Hi [[ session.user.profile.firstName ]]

DCIM: Managing the Facilities and IT of the Data Center - Panel Session

Data Center Infrastructure Management (DCIM) has been discussed in data center conferences and media. It is a set of tools and methods to make a data center as a whole perform optimally. Simply put, DCIM deals with mechanical and electrical systems of facilities, and power and environmental information of IT equipment. No standards have been defined yet but several functional areas have been mentioned, such as Inventory, Change, Capacity, Simulation, Monitoring and Efficiency Modeling. Many vendors have emerged with various solutions that focus on one or a few areas but not on a holistic scale. So the integration of multiple tools will be necessary to satisfy the overall needs and some vendors are working together to integrate their solutions.

But equally important is how to manage IT equipment at a higher level, such as server health, and application and service status. This is the market segment known as system management. Although DCIM and system management have been developed independent to each other, it is increasingly necessary to integrate the two to manage a data center even more efficiently. The information obtained with system management functions will become crucial to control the infrastructure sides of facilities and even IT equipment.

In this panel session, we will review DCIM solutions and how they can be integrated with system management for better design and operations of data centers. We will also discuss the impact of such integration, such as management and organizational structure. But at the same time, we need to realize that the ultimate goal of having a data center is to satisfy business goals of an enterprise with IT infrastructure, such as server health and applications status. That is why it is utmost important to integrate both IT and Facilities under common management to plan, design, monitor and control. Join this panel as these thought leaders discuss how you can use DCIM to best manage the facilities and IT within your data center.
Recorded Aug 16 2012 57 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Moderator: Zen Kishimoto, Altaterra Research; Peter Gilbert, CA Technologies; Derek Schwartz, GDCA; Robert Haggerty
Presentation preview: DCIM: Managing the Facilities and IT of the Data Center - Panel Session

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • How can databases capitalize on Computational Storage? Oct 20 2020 10:00 pm UTC 60 mins
    Tong Zhang, Chief Scientist & Co-Founder | JB Baker, VP of Marketing & Product Management, Scaleflux
    Systems and storage are evolving, with a new category of products called Computational Storage Devices emerging to alleviate problems with database performance bottlenecks and the costs of ever-growing datasets.

    Do you need to modify your database to capitalize on this emerging class of storage?
    What advantages can you get without code changes?
    Can using “wasteful” data structures actually reduce storage footprint while improving performance?

    Join us as we answer these questions and provide examples of benefits you can see today and in the near future through combining Computational Storage with Database operations.
  • Compute at the Edge is Paramount, Learn How To Get Compute at the Drive Level! Oct 20 2020 5:00 pm UTC 45 mins
    Scott Shadley, VP Marketing, NGD Systems
    With the growth of data generation at the Edge and need to get value from that data quickly, the market has run into a hurdle on how to get enough compute and processing with the available space, power and budget. The ability to deploy compute resources within the storage devices with Computational Storage is key to the growth of this market.

    This presentation will discuss the deployment of small form factor, asic-based, solutions that bring value to end customers and platform developers. Including a specific use case to be showcased.
  • Optimizing NVMe over Fabrics Performance with Different Ethernet Transports Sep 16 2020 5:00 pm UTC 75 mins
    Fred Zhang, Intel; Eden Kim, Calypso Systems; David Woolf, UNH-IOL; Tom Friend, Illuminosi
    NVMe over Fabrics technology is gaining momentum and getting more tractions in data centers, but there are three kinds of Ethernet based NVMe over Fabrics transports: iWARP, RoCEv2 and TCP. How do we optimize NVMe over Fabrics performance with different Ethernet transports?

    Setting aside the consideration of network infrastructure, scalability, security requirement and complete solution stack, this webcast will explore the performance of different Ethernet-based transport for NVMe over Fabrics at micro benchmark level. We will show three key performance indicators: IOPs, Throughput, and Latency with different workloads including: Sequential Read/Write, Random Read/Write, 70%Read/30%Write, with different data size. We will compare the result of three Ethernet based transports: iWARP, RoCEv2 and TCP.

