Knowledge Center

Throughout the year, CSTI Member companies share their expert knowledge by providing educational webcasts through the SNIA BrightTalk channel. Check out some of our recent webcasts and see why viewers say:

Good technical content, and also highly vendor agnostic which I very much appreciate.

Great explanations, extremely comprehensive and knowledgeable presenters!

Good, thought-provoking stuff here. Clear and concise with good links for follow-up.

On Demand Webcasts

High Performance Storage at Exascale

Through massive scale-out capabilities, current parallel file systems are more than able to provide the capacity and raw bandwidth that is needed at Exascale. This webcast examines the different I/O workflows seen on supercomputers today, discussing the approaches the industry is taking to support the convergence of HPC and AI workflows, and highlighting some of the innovations in both storage hardware and parallel file system software that will enable high performance storage at Exascale and beyond.

View Webcast

15 Minutes in the Cloud: Data Privacy vs. Governance vs. Security

Data privacy, data governance and data security are all terms that are mistakenly used interchangeably. They are indeed related, particularly when it comes to keeping data in the cloud protected, private and secure, but the definitions and mechanics of executing on each are all quite different.

Join us for another “15 Minutes in the Cloud” session for an overview of what each of these terms means, how and where they intersect, and why it’s a balancing act to pay adequate attention to each one or risk threatening the overall security of your data.

Presenting will be security experts Thomas Rivera, CISSP, CIPP/US, CDPSE and Strategic Success Manager at VMware Carbon Black together with Eric Hibbard, CISSP-ISSAP, ISSMP, ISSEP, CIPP/US, CIPT, CISA, CDPSE, CCSK and Director, Product Planning – Storage Networking & Security, Samsung Semiconductor.

View Webcast

15 Minutes in the Cloud: What is Cloud?

Everyone is familiar with the term “Cloud” but it’s still worth asking “What is cloud?”  The definition of Cloud has only been around for a dozen years or so. It can be defined as “networked computing facilities providing remote data storage and processing services via the internet.” While the definition is simple, the real-world of cloud is complex, and changing constantly. 
 
This first talk in the SNIA Cloud Storage Technologies Initiative “15 Minutes in the Cloud” series will present a brief history of “The Cloud.” If you are a cloud expert, these sessions might not be for you, but for everyone else, this series of short talks might clear up a lot of questions you may have.
 

5G Industrial Private Networks and Edge Data Pipelines

The convergence of 5G, Edge Compute and Artificial Intelligence (AI) promise to be catalyst for Digital transformation within industrial segments. Advanced 5G is specifically designed to address the needs of verticals with capabilities like enhanced mobile broadband (emBB), ultra-reliable low latency communications (urLLC), and massive machine type communications (mMTC), to enable near real-time distributed intelligence applications. For example, automated guided vehicle and autonomous mobile robots (AGV/AMRs), wireless cameras, augmented reality for connected workers, and smart sensors across many verticals ranging from healthcare and immersive media, to factory automation.

Using this data, manufacturers are looking to maximize operational efficiency and process optimization by leveraging AI and machine learning. To do that, they need to understand and effectively manage the sources and trustworthiness of timely data.

View Webcast

Why Use Multiple Clouds? 

As storing data in the cloud has become ubiquitous and mature, many organizations have adopted a multi-cloud strategy. Eliminating dependence on a single cloud platform is quite a compelling case.

But multi-cloud environments are not without challenges. Taking advantage of the benefits without increasing complexity requires a strategy that ensures applications are not tightly coupled to cloud-specific technologies. Supporting a storage abstraction layer that insulates the application from the underlying cloud provider's interfaces allows an application to be easily used with multiple clouds.

View Webcast

Cloud Storage and Big Data: A Marriage Made in the Clouds

This talk will focus on the history of “Big Data” and how it has pushed the storage envelope, eventually resulting in a seemingly perfect relationship with Cloud Storage. But local storage is the 3rd wheel in this relationship, and won’t go down easy. Can this marriage survive when Big Data is being pulled in two directions? Should Big Data pick one, or can the three of them live happily ever after? 

View Webcast

Moving Genomics to the Cloud: Compute and Storage Considerations

The study of genomics in modern biology has revolutionized the discovery of medicines and driven the rapid development of vaccines. Genomics, however, requires a significant amount of compute power and data storage to make new discoveries possible. This session will feature expert viewpoints from both bioinformatics and technology perspectives with a focus on some of the compute and data storage challenges for genomics workflows.

View Webcast

Extending Storage to the Edge: How it Should Afffect Your Storage Strategy

Data gravity has pulled computing to the Edge and enabled significant advances in hybrid cloud deployments. The ability to run analytics from the datacenter to the Edge, where the data is created and lives, also creates new use cases for nearly every industry and company. However, this movement of compute to the Edge is not the only pattern to have emerged. How might these other use cases impact your storage strategy.

