2016 Tutorials - Flash Memory Summit Abstracts

The Abstracts

Case for Flash Storage – How it Can Benefit Your Enterprise
Dejan Kocic
Download

Flash storage is becoming important factor for both consumers and in the enterprises. Benefits of flash storage are many, but much higher cost of flash storage as compared to traditional storage is making it hard to justify financially buying of the flash storage.  What many storage customers don’t necessarily realized that price per megabyte or gigabyte of capacity is outdated model and it does not represent true cost of storage. Many enterprise consumers of storage keep buying more and more hard drives, not to satisfy capacity requirement, but to satisfy performance requirement, but when total cost of ownership is taken into consideration, flash storage becomes very competitive with much smaller footprint, cooling and power requirements. There are also certain workloads, which can benefit tremendously from using flash storage and those will be discussed in this presentation.

Learning Objectives

  • Flash Technology
  • Storage Technologies

Storage in Combined Service/Product Data Infrastructures
Craig Dunwoody
Download

It is increasingly common to combine as-a-service and as-a-product consumption models for elements of an organization's data infrastructure, including applications; development platforms; databases; and networking, processing, and storage resources. Some refer to this as "hybrid" architecture.

Learning Objectives

  • Considerations for Choosing Storage Services and or Products for Specific Use Cases
  • Evolving economics of service and product consumption models for storage resources
  • Reducing cost and operational complexity by consolidating storage capabilities into a smaller number of platforms

Utilizing VDBench to Perform IDC AFA Testing
Michael Ault
Download

Using technical (not marketing) language, and without naming specific vendors or products, this presentation covers some improved storage capabilities becoming available in service and product offerings, and some scenarios for integrating these kinds of offerings with other data infrastructure services and products

Learning Objectives

  • Undertand the requirements of IDC testing   
  • Provide guidelines and scripts for use with VDBench for IDC tests
  • Demonstrate a framework for evaluating multiple AFAs using IDC guidlines

Implementing Stored-Data Encryption
Michael Willettt
Download

Data security is top of mind for most businesses trying to respond to the constant barrage of news highlighting data theft, security breaches, and the resulting punitive costs.  Combined with litigation risks, compliance issues and pending legislation, companies face a myriad of technologies and products that all claim to protect data-at-rest on storage devices. What is the right approach to encrypting stored data?

The Trusted Computing Group, with the active participation of the drive industry, has standardized on the technology for self-encrypting drives (SED): the encryption is implemented directly in the drive hardware and electronics. Mature SED products are now available from all the major drive companies, both HDD (rotating media) and SSD (solid state) and both laptops and data center. SEDs provide a low-cost, transparent, performance-optimized solution for stored-data encryption. SEDs do not protect data in transit, upstream of the storage system.

For overall data protection, a layered encryption approach is advised. Sensitive data (eg, as identified by specific regulations: HIPAA, PCI DSS) may require encryption outside and upstream from storage, such as in selected applications or associated with database manipulations.
This tutorial will examine a ‘pyramid’ approach to encryption: selected, sensitive data encrypted at the higher logical levels, with full data encryption for all stored data provided by SEDs.

Learning Objectives

  • The mechanics of SEDs, as well as application and database-level encryption   
  • The pros and cons of each encryption subsystem   
  • The overall design of a layered encryption approach

NVDIMM Cookbook - A Guide for NVDIMM Integration
Arthur Sainio and Mario Martinez
Download

This NVDIMM tutorial provides an overview of the building blocks and interaction needed to integrate NVDIMMs into a system. The building blocks include the OS, BIOS, NVDIMM and platform hardware.

Learning Objectives

  • Identify hardware, software, drivers, BIOS, programming interfaces, etc… (the “ingredients”)    
  • Gain a clear understanding of how the building blocks work to support NVDIMMs     
  • Provide examples of available offerings (reference only)