On Demand Webinars

Webinars
10:00 am PT / 1:00 pm ET

In this webcast, SNIA experts will discuss what composable infrastructure is, what prompted its development, solutions, enabling technologies, standards/products and who computational storage fits in.

Download PDF

Composable Infrastructure and Computational Storage
4:00 PM CET | 3:00 PM GMT | 10:00 AM ET

RAID on CPU is an enterprise RAID solution specifically designed for NVMe-based solid state drives (SSDs). This innovative technology provides the ability to directly connect NVMe-based SSD’s to PCIe lanes and make RAID arrays using those SSD’s without the need for a RAID Host Bus Adapter (HBA). As a result, customers gain NVMe SSD performance and data availability without the need of a traditional RAID HBA.

This webcast will recall key concepts for NVMe SSDs and RAID levels and will take a deep dive into RAID on the CPU technology and the way it compares to traditional Software and Hardware RAID solutions. Learn more about this new technology and how it is implemented, and gain a clear insight into the advantages of RAID on the CPU.

Download PDF

RAID on CPU: RAID for NVMe SSDs without a RAID Controller Card
11:00 am PT / 2:00 pm ET

Everyone knows data volumes are exploding faster than IT budgets. And customers are increasingly moving to flash storage, which is faster and easier to use than hard drives, but still more expensive. To cope with this conundrum and squeeze more efficiency from storage, storage vendors and customers can turn to data reduction techniques such as compression, deduplication, thin provisioning and snapshots. This webcast will specifically focus on data compression, which can be done at different times, at stages in the storage process, and using different techniques.

Download PDF

Read Q&A Blog

Compression: Putting the Squeeze on Storage
10:00 am PT / 1:00 pm ET

The storage industry has many applications that rely on storing data as objects. In fact, it’s the most popular way that unstructured data is accessed. At the drive level, however, the devil is in the details. Normally, storage devices store information as blocks, not objects. This means that there is some translation that goes on between the data as it is consumed (i.e., objects) and the data that is stored (i.e., blocks).

Naturally, being efficient means that there are performance boosts, and simplicity means that there are fewer things that can go wrong. Moving towards storing key value pairs that get away from the traditional block storage paradigm make it easier and simpler to access objects.

What does this mean? And why should you care? That’s what this webinar is going to cover! This presentation will discuss the benefits of Key Value storage, present the major features of the NVMe-KV Command Set and how it interacts with the NVMe standards. It will also cover the SNIA KV-API and open source work that is available to take advantage of Key Value storage.

Download PDF

Read Q&A Blog

The Key to Value: Understanding the NVMe Key-Value Standard
10:00 am PT / 1:00 pm ET

Protection against cyber threats is recognized as a necessary component of an effective risk management approach, typically based on a well-known cybersecurity framework. A growing area to further mitigate risks and provide organizations with the high level of protection they need is cyber insurance. However, it’s not as simple as buying a pre-packaged policy.

This webcast will provide an overview of how cyber insurance fits in a risk management program. It will identify key terms and conditions that should be understood and carefully negotiated. Cyber insurance policies may not cover all types of losses, so it is critical to identify what risks and conditions are excluded from a cyber insurance policy before you buy.

Download PDF

Read Q&A Blog

Does Your Storage Need a Cyber Insurance Tune-Up?
10:00 am PT / 1:00 pm ET

The almost overnight shift of resources toward remote work introduces the need for far more flexible, dynamic and seamless end-to-end applications, putting us on a path that requires autonomous capabilities using AIOps – Artificial Intelligence for IT Operations.

This webcast will provide an overview of concepts and strategies to accelerate the digitalization of critical enterprise IT resources, and help architects rethink what applications and underlying infrastructure are needed to support an agile, seamless end-to-end data centric environment.  This session will specifically address migration from monolithic to microservices, transition to Cloud Native services, and the platform requirements to help accelerate AIOps application delivery within our dynamic hybrid and multi-cloud world.  

Download PDF

Read Q&A Blog

IT Modernization with AIOps: The Journey
10:00 am PT / 1:00 pm ET

This webcast will specifically focus on the fundamentals of data reduction, which can be performed in different places and at different stages of the data lifecycle. Like most technologies, there are related means to do this, but with enough difference to cause confusion. For that reason, we’re going to be looking at:

  • How companies end up with so many copies of the same data
  • Difference between deduplication and compression – when should you use one vs. the other?
  • Where to reduce data: application-level, networked storage, backups, and during data movement
  • When to collapse the copies: real-time vs. post-process deduplication
  • Performance considerations

Download PDF

Read Q&A Blog

Everything You Wanted to Know...But Were Too Proud to Ask: Data Reduction
10:00 am PT / 1:00 pm ET

The rapid growth in infrastructure to support the real time and continuous collection and sharing of data to make better business decisions has led to an age of unprecedented information access and storage. This proliferation of data sources and of high-density data storage has put volumes of data at one’s fingertips. While the collection of large amounts of data has increased knowledge and efficiencies for businesses, it has also made attacks upon that information—theft, modification, or holding it for ransom--more tempting and easier. Cryptography is often used to protect valuable data.

This webcast will present an overview of applied cryptography techniques for the most popular use cases. We will discuss ways of securing data, the factors and trade-offs that must be considered, as well as some of the general risks that need to be mitigated.

Download PDF

Read Q&A Blog

Storage Networking Security Series: Applied Cryptography
11:00 am PT / 2:00 pm ET

Enterprise and Data Center SSD Form Factor (EDSFF) is designed natively for data center NVMe SSDs to improve thermal, power, performance, and capacity scaling. EDSFF has different variants for flexible and scalable performance, dense storage configurations, general purpose servers, and improved data center TCO.  At the 2020 Open Compute Virtual Summit OEMs, cloud service providers, hyperscale data center, and SSD vendors showcased products and their vision for how this new family of SSD form factors solves real data challenges.

Join this SNIA Compute Memory and Storage Initiative webcast where expert panelists from companies that have been involved in EDSFF since the beginning discuss how they will use the EDSFF form factor. OEMs will discuss their goals for E3 and the new updated version of the E3 specification (SFF-TA-1008)!  Hyperscale data center and cloud service providers will discuss how E1.S (SFF-TA-1006) helps solve performance scalability, serviceability, capacity, and thermal challenges for future NVMe SSDs and persistent memory in 1U servers.

Download PDF

Enterprise and Data Center SSD Form Factor (EDSFF) - the end of the 2.5-inch disk era?
10:00 am PT / 1:00 pm ET

Worldwide, regulations are being promulgated and aggressively enforced with the intention of protecting personal data. These regulatory actions are being taken to help mitigate exploitation of this data by cybercriminals and other opportunistic groups who have turned this into a profitable enterprise. Failure to meet these data protection requirements puts individuals at risk (e.g., identity theft, fraud, etc.), as well as subjecting organizations to significant harm (e.g., legal penalties).

This webcast highlights common privacy principles and themes within key privacy regulations. In addition, the related cybersecurity implications are explored. Lastly, the session will probe a few of the recent regulations/laws to outline interesting challenges due to over and under-specification of data protection requirements (e.g., “reasonable” security).

Download PDF

Read Q&A Blog

Storage Networking Security Series: Security & Privacy Regulations