    Further, we will dig a little bit deeper to talk about the variables that will impact the performance of different Ethernet transports. There are a lot of variables that you can tune but these variables will impact the performance of each transport to different extents. We will cover the variables:
    1.How many CPU cores are needed (I’m willing to give)?
    2.Optane SSD or 3D NAND SSD?
    3.How deep should the Q-Depth be?
    4.Why do I need to care about MTU?

    This discussion won’t tell you which transport is the best. Instead we unfold the performance of each transport and tell you what it would take for each transport to get the best performance, so that you can make the best choice for your transport for NVMe over Fabrics solutions.
  • Compression: Putting the Squeeze on Storage Sep 2 2020 6:00 pm UTC 75 mins
    John Kim, NVIDIA; Brian Will, Intel; Ilker Cebeli, Samsung
    Everyone knows data volumes are exploding faster than IT budgets. And customers are increasingly moving to flash storage, which is faster and easier to use than hard drives, but still more expensive. To cope with this conundrum and squeeze more efficiency from storage, storage vendors and customers can turn to data reduction techniques such as compression, deduplication, thin provisioning and snapshots. This webcast will specifically focus on data compression, which can be done at different times, at stages in the storage process, and using different techniques. We’ll discuss:

    •Where compression can be done: at the client, on the network, on the storage controller, or within the storage devices
    •What types of data should be compressed
    •When to compress: real-time compression vs. post-process compression
    •Different compression techniques
    •How compression affects performance

    Tune in to this compact and informative SNIA webcast, which packs in copious content .
  • The Key to Value: Understanding the NVMe Key-Value Standard Sep 1 2020 5:00 pm UTC 75 mins
    Bill Martin; Samsung; John Kim, NVIDIA
    The storage industry has many applications that rely on storing data as objects. In fact, it’s the most popular way that unstructured data is accessed. At the drive level, however, the devil is in the details. Normally, storage devices store information as blocks, not objects. This means that there is some translation that goes on between the data as it is consumed (i.e., objects) and the data that is stored (i.e., blocks).

    Naturally, being efficient means that there are performance boosts, and simplicity means that there are fewer things that can go wrong. Moving towards storing key value pairs that get away from the traditional block storage paradigm make it easier and simpler to access objects.

    Both The NVM Express™ group and SNIA have done quite a bit of work in standardizing this approach:

    •NVM Express™ has completed standardization of the Key Value Command Set
    •SNIA has standardized a Key Value API
    •Spoiler alert: these two work very well together!

    What does this mean? And why should you care? That’s what this webinar is going to cover! This presentation will discuss the benefits of Key Value storage, present the major features of the NVMe-KV Command Set and how it interacts with the NVMe standards. It will also cover the SNIA KV-API and open source work that is available to take advantage of Key Value storage.

    We’ll be going deep under the covers to discuss:
    •How this approach is different than traditional block-based storage
    •Why doing this makes sense for certain types of data (and, of course, why doing this may not make sense for certain types of data)
    •How this simplifies the storage stack
    •Who should care about this, why they should care about this, and whether or not you are in that group
  • Does Your Storage Need a Cyber Insurance Tune-Up? Aug 27 2020 5:00 pm UTC 75 mins
    Eric Hibbard, SNIA Security Technical Work Group Chair; Casey Boggs, ReputationUS; Paul Talbut, SNIA EMEA
    Protection against cyber threats is recognized as a necessary component of an effective risk management approach, typically based on a well-known cybersecurity framework. A growing area to further mitigate risks and provide organizations with the high level of protection they need is cyber insurance. However, it’s not as simple as buying a pre-packaged policy.

    This webcast will provide an overview of how cyber insurance fits in a risk management program. It will identify key terms and conditions that should be understood and carefully negotiated. Cyber insurance policies may not cover all types of losses, so it is critical to identify what risks and conditions are excluded from a cyber insurance policy before you buy.

