Hypervisor Convergence: What is it and can it save you money?
High availability has traditionally required virtualization and a SAN. Then came virtual storage appliances (VSAs) which were managed like a physical SAN but ran as a virtual machine. Now comes hypervisor convergence, the latest trend that eliminates the entire concept of a SAN, both physical or virtual. Is this hype? Or can this latest technology save you time and money? Let Scale Computing show you how HC3 can radically change your environment for the better.
HC3 represents the cutting edge of infrastructure innovation: A highly available platform with the scalability of the cloud and the security of your own servers, coupled with a radical reduction in both upfront costs and TCO. No more VMware. No more SAN. No more headaches.
RecordedMay 1 201445 mins
Your place is confirmed, we'll send you email reminders
QUIC is a new UDP-based transport protocol for the Internet, and specifically, the web. Originally designed and deployed by Google, it already makes up 35% of Google's egress traffic, which corresponds to about 7% of all Internet traffic. The strong interest by many other large Internet players in the ongoing IETF standardization of QUIC is likely to lead to an even greater deployment in the near future. This webcast will highlight:
•Unique design aspects of QUIC
•Differences to the conventional HTTP/TLS/TCP web stack
•Early performance numbers
•Potential side effects of a broader deployment of QUIC
Mark Carlson, Kioxia; Rob Davis, Mellanox; John Kim, Mellanox; Ted Vojnovich, Lenovo
Several SSD and networking vendors have recentl¬y demonstrated ways to connect SSDs directly to an Ethernet network. They propose that deploying Ethernet SSDs will be more scalable, easier to manage, more performant, and/or lower cost than traditional storage networking solutions that use a storage controller (or hyperconverged node) between the SSDs and the network.
Who would want to attach SSDs directly to the network? Are these vendors brilliant or simply trying to solve a problem that doesn’t exist? What are the different solutions that could benefit from Ethernet SSDs? Which protocols would one use to access them? And how do Ethernet SSDs relate to computational storage? Join this SNIA Networking Storage Forum webcast to learn all this and more as SNIA experts discuss:
•What are the appropriate use cases for Ethernet SSDs?
•Why Ethernet SSDs could be appealing and more efficient
•How Ethernet SSDs compare to other forms of storage networking
•Different ways Ethernet SSDs can be accessed, such as JBOF/NBOF, NVMe-oF, and Key Value
•How do Ethernet-attached SSDs enable composable infrastructures?
Chris Evans, Architecting IT; Rick Vanover, Veeam; Alex McDonald, NetApp; John Kim, Mellanox
There are many types of storage technologies, both in how they are interconnected, consumed and designed. Object storage is no different in that it brings its own set of unique characteristics to the market. In this webinar, storage experts Rick Vanover and Chris Evans will explain:
•What object storage is and what it does
•How to use object storage
•Essential characteristics of typical consumption
•Why object storage is important to the future of storage and computing technologies
Since the initial publication of the National Institute of Standards and Technology (NIST) definition of cloud computing in 2011, international standards development organizations (SDOs) have sought to refine and expand the cloud computing landscape. This webinar will:
•Identify key published and draft cloud standards
•Discuss their interdependencies
•Highlight their importance
•Identify potential future work.
In addition, related technologies such as virtualization, federation, and fog/edge computing will be addressed. Lastly, the relevance of the standards will be explored to help organizations understand ways these documents can be exploited.
Anne Blanchard, Nasuni | Robin Smith, Gospel Technology
The benefits of a cloud-first storage strategy are well-known: scalability, flexibility, agility, avoiding lock-in and spreading risk to name a few. But defining your cloud-first storage strategy requires you to take a hard look at your ecosystem and address the challenges of cloud adoption head on.
Join this panel to hear experts discuss how the key challenges - including taking risks with data assets, ownership, integration, security and compliance - can be overcome so that you can unlock the rewards of going cloud-first.
Cloud computing innovation will power enterprise transformation in 2018. Cloud growth is also driving a rapid rise in the big data storage market, exacerbating the enterprise challenge around storage cost and complexity.
Join this webinar with Kevin L. Jackson, CEO, GovCloud Network LLC and globally recognized cloud computing thought leader. He will show how Cloud Storage 2.0 can be used to address this proliferation of real-time data from the web, mobile devices, social media, sensors, log files, and transactional applications, and how all of these are affecting today's data centers.
