On Demand Webinars

Webinars
10:00 am PT / 1:00 pm ET

In the past couple of years since its introduction, NVMe™ over Fabrics (NVMe-oF™) has not been resting on any laurels. Work has been ongoing, and there are several updates that are worth talking about.

There is more to a technology than its core standard, of course, and many different groups have been hard at work at improving upon, and fleshing out, many of the capabilities that are related to NVMe-oF. This webcast will explore a few of these projects and how they relate to implementing the technology.

Read Q&A Blog

Download PDF

Notable Updates in NVMe-oF 1.1
10:00 am PT / 1:00 pm ET

The need for rapid deployment of scalable clusters is creating an opportunity for container solutions such as Kubernetes. But what are the implications of multiple Kubernetes clusters in a broad deployment? What happens if a cluster goes down? What’s the impact on business resiliency? Managing and securing multiple clusters is becoming a key topic and area of debate. Multi-cluster Kubernetes that provides robustness & resilience is rapidly moving from “best practice” to a “must have”.

Read Q&A Blog

Download PDF

A Multi-tenant Multi-cluster Kubernetes Datapocalypse is Coming
10:00 am PT / 1:00 pm ET

As data growth in enterprises continues to sky rocket, datacenter cloud scalability whether on premises, in hybrid cloud or in multicloud deployments is key for businesses. So, what are enterprise IT organizations supposed to do, given that 'run anything anywhere' is becoming more important than ever? Customers are finding that hybrid cloud storage solutions better meet their IT and business growth needs, so they can rapidly scale their IT infrastructure and cover a wider array of services.

Download PDF

Storage Scalability in Hybrid Cloud and Multicloud Environments
10:00 am PT / 1:00 pm ET

This webinar will introduce the fundamentals of cryptographic key management including key lifecycles, key generation, key distribution, symmetric vs asymmetric key management and integrated vs centralized key management models. Relevant standards, protocols and industry best practices will also be presented.

Read Q&A Blog

Download PDF

Storage Networking Security Series – Key Management 101
11:00 am PT / 2:00 pm ET

Discover how the themes of computational storage, persistent memory, and solid state come together in a webcast from the new SNIA Compute, Memory, and Storage Initiative. We’ll explore how expertise in these three areas can help understand storage architectures, common solution areas, and their impacts on storage devices, systems, and software.

Download PDF

 

Uniting Compute, Memory, and Storage
10:00 am PT / 1:00 pm ET

Contrary to popular belief, securing “data at rest” does not simply mean encrypting the data prior to storage. While it is true that data encryption plays a major role in securing “data at rest,” there are several other factors that come into play and are as important as encryption. In this webinar, we present the end-to-end process to securing “data at rest,” and discuss all the factors and trade-off that must be considered, and some of the general risks that need to be mitigated.

Read Q&A Blog

Download PDF

Storage Networking Security Series: Protecting Data at Rest
10:00 am PT / 1:00 pm ET

Watch this encryption webcast: Storage Networking Security: Encryption 101 where security experts will cover:

  • A brief history of Encryption
  • Cryptography basics
  • Definition of terms – Entropy, Cipher, Symmetric & Asymmetric Keys, Certificates and Digital signatures, etc.
  • Introduction to Key Management

Download the PDF

Q&A Blog Post

Storage Networking Security Series – Encryption 101
10:00 am PT / 1:00 pm ET

More and more we are seeing compute and inference move to the edge. This is driven by the growth in capability to not only generate data from sensors, devices and by people operating in the field, but also by the interaction between those devices.

This new source of data and information brings with it unique challenges to the way we store and transmit data as well as the way we need to curate it. In this webcast we will look at:

  • New patterns generated by the explosion of the Internet of Things
  • How IoT is impacting storage and data strategies
  • Security and privacy issues and considerations
  • How to think about the lifecycle of our information in this new environment

Read Q&A Blog

Download PDF

The Influence of IoT on Data Strategy
11:00 am PT / 2:00 pm ET

The SNIA Swordfish specification is currently growing to include full NVMe and NVMe-oF enablement and alignment across DMTF, NVMe, and SNIA for NVMe and NVMe-oF use cases. SNIA members are contributing to specification development and helping to shape the ecosystem. This presentation will provide an overview of the work in progress to map these standards together to ensure NVMe and NVMe-oF environments can be represented entirely in Swordfish and Redfish environments.

 

NVMe and NVMe-oF Configuration and Manageability with Swordfish and Redfish
9:00 am GMT / 5:00 am ET

In this webcast, we will explore why your storage may be acting strangely now that it’s been subjected to the whims of data scientists. We’ll look at how and why the I/O patterns have changed, where this will lead, and some of the tactics and strategies you can deploy now to prevent impact from this new movement of storage saboteurs!

Your Storage Infrastructure on AI