    Join this webcast to learn:
    •General threat tactics, risk management approaches, cybersecurity frameworks
    •How cyber insurance fits within an enterprise data security strategy
    •Nuances of cyber insurance – exclusions, exemption, triggers, deductibles and payouts
    •Challenges associated with data stored in the cloud
  • How Social Media Can Make You A Stronger Leader: Insights from Damian Corbet Aug 20 2020 3:00 pm UTC 60 mins
    Damian Corbet - Author, The Social CEO and Harriet Jamieson - Senior Content Manager, BrightTALK
    There remains a huge gulf in understanding by many leaders of what some are calling the Social Age – huge changes going on in society, enabling anyone with a smartphone to sign up to a social network and comment on anything and everything. Despite this revolution, which has been embraced by the masses, it is the people at the top of organizations who have been slowest to understand and adapt to it.

    While business leaders may feel that it's enough to hire social media managers and amend their marketing strategies, Damian Corbet shows why organizations need to do more to succeed in the Social Age – why CEOs need to 'get social' to survive.

    Damian's book, "The Social CEO", sets out to educate and inspire senior leaders to embrace the Social Age, teaching them the hows and whys of utilising social media in order to make them stronger leaders. Social CEOs can effectively encourage engagement from their employees as well as other stakeholders and customers; they're better able to communicate their organization's objectives and values, gauge the climate in which they operate and improve their brand image.

    Join this live interview with Damian, where he shares the many aspects of leading in the Social Age, such as storytelling, personal branding, managing risk and public relations.
  • Ethical and Sustainable Business in 2020 - In the Shadow of COVID-19 Aug 19 2020 3:00 pm UTC 90 mins
    Sarah Duncan - Sustainable Business Development and Ethical Marketing Consultant/Trainer
    Before the freight train called coronavirus hit us, there was a lot of business talk around sustainability. As we come out the other side of Covid-19, what will we have learned and does it augur well for better and more ethical business practices in the future?

    The pandemic has taught us that we are not as in charge as we thought we were. It has been a salient reminder that we are all ultimately susceptible to things outside of our control. This is essentially the same message that has been building momentum regarding climate change and the urgent need for a more sustainable and ethical approach to life on earth.

    But for many, the environmental crisis was viewed as simply too far off to warrant the kind of radical intervention and drastic behaviour change we have seen with coronavirus. But maybe now is the time to draw the two things together and properly review the business world we want to see in the future.

    This webinar sets the scene and introduces a range of ideas and exercises from The Ethical Business Book to help businesses get started on a more ethical business journey – for society and the planet.

    CONTENT INCLUDES:

    - Climate crisis vs COVID crisis
    - The bigger picture - Sustainable Development Goals (SDGs)
    - The Triple Bottom Line updated
    - The point of Purpose
    - Serve and Preserve
    - There is no Planet B
    - Understanding carbon footprints
    - Reduce, Reuse, Recycle
    - Switching to a circular business model
    - Greening your supply chain
    - Is conscious (or conflicted) consumerism killing your business?
    - Greenwashing doesn’t wash
    - Time to pay it forward
    - BOGOF reinvented - Buy One, GIVE One Free

    If you are a business owner, this webinar will provide you with tools to start thinking differently. If you work for an organisation that needs change, this webinar will give you the ammunition you need to start lobbying the decision-makers.
  • Everything You Wanted to Know...But Were Too Proud to Ask: Data Reduction Aug 18 2020 5:00 pm UTC 75 mins
    John Kim, NVIDIA; Alex McDonald, NetApp
    Everyone knows data volumes are growing rapidly, far faster than IT budgets, which range from flat to minimal annual growth. One of the drivers of such rapid data growth is storing multiple copies of the same data. Developers copy data for testing and analysis. Users email and store multiple copies of the same files. Administrators typically back up the same data over and over, often with minimal to no changes.

    To avoid a budget crisis and paying more than once to store the same data, storage vendors and customers want to use data reduction techniques such as deduplication, compression, thin provisioning and snapshots.

