Knowledge Center

Throughout the year, CSTI Member companies share their expert knowledge by providing educational webcasts through the SNIA BrightTalk channel. Check out some of our recent webcasts and see why viewers say:

Good technical content, and also highly vendor agnostic which I very much appreciate.

Great explanations, extremely comprehensive and knowledgeable presenters!

Good, thought-provoking stuff here. Clear and concise with good links for follow-up.

On Demand Webcasts

Moving Genomics to the Cloud: Compute and Storage Considerations

The study of genomics in modern biology has revolutionized the discovery of medicines and driven the rapid development of vaccines. Genomics, however, requires a significant amount of compute power and data storage to make new discoveries possible. This session will feature expert viewpoints from both bioinformatics and technology perspectives with a focus on some of the compute and data storage challenges for genomics workflows.

View Webcast

Extending Storage to the Edge: How it Should Afffect Your Storage Strategy

Data gravity has pulled computing to the Edge and enabled significant advances in hybrid cloud deployments. The ability to run analytics from the datacenter to the Edge, where the data is created and lives, also creates new use cases for nearly every industry and company. However, this movement of compute to the Edge is not the only pattern to have emerged. How might these other use cases impact your storage strategy?

This interactive webcast by the SNIA CSTI covers

  • Emerging patterns of data movement and the use cases that drive the
  • Cloud Bursting
  • Federated Learning across the Edge and Hybrid Cloud
  • Considerations for distributed cloud storage architectures to match these emerging patterns
 

How to Easily Deploy Confidential Computing

Confidential Computing is architected to provide security for data in use to meet this critical need for enterprises today. This webcast provides insight into how data center, cloud and edge applications may easily benefit from cost-effective, real-world Confidential Computing solutions. This educational discussion provides end-user examples, tips on how to assess systems before and after deployment, as well as key steps to complete along the journey to mitigate threat exposure. You'll learn:

  • What would it take to build-your-own Confidential Computing solution?
  • Emergence of easily deployable, cost-effective Confidential Computing solutions
  • Real world usage examples and key technical, business and investment insights

View Webcast

Confidential Computing: Protecting Data in Use

As noted in our panel discussion “What is Confidential Computing and Why Should I Care?,” Confidential Computing is an emerging industry initiative focused on helping to secure data in use. The efforts can enable encrypted data to be processed in memory while lowering the risk of exposing it to the rest of the system, thereby reducing the potential for sensitive data to be exposed while providing a higher degree of control and transparency for users.

As computing moves to span multiple environments from on-premises to public cloud to edge, organizations need protection controls that help safeguard sensitive IP and workload data wherever the data resides. In this live webcast we’ll cover:

  • How Confidential Computing works in multi-tenant cloud environments
  • How sensitive data can be isolated from other privileged portions of the stack
  • Applications in financial services, healthcare industries, and broader enterprise applications
  • Contributing to the Confidential Computing Consortium

View Webcast

What is Confidential Computing and Why Should I Care?

In the "arms race" of security, new defensive tactics are always needed. One significant approach is Confidential Computing: a technology that can isolate data and execution in a secure space on a system, which takes the concept of security to new levels. This SNIA Cloud Storage Technologies Initiative (CSTI) webcast will provide an introduction and explanation of Confidential Computing and will feature a panel of industry architects responsible for defining Confidential Compute. It will be a lively conversation on topics including:

  • The basics of hardware-based Trusted Execution Environments (TEEs) and how they work to enable confidential computing
  • How to architect solutions based around TEEs
  • How this foundation fits with other security technologies
  • Adjacencies to storage technologies

View Webcast

Continuous Delivery: Cloud Software Development on Speed

In the world of cloud services development, it's necessary to gain an edge on the myriad of competition facing your product or service. Volume and variety are not just characteristics of cloud data, but also of the software needed to deliver accurate decisions. While a variety of software techniques exist to create effective development teams, sometimes it's worthwhile to look elsewhere for additional success factors. In this webcast, we'll be focusing on adapting some of the principles of modern manufacturing to add to the development toolbox. A Continuous Delivery methodology ensures that the product is streamlined in its feature set while building constant value to the customer via the cloud. Watch to learn:

  • What is Continuous Delivery?
  • Why are Product Teams Adopting CD?
  • Software Development as a Manufacturing Line
  • How to Implement on Your Team
  • How to Get Started

