marketing Consultant/Trainer
Before the freight train called coronavirus hit us, there was a lot of business talk around sustainability. As we come out the other side of Covid-19, what will we have learned and does it augur well for better and more ethical business practices in the future?
The pandemic has taught us that we are not as in charge as we thought we were. It has been a salient reminder that we are all ultimately susceptible to things outside of our control. This is essentially the same message that has been building momentum regarding climate change and the urgent need for a more sustainable and ethical approach to life on earth.
But for many, the environmental crisis was viewed as simply too far off to warrant the kind of radical intervention and drastic behaviour change we have seen with coronavirus. But maybe now is the time to draw the two things together and properly review the business world we want to see in the future.
This webinar sets the scene and introduces a range of ideas and exercises from The Ethical Business Book to help businesses get started on a more ethical business journey – for society and the planet.
- Climate crisis vs COVID crisis
- The bigger picture - Sustainable Development Goals (SDGs)
- The Triple Bottom Line updated
- The point of Purpose
- Serve and Preserve
- There is no Planet B
- Understanding carbon footprints
- Reduce, Reuse, Recycle
- Switching to a circular business model
- Greening your supply chain
- Is conscious (or conflicted) consumerism killing your business?
- Greenwashing doesn’t wash
- Time to pay it forward
- BOGOF reinvented - Buy One, GIVE One Free
If you are a business owner, this webinar will provide you with tools to start thinking differently. If you work for an organisation that needs change, this webinar will give you the ammunition you need to start lobbying the decision-makers.
Everyone knows data volumes are growing rapidly, far faster than IT budgets, which range from flat to minimal annual growth. One of the drivers of such rapid data growth is storing multiple copies of the same data. Developers copy data for testing and analysis. Users email and store multiple copies of the same files. Administrators typically back up the same data over and over, often with minimal to no changes.
To avoid a budget crisis and paying more than once to store the same data, storage vendors and customers want to use data reduction techniques such as deduplication, compression, thin provisioning and snapshots.
This webcast will specifically focus on the fundamentals of data reduction, which can be performed in different places and at different stages of the data lifecycle. Like most technologies, there are related means to do this, but with enough difference to cause confusion. For that reason, we’re going to be looking at:
•How companies end up with so many copies of the same data
•Difference between deduplication and compression – when should you use one vs. the other?
•Where to reduce data: application-level, networked storage, backups, and during data movement
•When to collapse the copies: real-time vs. post-process deduplication
Tune in to this efficient and educational SNIA webcast, which covers valuable concepts with minimal repetition or redundancy.
After you watch the presentation, check out the Q&A blog at: https://bit.ly/34m949E
To achieve effective network and digital transformation, security and analytics is required. As businesses look to expand, scale and move their workloads to multiple clouds, it’s imperative they have fast and highly secure access to applications that can be hosted anywhere – in a data center, public cloud, or private SaaS platform.
Automation becomes more critical and delivered through an integrated solution for ease of use.
Join this webinar to learn about:
-How advanced security functions (XDR, CASB, ZTA) with Machine Learning and Artificial Intelligence can further automate SD-WAN and deliver on intelligence attributes
-Integrated options that provide visibility and analytics for real-time insights
-How security technologies can deliver critical policy enforcement for WAN edge
Unlike previous technologies, 5G will be completely software driven deployed on edge, core, and public clouds. With 10s to 100s of thousand edge sites, 10s of thousands of application instances changing by the minute, the orchestration, management, and automation of these workloads will become critical. In this talk, you will learn about these management challenges and ways to solve these challenges. We will look at end-to-end 5G network service or edge application orchestration, configuration, ongoing lifecycle management, network slicing, service optimization, service assurance and more. We will also review an example of how the Linux Foundation Open Network Automation Platform (ONAP) solves these various problems in a comprehensive way. By attending this talk, you will become fully familiar with the various management challenges and approaches to solve them.
Ron Victor, Founder & CEO, IoTium & Charles Mohrmann, Principle Director Industry X.0, Accenture
Getting the IIoT Edge platform “right” requires embracing new concepts and a refresh of your data management strategy and solutions reference architecture. However, “getting it right” depends on what your assumptions are and the company’s vision on what use cases need to be supported.
In this webinar Ron Victor from ioTium and Charlie Mohrmann from Accenture will discuss what a “right” solution reference architecture looks like and how to cost effectively deploy and sustain the IIoT Edge compute infrastructure at scale.
What are the security and extensibility implications to mitigate risk and long term total cost of ownership (TCO) concerns so you can go from pilots to deployments in record time? Tune in for the answers!
Diego R. Lopez, Senior Technology Expert at Telefonica I+D, chair ETSI ISGs NFV and PDL
The most promising use cases for edge computing, related to demanding network features and scenarios like industrial IoT, require to go beyond current network services, and support a much more dynamic way of consuming them.
The traditional borders between local and wide area networks, between network segments, and between application and network services themselves tend to blur into a continuum of network services supporting user applications.
Techniques like the emerging In-Network Computing paradigm require multi-dimensional openness (among computing environments, across network segments, along geographical areas and operators…) and have to rely on holistic network orchestration to achieve the promise of an elastic edge.
Ron Victor, Founder & CEO, IoTium & Charles Mohrmann, Principle Director Industry X.0, Accenture
In this webinar Ron Victor from ioTium and Charlie Mohrmann from Accenture will discuss objectives, key results, and lessons learned to help you deploy an Industrial IoT (IIoT) Edge Tier platform as part a successful digital transformation.
Whether you have begun this journey or are preparing to start, this session will provide insights on how a low-cost/low-touch scalable platform combined with hard dollar use cases can provide competitive advantage.
Use cases from several vertical markets will be showcased along with the importance of open and agnostic systems that support standard communications including SDWAN and 5G.
Best practices for achieving Enterprise IT and operational efficiency.
The Enterprise Architecture channel presents the next generation of Enterprise IT: recognizing the strategic importance of digital transformation and the data center to make companies more nimble and competitive. These presentations will help demanding IT and BizOps professionals achieve flexibility, scalability and performance with reduced risk and complexity.