    This webcast will specifically focus on the fundamentals of data reduction, which can be performed in different places and at different stages of the data lifecycle. Like most technologies, there are related means to do this, but with enough difference to cause confusion. For that reason, we’re going to be looking at:

    •How companies end up with so many copies of the same data
    •Difference between deduplication and compression – when should you use one vs. the other?
    •Where to reduce data: application-level, networked storage, backups, and during data movement
    •When to collapse the copies: real-time vs. post-process deduplication
    •Performance considerations

    Tune in to this efficient and educational SNIA webcast, which covers valuable concepts with minimal repetition or redundancy.
  • SD-WAN with XDR: Drive Network-as-a-Service Business Outcomes Aug 13 2020 9:00 pm UTC 60 mins
    Stan Golubchik, CEO and Founder, ContraForce
    To achieve effective network and digital transformation, security and analytics is required. As businesses look to expand, scale and move their workloads to multiple clouds, it’s imperative they have fast and highly secure access to applications that can be hosted anywhere – in a data center, public cloud, or private SaaS platform.

    Automation becomes more critical and delivered through an integrated solution for ease of use.


    Join this webinar to learn about:
    -How advanced security functions (XDR, CASB, ZTA) with Machine Learning and Artificial Intelligence can further automate SD-WAN and deliver on intelligence attributes
    -Integrated options that provide visibility and analytics for real-time insights
    -How security technologies can deliver critical policy enforcement for WAN edge
  • How will we manage 5G network services and composite edge applications? Aug 13 2020 5:00 pm UTC 60 mins
    Amar Kapadia, Co-Founder, Aarna Networks
    Unlike previous technologies, 5G will be completely software driven deployed on edge, core, and public clouds. With 10s to 100s of thousand edge sites, 10s of thousands of application instances changing by the minute, the orchestration, management, and automation of these workloads will become critical. In this talk, you will learn about these management challenges and ways to solve these challenges. We will look at end-to-end 5G network service or edge application orchestration, configuration, ongoing lifecycle management, network slicing, service optimization, service assurance and more. We will also review an example of how the Linux Foundation Open Network Automation Platform (ONAP) solves these various problems in a comprehensive way. By attending this talk, you will become fully familiar with the various management challenges and approaches to solve them.
  • Building a Future-proof Scalable Edge Compute Strategy Recorded: Aug 12 2020 60 mins
    Ron Victor, Founder & CEO, IoTium & Charles Mohrmann, Principle Director Industry X.0, Accenture
    Getting the IIoT Edge platform “right” requires embracing new concepts and a refresh of your data management strategy and solutions reference architecture. However, “getting it right” depends on what your assumptions are and the company’s vision on what use cases need to be supported.

    In this webinar Ron Victor from ioTium and Charlie Mohrmann from Accenture will discuss what a “right” solution reference architecture looks like and how to cost effectively deploy and sustain the IIoT Edge compute infrastructure at scale.

    What are the security and extensibility implications to mitigate risk and long term total cost of ownership (TCO) concerns so you can go from pilots to deployments in record time? Tune in for the answers!
  • Using Network Orchestration to Build an Open, Elastic Edge Recorded: Aug 12 2020 35 mins
    Diego R. Lopez, Senior Technology Expert at Telefonica I+D, chair ETSI ISGs NFV and PDL
    The most promising use cases for edge computing, related to demanding network features and scenarios like industrial IoT, require to go beyond current network services, and support a much more dynamic way of consuming them.

    The traditional borders between local and wide area networks, between network segments, and between application and network services themselves tend to blur into a continuum of network services supporting user applications.

    Techniques like the emerging In-Network Computing paradigm require multi-dimensional openness (among computing environments, across network segments, along geographical areas and operators…) and have to rely on holistic network orchestration to achieve the promise of an elastic edge.
  • From Zero to IIoT: Best Practices Recorded: Aug 11 2020 61 mins
    Ron Victor, Founder & CEO, IoTium & Charles Mohrmann, Principle Director Industry X.0, Accenture
    In this webinar Ron Victor from ioTium and Charlie Mohrmann from Accenture will discuss objectives, key results, and lessons learned to help you deploy an Industrial IoT (IIoT) Edge Tier platform as part a successful digital transformation.