How to Easily Deploy Confidential Computing

Confidential Computing is architected to provide security for data in use to meet this critical need for enterprises today. This webcast provides insight into how data center, cloud and edge applications may easily benefit from cost-effective, real-world Confidential Computing solutions. This educational discussion provides end-user examples, tips on how to assess systems before and after deployment, as well as key steps to complete along the journey to mitigate threat exposure. You'll learn:

To counter the ever-increasing likelihood of catastrophic disruption and cost due to enterprise IT security threats, data center decision makers need to be vigilant in protecting their organization’s data. Confidential Computing is architected to provide security for data in use to meet this critical need for enterprises today. This webcast provides insight into how data center, cloud and edge applications may easily benefit from cost-effective, real-world Confidential Computing solutions. This educational discussion will provide end-user examples, tips on how to assess systems before and after deployment, as well as key steps to complete along the journey to mitigate threat exposure. Presenting are Steve Van Lare (Anjuna), Anand Kashyap (Fortanix), and Michael Hoard (Intel), who will discuss: What would it take to build-your-own Confidential Computing solution? Emergence of easily deployable, cost-effective Confidential Computing solutions Real world usage examples and key technical, business and investment insights

View Webcast

Confidential Computing: Protecting Data in Use

As noted in our panel discussion “What is Confidential Computing and Why Should I Care?,” Confidential Computing is an emerging industry initiative focused on helping to secure data in use. The efforts can enable encrypted data to be processed in memory while lowering the risk of exposing it to the rest of the system, thereby reducing the potential for sensitive data to be exposed while providing a higher degree of control and transparency for users.

As computing moves to span multiple environments from on-premises to public cloud to edge, organizations need protection controls that help safeguard sensitive IP and workload data wherever the data resides. In this live webcast we’ll cover:

View Webcast

What is Confidential Computing and Why Should I Care?

In the "arms race" of security, new defensive tactics are always needed. One significant approach is Confidential Computing: a technology that can isolate data and execution in a secure space on a system, which takes the concept of security to new levels. This SNIA Cloud Storage Technologies Initiative (CSTI) webcast will provide an introduction and explanation of Confidential Computing and will feature a panel of industry architects responsible for defining Confidential Compute. It will be a lively conversation on topics including:

View Webcast

Continuous Delivery: Cloud Software Development on Speed

In the world of cloud services development, it's necessary to gain an edge on the myriad of competition facing your product or service. Volume and variety are not just characteristics of cloud data, but also of the software needed to deliver accurate decisions. While a variety of software techniques exist to create effective development teams, sometimes it's worthwhile to look elsewhere for additional success factors. In this webcast, we'll be focusing on adapting some of the principles of modern manufacturing to add to the development toolbox. A Continuous Delivery methodology ensures that the product is streamlined in its feature set while building constant value to the customer via the cloud. Watch to learn:

View Webcast

The Ethics of Artificial Intelligence

Artificial Intelligence technologies are possibly the most substantive and meaningful change to modern business.  The ability to process large amounts of data with varying degrees of structure and form enables large leaps in insight to drive revenue and profit.  Likewise, governments and civil society have significant opportunity for improvement of the lives of the populace.  However, with the power that AI brings comes the risks of any technology innovation.  This interactive session will cover some of the ethical issues that AI can bring.  Attendees should expect to learn:

View Webcast

Data Protection and Data Privacy in the COVID Era

The COVID-19 Pandemic has amplified cybersecurity concerns particularly related to the cloud. Threat actors have recognized a unique opportunity to exploit pandemic-related vulnerabilities through social engineering attacks, business email compromise, work from home or other remote weak points. This results in increased risk and occurrence of ransomware attacks and data breaches that can disrupt or totally compromise organizations’ ability to conduct business. These security incidents can also subject victims to liability for violations of privacy and data breach notification laws. Join this webcast as SNIA experts will discuss:

View webcast

Cloud Data Management & Interoperability: What a CDMI Standard Matters

The Cloud Data Management Interface (CDMI™) International Standard is intended for application developers who are implementing cloud storage systems, and who are developing applications to manage and consume cloud storage. It documents how to access cloud storage namespaces and how to manage the data stored in these namespaces. In this webcast we’ll provide an overview of the CDMI standard and cover CDMI 2.0:

View Webcast

How Video Analytics is Changing the Way We Store Video

There is a new wave of cognitive services based on video and image analytics, leveraging the latest in machine learning and deep learning. In this webcast, we will look at some of the benefits and factors driving this adoption, as well as explore compelling projects and required components for a successful video-based cognitive service. This includes some great work in the open source community to provide methods and frameworks, some standards that are being worked on to unify the ecosystem and allow interoperability with models and architectures. Finally, we’ll cover the data required to train such models, the data source and how it needs to be treated.