View Webcast

The Ethics of Artificial Intelligence

Artificial Intelligence technologies are possibly the most substantive and meaningful change to modern business.  The ability to process large amounts of data with varying degrees of structure and form enables large leaps in insight to drive revenue and profit.  Likewise, governments and civil society have significant opportunity for improvement of the lives of the populace.  However, with the power that AI brings comes the risks of any technology innovation.  This interactive session will cover some of the ethical issues that AI can bring.  Attendees should expect to learn:

  • How making decisions at the speed of AI could be ethically challenging
  • Examples of how companies have structures to approach AI policy
  • The pitfalls of managing the human side of AI development
  • Potential legal implications of using AI to make decisions
  • Advice for addressing potential ethics issues before they are unsolvable

View Webcast

Data Protection and Data Privacy in the COVID Era

The COVID-19 Pandemic has amplified cybersecurity concerns particularly related to the cloud. Threat actors have recognized a unique opportunity to exploit pandemic-related vulnerabilities through social engineering attacks, business email compromise, work from home or other remote weak points. This results in increased risk and occurrence of ransomware attacks and data breaches that can disrupt or totally compromise organizations’ ability to conduct business. These security incidents can also subject victims to liability for violations of privacy and data breach notification laws. Join this webcast as SNIA experts will discuss:

  • Changing threat landscape due to COVID
  • Recent attacker exploits
  • Common security failures and their consequences
  • Strategies to combat malware
  • Minimizing ransomware risks

View webcast

Cloud Data Management & Interoperability: What a CDMI Standard Matters

The Cloud Data Management Interface (CDMI™) International Standard is intended for application developers who are implementing cloud storage systems, and who are developing applications to manage and consume cloud storage. It documents how to access cloud storage namespaces and how to manage the data stored in these namespaces. In this webcast we’ll provide an overview of the CDMI standard and cover CDMI 2.0:

  • Support for encrypted objects
  • Delegated access control
  • General clarifications
  • Errata contributed by vendors implementing the CDMI standard
  • Healthcare use case

View Webcast

How Video Analytics is Changing the Way We Store Video

There is a new wave of cognitive services based on video and image analytics, leveraging the latest in machine learning and deep learning. In this webcast, we will look at some of the benefits and factors driving this adoption, as well as explore compelling projects and required components for a successful video-based cognitive service. This includes some great work in the open source community to provide methods and frameworks, some standards that are being worked on to unify the ecosystem and allow interoperability with models and architectures. Finally, we’ll cover the data required to train such models, the data source and how it needs to be treated.

However, there are challenges in how we do this. Many archives were analog and tape based which doesn’t stand up well to mass ingestion or the back and forth of training algorithms. How can we start to define new architectures and leverage the right medium to make our archives accessible whilst still focusing on performance at the point of capture?

View Webcast

Storage Implications at the Velocity of 5G Streaming

The broad adoption of 5G, Internet of things (IoT) and edge computing will reshape the nature and role of enterprise and cloud storage over the next several years. What building blocks, capabilities and integration methods are needed to make this happen? You'll hear:

  • With 5G, IoT and edge computing - how much data are we talking about?
  • What will be the first applications leading to collaborative data-intelligence streaming?
  • How can low latency microservices and AI quickly extract insights from large amounts of data?
  • What are the emerging requirements for scalable stream storage - from peta to zeta?
  • How are yesterday’s object-based batch analytic processing (Hadoop) and today’s streaming messaging capabilities (Apache Kafka and RabbitMQ) work together?
  • What are the best approaches for getting data from the Edge to the Cloud?  

View Webcast

Using Data Literacy to Drive Insight

Having access to data does not automatically grant the knowledge of how to interpret that data or the ability to derive insight. It is even challenging to judge the accuracy or value in that data. The skill required is known as data literacy, and in this presentation we will look at how access to one data source will inevitably drive the need to access more. We will examine:

  • How data literacy is defined by the ability to interpret and apply context
  • What supporting information is needed
  • How a data scientist approaches new data sources and the questions they ask of it
  • How to seek out supporting or challenging data to validate its accuracy and value for providing insight
  • How this impacts underlying information systems and how data platforms need to adjust to this purpose+ data eco-system where data sources are no longer single use

View Webcast

Does Your Storage Need a Cyber Insurance Tune Up?

Protection against cyber threats is recognized as a necessary component of an effective risk management approach, typically based on a well-known cybersecurity framework. A growing area to further mitigate risks and provide organizations with the high level of protection they need is cyber insurance. However, it’s not as simple as buying a pre-packaged policy.