    Whether you have begun this journey or are preparing to start, this session will provide insights on how a low-cost/low-touch scalable platform combined with hard dollar use cases can provide competitive advantage.

    Use cases from several vertical markets will be showcased along with the importance of open and agnostic systems that support standard communications including SDWAN and 5G.
  • Trusted Substrate as Digital Trust Foundation Recorded: Aug 11 2020 37 mins
    Francois Ozog, Director • Segments and Strategic Initiatives|LEDGE, Linaro Limited
    Embedded computing in automotive and more generally industrial markets has lacked standards and has been so customized that it made security and OTA very complex topics, both at design and operations times.

    Linaro and its members (silicon vendors, Google, Red Hat...) have been building and assembling technologies into a new certifiable design pattern for embedded computing from automotive to medical and across all industrial markets flavors. As part of those technologies, the Trusted Substrate is the foundational layer that expands hardware root of trust to protect computing, enables digital trust and multi-ownership, allows standardized Firmware OTA, and of course participates in overall trustworthiness.

    The session will present use cases in automotive and smart city markets to illustrate how Trusted Substrate technologies support those scenarios. Product designers will discover how the new design pattern will significantly affect their time to market and cost of operation
  • The Five Pitfalls of Digital Transformation Recorded: Aug 11 2020 36 mins
    Allan Waddell, co-CEO, Kablamo & Angus Dorney, co-CEO, Kablamo
    Allan Waddell and Angus Dorney, co-CEOs of Kablamo, will walk through lessons learned from taking Australia’s largest banks, media companies and fintechs on digital transformation journeys.

    They’ll share the common mistakes that these experiences revealed and the things that enterprises can do to avoid these pitfalls. Drawing on insider knowledge and analysing projects as pioneers in prop-tech and AI applications in media, Waddell and Dorney will deliver concrete and actionable information that will overturn assumptions, short-circuit institutional inertia and help organisations and individuals ignite effective innovation with a fresh set of transformation tools.
  • Enterprise and Data Center SSD Form Factor - the end of the 2.5-inch disk era? Recorded: Aug 4 2020 78 mins
    J.Hands, SSD SIG; B.Lynn, Dell; R Stenfort, FB ,P, Kaler, HPE; J. Geldman, Kioxia; J. Hinkle, Lenovo;J. Adrian, Microsoft
    The Enterprise and Data Center SSD Form Factor (EDSFF) is designed natively for data center NVMe SSDs to improve thermal, power, performance, and capacity scaling. EDSFF has different variants for flexible and scalable performance, dense storage configurations, general purpose servers, and improved data center TCO. At the 2020 Open Compute Virtual Summit OEMs, cloud service providers, hyperscale data center, and SSD vendors showcased products and their vision for how this new family of SSD form factors solves real data challenges.

    Join this SNIA Compute Memory and Storage Initiative webcast where expert panelists from companies that have been involved in EDSFF since the beginning discuss how they will use the EDSFF form factor. OEMs will discuss their goals for E3 and the new updated version of the E3 specification! (SFF-TA-1008) Hyperscale data center and cloud service providers will discuss how E1.S (SFF-TA-1006) helps solve performance scalability, serviceability, capacity, and thermal challenges for future NVMe SSDs and persistent memory in 1U servers.
  • Storage Networking Security Series: Security & Privacy Regulations Recorded: Jul 28 2020 61 mins
    Thomas Rivera, Co-Chair, SNIA Data Protection & Privacy; Eric Hibbard, SNIA Security TWG Chair; J Metz, SNIA Board Chair
    Worldwide, regulations are being promulgated and aggressively enforced with the intention of protecting personal data. These regulatory actions are being taken to help mitigate exploitation of this data by cybercriminals and other opportunistic groups who have turned this into a profitable enterprise. Failure to meet these data protection requirements puts individuals at risk (e.g., identity theft, fraud, etc.), as well as subjecting organizations to significant harm (e.g., legal penalties).

