2016 Tutorials - Data Storage Innovation Conference Abstracts

The Abstracts

Windows Interoperability Workshop
Christopher Hertel
Download

Systems—can be a daunting endeavor ...and annoying, too. This tutorial will provide an overview of the SMB3 network file protocol (the heart and soul of Windows Interoperability) and describe some of the unique and powerful features that SMB3 provides. We will also point out and discuss some of the other protocols and services that are integrated with SMB3 (such as PeerDist), and show how the different pieces are stapled together and made to fly. The tutorial will also cover the general structure of Microsoft's protocol documentation, the best available cartography for those lost in the Interoperability Jungle.  Some simple code examples will be used sparingly as examples, wherever it may seem clever and useful to do

Learning Objectives

  • Learn how real-world workloads perform on different types of flash storage
  • Learn how different application workloads affect latency
  • Learn about some of the interfaces used for flash storage

Storage in Combined Service/product Data Infrastructures
Craig Dunwoody
Download

It is increasingly common to combine as-a-service and as-a-product consumption models for elements of an organization's data infrastructure, including applications; development platforms; databases; and networking, processing, and storage resources. Some refer to this as ""hybrid"" architecture.

Using technical (not marketing) language, and without naming specific vendors or products, this presentation covers some improved storage capabilities becoming available in service and product offerings, and some scenarios for integrating these kinds of offerings with other data infrastructure services and products.

Learning Objectives

  • Considerations for choosing storage services and/or products for specific use cases
  • Economics of service and product consumption models for storage resources
  • Reducing cost and operational complexity by consolidating storage capabilities into a smaller number of platforms

Protecting Data in a Big Data World
David Chapa
Download

Where are today’s storage performance bottlenecks, how do you find them and how does adding flash storage affect them? Demartek will report the results (IOPS, throughput and latency) of vendor-neutral performance tests run on database and virtualization workloads typical of those found in today’s data centers. The tests cover both hybrid and all-flash solutions from several manufacturers and using a variety of form factors and interfaces. You will come away with reasonable estimates of what to expect in practice, observe how different workloads affect storage system performance and notice the difference in performance results depending on where the measurements were taken. Technologies discussed include server-side flash, hybrid storage arrays, all-flash arrays and various interfaces including NVMe.   

Learning Objectives

  • Learn how real-world workloads perform on different types of flash storage
  • Learn how different application workloads affect latency
  • Learn about some of the interfaces used for flash storage

Selecting Workloads for Hyperconverged vs Hyperscale Software-defined Storage
Eric Carter
Download

Debate is rising in the industry over the best method for deploying infrastructure in private and public cloud datacenters. The predictable performance, packaging, and capacity increments of hyperconverged systems have made it the latest model to gain traction. Hyperscale is also gaining momentum as a preferred architecture due to its independent scaling capabilities. Now, businesses are asking, which is the best deployment for software-defined storage? The answer: it depends.

Attendees will learn which deployment is suitable for their workload types – ranging from general purpose server virtualization and VDI to big data and non-virtualized applications. Attendees from companies looking to modernize their IT infrastructure with a goal of being more agile and “cloud-like” will gain insight into whether hyperscale, hyperconverged, or a mixture of both systems provides the right solution to support their storage needs."

Learning Objectives

  • How to distinguish hyperconverged from hyperscale and the advantages of each   
  • How software-defined storage is deployed in each architecture
  • How organizations get started with software-defined storage

Intro to Encryption & Key Management: Why, What & Where?
Eric Hibbard
Download

This Tutorial will explore the fundamental concepts of implementing secure enterprise storage using current technologies, and will focus on the implementation of a practical secure storage system. The high level requirements that drive the implementation of secure storage for the enterprise, including legal issues, key management, current available technologies, as well as fiscal considerations will be explored. There will also be implementation examples that will illustrate how these requirements are applied to actual system implementations.

Learning Objectives

  • Understand backup and restore technology including tape, disk, snapshots, deduplication, virtual tape, replication technologies and the cloud.
  • Compare and contrast backup and restore alternatives to achieve data protection and data recovery.
  • Identify and define backup and restore operations and terms.

Trends in Backup & Restoration Technologies
Jason Iehl
Download

Many disk technologies, both old and new, are being used to augment tried and true backup and data protection methodologies to deliver better information and application restoration performance; These technologies work in parallel with the existing backup paradigm. This session will discuss many of these technologies in detail; Important considerations of data protection include performance, scale, regulatory compliance, recovery objectives and cost; Technologies include contemporary backup, disk based backups, snapshots, continuous data protection and capacity optimized storage, as well as cloud services. This tutorial will cover how these technologies interoperate, as well as best practices recommendations for deployment in today's heterogeneous data centers.

Learning Objectives

  • Understand backup and restore technology including tape, disk, snapshots, deduplication, virtual tape, replication technologies and the cloud
  • Compare and contrast backup and restore alternatives to achieve data protection and data recovery.
  • Identify and define backup and restore operations and terms.