Jim Handy, Objective Analysis and Tom Coughlin, Coughlin Associates
Get prepared for SNIA’s Persistent Memory Summit with this webcast from Objective Analysis and Coughlin Associates. Following up on their 2018 groundbreaking report on emerging memories, Jim Handy and Tom Coughlin will update us on 2019 advances in support from SNIA, the launch of Optane memory on DIMMs, new MRAM types, and more. You won’t want to miss their analysis on the progress made, and their perspective on the groundwork that still needs to be covered to bring persistent memory to mainstream computing.
Jim Harris, Intel; Ben Walker, Intel, Tim Lustig, Mellanox
The Storage Performance Development Kit (SPDK) has gained industry-wide recognition as a framework for building highly performant and efficient storage software with a focus on NVMe. This includes software drivers and libraries for building NVMe-oF host and target solutions. In this presentation, technical leaders from SPDK will provide an overview of the project, NVMe-oF use cases that are best suited for SPDK, and insights into how SPDK achieves its storage networking performance and efficiency, discussing:
•Overview of the SPDK project
•Key NVMe-oF use cases for SPDK
•Examples of NVMe-oF use cases not suited for SPDK
•NVMe-oF Target Architecture and Design
•NVMe-oF Host Architecture and Design
After you watch the webcast, check out the Q&A blog at http://bit.ly/SPDKQA
Eric Hibbard, CISSP-ISSAP, ISSMP, ISSEP, CISA, CCSP; Steven W. Teppler, Esq.; Thomas Rivera, Chair, SNIA DPPC
Failing to protect sensitive information can put a lot of people at risk of being exploited by cybercriminals, and can make a company face enormous legal penalties.
The way information is shared and stored can put the information at risk.
It is risky to store personal information on portable devices, which are easily lost or stolen.
In addition, the consequences of a data breach can be devastating. Identity theft could lead to financial losses, and a company could face lawsuits and legal penalties.
This presentation will cover what kinds of personal information must be protected & guidelines for keeping this info safe.
After viewing this session, attendees should:
1. Understand how Privacy is defined
2. Highlight some of the Privacy regulations from around the globe
3. Understand what information to safeguard
4. Understand how these privacy regulations affect organizations that handle personal information
Ross Stenfort, Facebook; Lee Prewitt Microsoft; J Metz, Cisco
What do Hyperscalers like Facebook and Microsoft have in common? They are cloud market leaders using NVMe SSDs in their architectures. Get a close up look into their application requirements and challenges, why they chose NVMe flash for their storage, and how they are successfully deploying NVMe to fuel their businesses.
After you watch the webcast, check out the Q&A blog at http://bit.ly/2DCNhgX
Mark Rogov, Dell EMC; Brandon Hoff, Broadcom; J Metz, Cisco
One of Fibre Channel’s greatest strengths is its ability to scale to thousands and thousands of nodes, while providing predictable performance. So, when we say that Fibre Channel has unmatched scalability, what does that actually mean? And how does it work?
We often hear about “designed from the ground up,” but in this case it’s actually true. From each individual link, to the overall domain architecture, each step along the way is intended to be approached in a scalable fashion.
In this webinar, we’ll be breaking down the pieces of the puzzle that help give Fibre Channel its robustness when you’re working at fabrics even greater than 10,000 nodes. We’ll be talking about:
•What a deterministic storage network is
•Fabric management principles
•Negotiated credit transfers (buffer-to-buffer credits)
•Network Engineering/Design Principles
•Oversubscription and Fan-In Ratios
•Topologies that help scale
•Domains and Fabric limits
•Consistency of performance at scale
Along the way, we’ll be talking about some of the ways that Fibre Channel differs from other popular storage networks as they approach large-scale environments, and how it handles issues that arise in such cases.
Please join us on November 6th at 10:00 am PT/1:00 pm ET for another educational webinar on Fibre Channel!
Ted Vojnovich, Lenovo; Fred Bower, Lenovo; Tim Lustig, Mellanox
Software defined storage, or SDS, is growing in popularity in both cloud and enterprise accounts. But what makes it different from traditional storage arrays? Does it really save money? Is it more complicated to support? Is it more scalable or higher-performing? And does it have different networking requirements than traditional storage appliances?
Watch this SNIA webcast to learn:
•How software-defined storage differs from integrated storage appliances
•Whether SDS supports block, file, object, or all three types of storage access
•Potential issues or pitfalls with deploying SDS
•How SDS affects storage networking
•Scale-up vs. scale-out vs. hyperconverged vs. cloud
After you watch the webcast, check out the Q&A blog http://bit.ly/SDS-Q-A
Robin Gareiss, President and Founder, Nemertes Research
Intelligent Customer Engagement Series [Ep.5]: CX Success Stories Require Technology, Leadership, Data
A great story requires more than a compelling narrative. Marketing teams can significantly elevate their success with the right combination of leadership, technology, and data derived from well-planned customer interviews.