    This webcast highlights common privacy principles and themes within key privacy regulations. In addition, the related cybersecurity implications are explored. Lastly, the session will probe a few of the recent regulations/laws to outline interesting challenges due to over and under-specification of data protection requirements (e.g., “reasonable” security).

    After viewing this webcast, attendees should understand:
    •How privacy and security is characterized
    •Data retention and deletion requirements
    •Core data protection requirements of sample privacy regulations from around the globe
    •The role that security plays with key privacy regulations
    •Data breach implications and consequences
  • Achieving Agility with Load Balancers – How Avi is Better than Legacy Appliances Recorded: Jul 23 2020 72 mins
    Nathan McMahon, Global Sales Enablement Director, VMware
    July 23 @ 10am PST

    The Avi Networks (VMware NSX Advanced Load Balancer) software-defined platform provides multi-cloud load balancing, web application firewall, application analytics, and container ingress services across on-premises data centers and any cloud. In a short demo, see how you can how you can address the challenges of overprovisioning and overpaying for active-standby appliance pairs, complicated iRules, and inelastic services with a centrally managed, distributed fabric of load balancers that enables one-click deployment, simplified operations, and easy application troubleshooting.

    This session gives an overview of modern load balancing use cases. Every application requires load balancing to deliver a great end user experience. Whether enabling remote workers with VDI, or refreshing legacy load balancers, migrating to public cloud, deploying SDN, or developing Kubernetes apps, learn how the Avi Networks enterprise-grade load balancer from VMware delivers consistent application services in both VMware as well as any other environment. You will learn how to set up unique per-app / per-tenant load balancing services easily.
  • CI/CD Pipelines for DevSecOps with Hybrid Cloud Recorded: Jul 15 2020 60 mins
    Michael Fraser, Co-founder, CEO and Chief Architect, Refactr
    Leveraging CI / CD pipelines, enterprises want to be able to automate in a hybrid world, with some on-premise and public cloud automation. Both enterprise and Department of Defense tech teams are facing a huge challenge as more and more IT infrastructure is moved to the cloud and made fully automated. The days of manual deployments of infrastructure are ending fast, and IT teams need automation tools to move to the modernization of IT becoming code including infrastructure and security. The key is to have the flexibility to have developers be able to wear the DevOps engineer hat with a platform they can use to create CI / CD pipelines. The CI/CD pipelines can easily use DevOps tools to create integrations into ticketing systems, run security remediation playbooks, deploy Kubernetes with a security benchmark, and even harden on-premise sensors.

    This session will cover:
    - Explain what is DevSecOps
    - Explain CI / CD pipelines
    - CI / CD Pipelines for DevSecOps: How it works
    - Why hybrid CI / CD pipelines are required for Enterprise
    - Real-world use cases of Hybrid Cloud CI / CD Pipelines for DevSecOps

    About the speaker:
    Mike Fraser is the co-founder, CEO and chief architect at Refactr. Mike started his career in the United States Air Force working on F-15 fighter jets weapon systems and later as a cybersecurity engineer. While on active duty, Mike started his first company when he was 19 years old; a retail computer repair store. Mike has since founded multiple tech companies and is a regular speaker at numerous industry events, including CRN, various Microsoft events, RedHatAnsibleFest, DevOps Days, and All Day DevOps. Mike aspires to be the world's coolest dad for his 5-year-old autistic daughter. In his spare time, he is creating an augmented reality app to help autistic children communicate.
Best practices for achieving Enterprise IT and operational efficiency.
The Enterprise Architecture channel presents the next generation of Enterprise IT: recognizing the strategic importance of digital transformation and the data center to make companies more nimble and competitive. These presentations will help demanding IT and BizOps professionals achieve flexibility, scalability and performance with reduced risk and complexity.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: DCIM: Managing the Facilities and IT of the Data Center - Panel Session
  • Live at: Aug 16 2012 4:00 pm
  • Presented by: Moderator: Zen Kishimoto, Altaterra Research; Peter Gilbert, CA Technologies; Derek Schwartz, GDCA; Robert Haggerty
  • From:
Your email has been sent.
or close