Networking Flash Storage? – Fibre Channel was always the answer
Mark Jones
Download

Fibre Channel has been the ubiquitous connection of choice for connecting storage within the datacenter for nearly twenty years.  The start of the sixth generation is being celebrated this year by introducing a staggering leap in performance and new features.  We will discuss why Fibre Channel holds the enduring popularity it has as well as an in-depth look at the new Gen 6 features and what the future holds.  We will discuss how Fibre Channel fits in with key datacenter initiatives such as virtualization, the pervasive adoption of SSD’s/Flash and the movement towards cloud architectures.

Learning Objectives

  • Introduce the audience to the updated Fibre Channel Technology Roadmap
  • This document serves as a reliable guide for suppliers, manufacturers and distributors of products to plan.
  • Specific use cases will be discussed that illustrate how deploying Gen6 Fibre Channel today can accelerate I/O performance hungry applications even in your existing SAN infrastructure.    Educate attendees on the backward compatibility nature of Fibre Channel with no user intervention required. 

Object Drives: Simplifying the Storage Stack
Mark Carlson
Download

A number of scale out storage solutions, as part of open source and other projects, are architected to scale out by incrementally adding and removing storage nodes. Example projects include:

    Hadoop’s HDFS
    CEPH
    Swift (OpenStack object storage)

The typical storage node architecture includes inexpensive enclosures with IP networking, CPU, Memory and Direct Attached Storage (DAS). While inexpensive to deploy, these solutions become harder to manage over time. Power and space requirements of Data Centers are difficult to meet with this type of solution. Object Drives further partition these object systems allowing storage to scale up and down by single drive increments.

This talk will discuss the current state and future prospects for object drives. Use cases and requirements will be examined and best practices will be described.

Learning Objectives

  • What are object drives?
  • What value do they provide?
  • Where are they best deployed?

Implementing Stored-Data Encryption
Michael Willett
Download

Data security is top of mind for most businesses trying to respond to the constant barrage of news highlighting data theft, security breaches, and the resulting punitive costs.  Combined with litigation risks, compliance issues and pending legislation, companies face a myriad of technologies and products that all claim to protect data-at-rest on storage devices. What is the right approach to encrypting stored data?

The Trusted Computing Group, with the active participation of the drive industry, has standardized on the technology for self-encrypting drives (SED): the encryption is implemented directly in the drive hardware and electronics. Mature SED products are now available from all the major drive companies, both HDD (rotating media) and SSD (solid state) and both laptops and data center. SEDs provide a low-cost, transparent, performance-optimized solution for stored-data encryption. SEDs do not protect data in transit, upstream of the storage system.

For overall data protection, a layered encryption approach is advised. Sensitive data (eg, as identified by specific regulations: HIPAA, PCI DSS) may require encryption outside and upstream from storage, such as in selected applications or associated with database manipulations.

This tutorial will examine a ‘pyramid’ approach to encryption: selected, sensitive data encrypted at the higher logical levels, with full data encryption for all stored data provided by SEDs.

Learning Objectives

  • The mechanics of SEDs, as well as application and database-level encryption
  • The pros and cons of each encryption subsystem   
  • The overall design of a layered encryption approach 

Why Analytics on Cloud Storage?
Padmavathy Madhusudhanan
Radhakrishna Singuru

Download

Cloud platforms that provide a scalable, virtualized infrastructure are becoming ubiquitous.  As the underlying storage can meet extreme demands of scalability in this platform, running storage analytics applications in cloud is gaining momentum.  Gartner estimates 85% of Fortune 500 companies do not reap the full benefit of their data analytics, causing them to loose potential opportunities. Different Cloud providers do supply various metrics but they seem to be not uniform and inadequate sometimes.  This mandates for a Cloud Storage analytics solution that follows a scientific process of transforming storage data metrics into insight for making better decisions.

Learning Objectives

  • Key areas where Cloud storage analytics help ex. capacity planning
  • Challenges in cloud based storage analytics (no uniform metrics across providers etc)
  • Benefits of Cloud based Storage analytics: Data Isolation


Massively Scalable File Storage
Philippe Nicolas
Download

Internet changed the world and continues to revolutionize how people are connected, exchange data and do business. This radical change is one of the causes of the rapid explosion of data volume that required a new data storage approach and design. One of the common elements is that unstructured data rules the IT world. How famous Internet services we all use every day can support and scale with thousands of new users and hundreds of TB added daily and continue to deliver an enterprise-class SLA ? What are various technologies behind a Cloud Storage service to support hundreds of millions users? This tutorial covers technologies introduced by famous papers about Google File System and BigTable, Amazon Dynamo or Apache Hadoop. In addition, Parallel, Scale-out, Distributed and P2P approaches with open source and proprietary ones are illustrated as well. This tutorial adds also some key features essential at large scale to help understand and differentiate industry vendors and open source offerings.