However, there are challenges in how we do this. Many archives were analog and tape based which doesn’t stand up well to mass ingestion or the back and forth of training algorithms. How can we start to define new architectures and leverage the right medium to make our archives accessible whilst still focusing on performance at the point of capture?

View Webcast

Storage Implications at the Velocity of 5G Streaming

The broad adoption of 5G, Internet of things (IoT) and edge computing will reshape the nature and role of enterprise and cloud storage over the next several years. What building blocks, capabilities and integration methods are needed to make this happen? You'll hear:

View Webcast

Using Data Literacy to Drive Insight

Having access to data does not automatically grant the knowledge of how to interpret that data or the ability to derive insight. It is even challenging to judge the accuracy or value in that data. The skill required is known as data literacy, and in this presentation we will look at how access to one data source will inevitably drive the need to access more. We will examine:

View Webcast

Does Your Storage Need a Cyber Insurance Tune Up?

Protection against cyber threats is recognized as a necessary component of an effective risk management approach, typically based on a well-known cybersecurity framework. A growing area to further mitigate risks and provide organizations with the high level of protection they need is cyber insurance. However, it’s not as simple as buying a pre-packaged policy.

This webcast provides overview of how cyber insurance fits in a risk management program. It will identify key terms and conditions that should be understood and carefully negotiated. Cyber insurance policies may not cover all types of losses, so it is critical to identify what risks and conditions are excluded from a cyber insurance policy before you buy.

View Webcast

IT Modernization with AIOps: The Journey

The almost overnight shift of resources toward remote work introduces the need for far more flexible, dynamic and seamless end-to-end applications, putting us on a path that requires autonomous capabilities using AIOps – Artificial Intelligence for IT Operations.

This webcast will provide an overview of concepts and strategies to accelerate the digitalization of critical enterprise IT resources, and help architects rethink what applications and underlying infrastructure are needed to support an agile, seamless end-to-end data centric environment.  This session will specifically address migration from monolithic to microservices, transition to Cloud Native services, and the platform requirements to help accelerate AIOps application delivery within our dynamic hybrid and multi-cloud world.  

View Webcast

A Multi-tenant Multi-cluster Kubernetes Datapocalypse is Coming

The need for rapid deployment of scalable clusters is creating an opportunity for container solutions such as Kubernetes. But what are the implications of multiple Kubernetes clusters in a broad deployment? What happens if a cluster goes down? What’s the impact on business resiliency? Managing and securing multiple clusters is becoming a key topic and area of debate. Multi-cluster Kubernetes that provides robustness & resilience is rapidly moving from “best practice” to a “must have”.

View Webcast

Storage Scalability in Hybrid Cloud and Multicloud Environments

As data growth in enterprises continues to sky rocket, datacenter cloud scalability whether on premises, in hybrid cloud or in multicloud deployments is key for businesses. So, what are enterprise IT organizations supposed to do, given that 'run anything anywhere' is becoming more important than ever? Customers are finding that hybrid cloud storage solutions better meet their IT and business growth needs, so they can rapidly scale their IT infrastructure and cover a wider array of services.

View Webcast

The Influence of IoT on Data Strategy

More and more we are seeing compute and inference move to the edge. This is driven by the growth in capability to not only generate data from sensors, devices and by people operating in the field, but also by the interaction between those devices. This new source of data and information brings with it unique challenges to the way we store and transmit data as well as the way we need to curate it. In this webcast we will look at:

View Webcast

The Impact of Artificial Intelligence on Storage and IT

Artificial intelligence (AI) and machine learning (ML) have been having quite the impact on most industries in the last couple of years, but what about our own IT industry? In this webcast find out how the rise of machine learning has created a new type of demand on IT operations teams as well as how those same teams can utilize new insights and capabilities driven by machine learning. We will explore:

View Webcast

Cloud Standards: What They Are, Why You Should Care

Since the initial publication of the National Institute of Standards and Technology (NIST) definition of cloud computing in NIST SP 800-145 in 2011, international standards development organizations (SDOs) have sought to refine and expand the cloud computing landscape. This webinar will identify key published and draft cloud standards, discuss their interdependencies, and highlight their importance as well as identify potential future work. In addition, related technologies such as virtualization, federation, and fog/edge computing will be addressed. Lastly, the relevance of the standards will be explored to help organizations understands ways these documents can be exploited.

View Webcast

Kubernetes in the Cloud - Part Three: Almost Everything You Need to Know about Stateful Workloads (August 2019)

Kubernetes is great for running stateless workloads, like web servers. It’ll run health checks, restart containers when they crash, and do all sorts of other wonderful things. So, what about stateful workloads?

This webcast will take a look at when it’s appropriate to run a stateful workload in cluster, or out. We’ll discuss the best options for running a workload like a database on the cloud, or in the cluster, and what’s needed to set that up. We cover:

View Webcast


View All On-Demand Cloud Storage Technologies Initiative Webcasts