Crafting that perfect story requires an expanded mindset about what comprises “marketing.”
In this webinar, join Nemertes Research President Robin Gareiss, who recently completed detailed research with 518 companies on how they use advanced technologies and reshape their organizational structure to improve customer experience. Based on this research and her experience as a journalist, marketing content developer, and CX advisor, she will cover:
1. Organizational overhaul: Why a Chief Customer Officer is vital, and how the CMO and CCO work together for joint success.
2. Technology leverage: What are the key technologies and contact-center initiatives that result in measurable CX success—ultimately delivering crucial data to marketing teams that support their success stories?
3. The perfect story: How to conduct interviews that get real-world data to support your mission.
Pierre Mouallem, Lenovo; John Kim, Mellanox; J Metz, Cisco; Steve Vanderlinden, Lenovo
What does it mean to be protected and safe? You need the right people and the right technology. This presentation is going to go into the broad introduction of security principles in general. This will include some of the main aspects of security, including defining the terms that you must know, if you hope to have a good grasp of what makes something secure or not. We’ll be talking about the scope of security, including threats, vulnerabilities, and attacks – and what that means in real storage terms. In this live webcast we will cover:
•Protecting the data (Keeping “the bad” out)
•Threat landscape, Bad actors/hackers
•Attack vectors, attack surfaces, vulnerabilities
•Physical security issues
•Layers of protection (encryption – last line of defense)
•Remediation after a breach/incident
After you watch the webcast, check out the Q&A blog: http://bit.ly/2JQ1s5L
Fibre Channel has long been known to be a very secure protocol for storage. Even so, there is no such thing as a “perfectly secure” technology, and for that reason it’s important to constantly update and protect against threats.
The sheer variety of environments in which Fibre Channel fabrics are deployed makes it very difficult to simply rely only on physical security. In fact, it’s possible to access different storage systems by different users, even when spanned over several sites. Fibre Channel enables security services to specifically address these concerns, and prevent misconfigurations or access to data by non-authorized people and machines.
This webcast is going to dive deep into the guts of security aspects of Fibre Channel, looking closely at the protocols used to implement security in a Fibre Channel fabric. In particular, we’re going to look at:
•The definitions of the protocols to authenticate Fibre Channel devices
•What are the different classes of threats, and what are the mechanisms to protect against them
•What are session keys and how to set them up
•How Fibre Channel negotiates these parameters to insure frame-by-frame integrity and confidentiality
•How Fibre Channel establishes and distributes policies across a fabric
Please join us to learn more about the technical considerations that Fibre Channel brings to the table to secure and protect your data and information.
Robin Gareiss, President & Founder, Nemertes Research
Intelligent Customer Engagement Series [Ep.1] AI Drives Measurable Success in Customer Engagement
Nearly 50% more companies are using or planning to use AI in their customer engagement initiatives.
Nemertes recently studied how 518 companies are using AI and analytics to improve their customer experiences. This webinar details:
• how these companies use AI
• what measurable improvements resulted.
Ingo Fuchs, NetApp; Paul Burt, NetApp, Mike Jochimsen, Kaminario
Kubernetes is great for running stateless workloads, like web servers. It’ll run health checks, restart containers when they crash, and do all sorts of other wonderful things. So, what about stateful workloads?
This webcast will take a look at when it’s appropriate to run a stateful workload in cluster, or out. We’ll discuss the best options for running a workload like a database on the cloud, or in the cluster, and what’s needed to set that up.
•Running a database on a VM and connecting it to Kubernetes as a service
•Running a database in Kubernetes using a `stateful set`
•Running a database in Kubernetes using an Operator
•Running a database on a cloud managed service
After you watch the webcast, check out our Kubernetes Links & Resources blog at http://bit.ly/KubeLinks and our webcast Q&A blog at http://bit.ly/KubeQuestions
The hottest topics for storage and infrastructure professionals
The Enterprise Storage channel has the most up-to-date, relevant content for storage and infrastructure professionals. As data centers evolve with big data, cloud computing and virtualization, organizations are going to need to know how to make their storage more efficient. Join this channel to find out how you can use the most current technology to satisfy your business and storage needs.
Hypervisor Convergence: What is it and can it save you money?David Demlow, VP, Product Management; Craig Theriac, Director, Product Management, Scale Computing[[ webcastStartDate * 1000 | amDateFormat: 'MMM D YYYY h:mm a' ]]44 mins