Learning Objectives

  • Understand technology directions for large scale storage deployments
  • Be able to compare technologies   
  • Learn from big internet companies about their storage choices and approaches

SAS: Today’s Fast and Flexible Storage Fabric
Rick Kutcipal
Download

For storage professionals seeking fast, flexible and reliable data access, Serial Attached SCSI (SAS) is the proven platform for innovation.   With a robust roadmap, SAS provides superior enterprise-class system performance, connectivity and scalability. This presentation will discuss why SCSI continues to be the backbone of enterprise storage deployments and how it continues to rapidly evolve by adding new features, capabilities, and performance enhancements. It will include an up-to-the-minute recap of the latest additions to the SAS standard and roadmaps, the status of 12Gb/s SAS deployment, advanced connectivity solutions, MultiLink SAS™, and 24Gb/s SAS development. Presenters will also provide updates on new SCSI features such as Storage Intelligence and Zoned Block Commands (ZBC) for shingled magnetic recording.

Learning Objectives

  • Gain insight on how SAS continues to be the primary building block for advanced storage solutions.
  • Hear the latest updates on the market adoption of 12Gb/s SAS and why it is significant.
  • See examples of how SAS is a potent connectivity solution especially when coupled with SAS switching solutions. These innovative SAS configurations become a vehicle for low cost storage expansion. 

Advanced Data Reduction Concepts
Ron Pagani
Download

Since arriving over a decade ago, the adoption of data deduplication has become widespread throughout the storage and data protection communities.  This tutorial assumes a basic understanding of deduplication and covers topics that attendees will find helpful in understanding today’s expanded use of this technology.    Topics will include trends in vendor deduplication design and practical use cases, e.g., primary storage, data protection, replication, etc., and will also cover other data reduction technologies, e.g., compression, etc.

Learning Objectives

  • Have a clear understanding of current data reduction design trends.
  • Have the ability to discern between various deduplication design approaches and strengths.
  • Recognize new potential use cases for data reduction technologies in various storage environments.

Planning for Persistent Memory in the Data Center
Sarah Jelinek
Download

Persistent memory is a disruptive technology that will require a lot of thought for integration into the data center. What is persistent memory and why does it matter? How will enterprise applications leverage this resource? How will middleware, libraries and run-time application environments change? Sarah will discuss the basics of persistent memory along with how we are making use of persistent memory using load/store access with NVML. Sarah will describe use cases for load/store accessible NVM, some transparent to applications, others non-transparent. And finally, Sarah will discuss where persistent memory is leading us.

Learning Objectives

  • What is persistent memory?
  • ow will enterprise applications make use of this new technology.?
  • What is persistent memory?    How will enterprise applications make use of this new technology?

Big Data Essentials for IT Professionals
Sujee Maniyam
Download

Big Data is a ‘buzz’  word.  There are lots of systems and software that claim to be doing Big Data.  How do you separate noise from facts?
In this talk we aim to give you a comprehensive coverage of modern Big Data landscape.  

We will talk about various components , open source projects that make up Big Data ‘barn.'  The talk will cover a few Big Data use cases and recommended designs for those use cases.

Learning Objectives

  • Intended Audience
  • Developers / Managers / Architects / Directors Level
  • Beginner / Intermediate

Privacy vs Data Protection: The Impact of EU Data Protection Legislation
Thomas Rivera
Download

After reviewing the diverging data protection legislation in the EU member states, the European Commission (EC) decided that this situation would impede the free flow of data within the EU zone. The EC response was to undertake an effort to "harmonize" the data protection regulations and it started the process by proposing a new data protection framework. This proposal includes some significant changes like defining a data breach to include data destruction, adding the right to be forgotten, adopting the U.S. practice of breach notifications, and many other new elements. Another major change is a shift from a directive to a rule, which means the protections are the same for all 27 countries and includes significant financial penalties for infractions. This tutorial explores the new EU data protection legislation and highlights the elements that could have significant impacts on data handling practices.

Learning Objectives

  • Highlight the major changes to the previous data protection directive.
  • Review the differences between “Directives” versus “Regulations”, as it pertains to the EU legislation.
  • Learn the nature of the Reforms as well as the specific proposed changes – in both the directives and the regulations.

Intro to Data Protection-Backup to Tape, Disk & Beyond
Tom Sas
Download

Extending the enterprise backup paradigm with disk-based technologies allow users to significantly shrink or eliminate the backup time window.  This tutorial focuses on various methodologies that can deliver efficient and cost effective solutions.  This includes approaches to storage pooling inside of modern backup applications, using disk and file systems within these pools, as well as how and when to utilize Continuous Data Protection, deduplication and virtual tape libraries (VTL), as well as the cloud.

Learning Objectives

  • Understand backup and restore technology including tape, disk, snapshots, deduplication, virtual tape, replication technologies and the cloud.
  • Compare and contrast backup and restore alternatives to achieve data protection and data recovery.
  • Identify and define backup and restore operations and terms.