Storage Developer Conference Tutorial Abstracts

Jump straight to an tutorial abstract:


Reforming EU Data Protection
Eric Hibbard
Download

After reviewing the diverging data protection legislation in the EU member states, the European Commission (EC) decided that this situation would impede the free flow of data within the EU zone. The EC response was to undertake an effort to "harmonize" the data protection regulations and it started the process by proposing a new data protection framework. This proposal includes some significant changes like defining a data breach to include data destruction, adding the right to be forgotten, adopting the U.S. practice of breach notifications, and many other new elements. Another major change is a shift from a directive to a rule, which means the protections are the same for all 27 countries and includes significant financial penalties for infractions. This tutorial explores the new EU data protection legislation and highlights the elements that could have significant impacts on data handling practices.

Learning Objectives

  • Highlight the major changes to the previous data protection directive.
  • Understand the differences between “Directives” versus “Regulations”, as it pertains to the EU members.
  • Learn the nature of the Reforms as well as the specific proposed changes – in both the directives and the regulations.

SCSI Standards and Technology Update
Marty Czekalski
Download

Shingled Magnetic Recording (SMR) is a new technology that allows disk drive suppliers to extend the areal density growth curve with today’s conventional components (heads, media) as well as providing compatibility with future evolutionary technologies. While the shingled recording subsystem techniques are similar amongst SMR device types, there are a variety of solutions with respect to the drive interface and resultant host implications across the various market segments utilizing HDDs. This presentation will provide insight into the primary SMR models—Drive Managed and Zoned Block Devices; provide an update on the progress in the Interface Committee Standards (ZBC/ZAC); provide insight regarding alignment of the SMR models to a variety of applications/workload models; and provide insights regarding other industry ecosystem infrastructure support.

Learning Objectives

  • Gain an understanding of the 3 SMR Models—Drive Managed (Autonomous) direct access devices, and Host Aware & Host Managed Zoned Block devices               
  • Interface Committee Standardization for Zoned Block Devices: T10 (SCSI) ZBC and T13 (SATA) ZAC: New Commands and Best Practices
  • Where to use Drive Managed SMR drives and where to use Zoned Block Devices
  • Update on the State of the Storage Stack:  File systems,  Device drivers, Host bus adapters and port expanders

Shingled Magnetic Recording [ SMR Models, Standardization, and Applications
Mary E. Dunn
Timothy Feldman

Download

Shingled Magnetic Recording (SMR) is a new technology that allows disk drive suppliers to extend the areal density growth curve with today’s conventional components (heads, media) as well as providing compatibility with future evolutionary technologies. While the shingled recording subsystem techniques are similar amongst SMR device types, there are a variety of solutions with respect to the drive interface and resultant host implications across the various market segments utilizing HDDs. This presentation will provide insight into the primary SMR models—Drive Managed and Zoned Block Devices; provide an update on the progress in the Interface Committee Standards (ZBC/ZAC); provide insight regarding alignment of the SMR models to a variety of applications/workload models; and provide insights regarding other industry ecosystem infrastructure support.

Learning Objectives

  • Gain an understanding of the 3 SMR Models—Drive Managed (Autonomous) direct access devices, and Host Aware & Host Managed Zoned Block devices
  • Interface Committee Standardization for Zoned Block Devices: T10 (SCSI) ZBC and T13 (SATA) ZAC: New Commands and Best Practices
  • Where to use Drive Managed SMR drives and where to use Zoned Block Devices           
  • Update on the State of the Storage Stack:  File systems,  Device drivers, Host bus adapters and port expanders

Swift Object Storage: Adding Erasure Codes
Paul Luse
Kevin Greenan

Download

This session will provide insight into this extremely successful community effort of adding an Erasure Code capability to the OpenStack Swift Object Storage System by walking the audience through the design and development experience through the eyes of the developers from key contributors. An overview of Swift Architecture and basic Erasure Codes will be followed by design/implementation details.

Learning Objectives

  • Introduction to Swift Object Storage
  • Introduction To Erasure Codes
  • Design overview of Erasure Codes in Swift

Hadoop 2: New and Noteworthy
Sujee Maniyam
Download

Hadoop version 2 recently became available. It packs a multitude of features that are important to scalability, inter-operability and adaptability in enterprises.

This talk will highlight some of these features.


Best Practices for Cloud Security and Privacy
Eric Hibbard
Download

As organizations embrace various cloud computing offerings it is important to address security and privacy as part of good governance, risk management and due diligence. Failure to adequately handle these requirements can place the organization at significant risk for not meeting compliance obligations and exposing sensitive data to possible data breaches. Fortunately, ISO/IEC, ITU-T and the Cloud Security Alliance (CSA) have been busy developing standards and guidance in these areas for cloud computing, and these materials can be used as a starting point for what some believe is a make-or-break aspect of cloud computing.

This session provides an introduction to cloud computing security concepts and issues as well as identifying key guidance and emerging standards. Specific CSA materials are identified and discussed to help address common issues. The session concludes by providing a security review of the emerging ISO/IEC and ITU-T standards in the cloud space.

Learning Objectives

  • General introduction to cloud security threats and risks
  • Identify applicable materials to help secure cloud services
  • Understand key cloud security guidance and requirements

Synthetic Enterprise Application Workload Testing
Eden Kim
Download

Introduction of Synthetic Application Workloads and new testing that focuses on IOPS and Response Times as demand intensity increases. Discussion of SSD performance states, PTS test methodology for drive preparation and test, definition of synthetic application workloads and a case study showing IOPS and Response Time saturation as demand intensity increases. Particular focus on response time Quality of Service and confidence levels up to 99.999% (or 5 nines) of confidence.

Learning Objectives

  • Understanding Demand Intensity, Confidence Levels and Quality of Service
  • Defining Synthetic Application Workloads
  • Developing a test plan using SNIA SSS PTS test methodologies
  • Evaluate Response Time QoS as demand intensity increases - selecting optimal OIO operating points

The Ultimate Storage Virtualization
Felix Xavier
Download

The concept of virtualization is not new for the storage. Logical Volume Manager is the earliest form of storage virtualization which allowed to create virtual volumes abstracted from the underlying hardware. Subsequently, scale-out NAS virtualized the NFS mount point through virtual IP address where NFS mount point is floating above the group of hardware storage nodes. Virtual Server or commonly known as VM in the server world triggered the new form of virtualization in the storage world, it is storage virtual machines. This is in fact reverse of scale-out NAS problem. Due to the arrival of SSDs, storage systems are becoming larger and larger in terms of storage performance, hence this hardware storage system needs to be shared among multiple applications. This brings out the need for storage virtual machines, which abstract the physical characteristics of storage such as IOPS, throughput, latency and capacity into software and credibly share the larger storage system with multiple applications. This is the ultimate form of storage virtualization.


Practical Secure Storage: A Vendor Agnostic Overview
Walt Hubis
Download

This presentation will explore the fundamental concepts of implementing secure enterprise storage using current technologies. This tutorial will  focus on the implementation of a practical secure storage system, independent of any specific vendor implementation or methodology. The high level requirements that drive the implementation of secure storage for the enterprise, including legal issues, key management, current technologies available to the end user, and fiscal considerations will be explored in detail. In addition, actual implementation examples will be provided that illustrate how these requirements are applied to actual systems implementations.

This presentation has been significantly updated to include emerging technologies and changes in the international standards environment (ISO/IEC) as related to storage security.

Learning Objectives

  • Understand what is driving the need for secure storage