This webcast provides overview of how cyber insurance fits in a risk management program. It will identify key terms and conditions that should be understood and carefully negotiated. Cyber insurance policies may not cover all types of losses, so it is critical to identify what risks and conditions are excluded from a cyber insurance policy before you buy.

View Webcast

IT Modernization with AIOps: The Journey

The almost overnight shift of resources toward remote work introduces the need for far more flexible, dynamic and seamless end-to-end applications, putting us on a path that requires autonomous capabilities using AIOps – Artificial Intelligence for IT Operations.

This webcast will provide an overview of concepts and strategies to accelerate the digitalization of critical enterprise IT resources, and help architects rethink what applications and underlying infrastructure are needed to support an agile, seamless end-to-end data centric environment.  This session will specifically address migration from monolithic to microservices, transition to Cloud Native services, and the platform requirements to help accelerate AIOps application delivery within our dynamic hybrid and multi-cloud world.  

View Webcast

A Multi-tenant Multi-cluster Kubernetes Datapocalypse is Coming

The need for rapid deployment of scalable clusters is creating an opportunity for container solutions such as Kubernetes. But what are the implications of multiple Kubernetes clusters in a broad deployment? What happens if a cluster goes down? What’s the impact on business resiliency? Managing and securing multiple clusters is becoming a key topic and area of debate. Multi-cluster Kubernetes that provides robustness & resilience is rapidly moving from “best practice” to a “must have”.

View Webcast

Storage Scalability in Hybrid Cloud and Multicloud Environments

As data growth in enterprises continues to sky rocket, datacenter cloud scalability whether on premises, in hybrid cloud or in multicloud deployments is key for businesses. So, what are enterprise IT organizations supposed to do, given that 'run anything anywhere' is becoming more important than ever? Customers are finding that hybrid cloud storage solutions better meet their IT and business growth needs, so they can rapidly scale their IT infrastructure and cover a wider array of services.

View Webcast

The Influence of IoT on Data Strategy

More and more we are seeing compute and inference move to the edge. This is driven by the growth in capability to not only generate data from sensors, devices and by people operating in the field, but also by the interaction between those devices. This new source of data and information brings with it unique challenges to the way we store and transmit data as well as the way we need to curate it. In this webcast we will look at:

  • New patterns generated by the explosion of the Internet of Things
  • How IoT is impacting storage and data strategies
  • Security and privacy issues and considerations
  • How to think about the lifecycle of our information in this new environment

View Webcast

The Impact of Artificial Intelligence on Storage and IT

Artificial intelligence (AI) and machine learning (ML) have been having quite the impact on most industries in the last couple of years, but what about our own IT industry? In this webcast find out how the rise of machine learning has created a new type of demand on IT operations teams as well as how those same teams can utilize new insights and capabilities driven by machine learning. We will explore:

  • The demand on infrastructure
  • Storage and data pipelines
  • The growing field of IT operations leveraging AI (aka AIOps)

View Webcast

Cloud Standards: What They Are, Why You Should Care

Since the initial publication of the National Institute of Standards and Technology (NIST) definition of cloud computing in NIST SP 800-145 in 2011, international standards development organizations (SDOs) have sought to refine and expand the cloud computing landscape. This webinar will identify key published and draft cloud standards, discuss their interdependencies, and highlight their importance as well as identify potential future work. In addition, related technologies such as virtualization, federation, and fog/edge computing will be addressed. Lastly, the relevance of the standards will be explored to help organizations understands ways these documents can be exploited.

View Webcast

Kubernetes in the Cloud - Part Three: Almost Everything You Need to Know about Stateful Workloads (August 2019)

Kubernetes is great for running stateless workloads, like web servers. It’ll run health checks, restart containers when they crash, and do all sorts of other wonderful things. So, what about stateful workloads?

This webcast will take a look at when it’s appropriate to run a stateful workload in cluster, or out. We’ll discuss the best options for running a workload like a database on the cloud, or in the cluster, and what’s needed to set that up. We cover:

  • Secrets management
  • Running a database on a VM and connecting it to Kubernetes as a service
  • Running a database in Kubernetes using a `stateful set`
  • Running a database in Kubernetes using an Operator
  • Running a database on a cloud managed service

View Webcast


View All On-Demand Cloud Storage Technologies Initiative Webcasts