Knowledge Center

Throughout the year, NSF Member companies share their expert knowledge by providing Educational webcasts through the SNIA BrightTalk channel. Check out some of our recent webcasts and see why viewers say:

Awesome presentation. Probably the most clearly comprehensible yet comprehensive webinar I've attended in some time. Great job you guys!

Speakers took special care to be vendor and technology neutral which I greatly appreciate.

Excellent balance of industry dynamics and details of the protocol

On Demand Webcasts

Optimizing NVMe over Fabrics Peformance with Different Ethernet Transports: Host Factors

NVMe over Fabrics technology is gaining momentum and getting more traction in data centers, but there are three kinds of Ethernet based NVMe over Fabrics transports: iWARP, RoCEv2 and TCP. How do we optimize NVMe over Fabrics performance with different Ethernet transports?
 
This discussion won’t tell you which transport is the best. Instead we unfold the performance of each transport and tell you what it would take for each transport to get the best performance, so that you can make the best choice for your transport for NVMe over Fabrics solutions.

View Webcast

Compression: Putting the Squeeze on Storage

Everyone knows data volumes are exploding faster than IT budgets. And customers are increasingly moving to flash storage, which is faster and easier to use than hard drives, but still more expensive. To cope with this conundrum and squeeze more efficiency from storage, storage vendors and customers can turn to data reduction techniques such as compression, deduplication, thin provisioning and snapshots. This webcast will specifically focus on data compression, which can be done at different times, at stages in the storage process, and using different techniques. We’ll discuss:

  • Where compression can be done: at the client, on the network, on the storage controller, or within the storage devices
  • What types of data should be compressed
  • When to compress: real-time compression vs. post-process compression
  • Different compression techniques
  • How compression affects performance

View Webcast

The Key to Value: Understanding the NVMe Key-Value Standard

The storage industry has many applications that rely on storing data as objects. In fact, it’s the most popular way that unstructured data is accessed.

At the drive level, however, the devil is in the details. Normally, storage devices store information as blocks, not objects. This means that there is some translation that goes on between the data as it is consumed (i.e., objects) and the data that is stored (i.e., blocks).

Naturally, being efficient means that there are performance boosts, and simplicity means that there are fewer things that can go wrong. Moving towards storing key value pairs that get away from the traditional block storage paradigm make it easier and simpler to access objects.This presentation discusses the benefits of Key Value storage, presents the major features of the NVMe-KV Command Set and how it interacts with the NVMe standards. It also covers the SNIA KV-API and open source work that is available to take advantage of Key Value storage.

View Webcast

Everything You Wanted to Know About Storage But Were Too Proud to Ask: Data Reduction

This webcast will specifically focus on the fundamentals of data reduction, which can be performed in different places and at different stages of the data lifecycle. Like most technologies, there are related means to do this, but with enough difference to cause confusion. For that reason, we’re going to be looking at:

  • How companies end up with so many copies of the same data
  • Difference between deduplication and compression – when should you use one vs. the other?
  • Where to reduce data: application-level, networked storage, backups, and during data movement
  • When to collapse the copies: real-time vs. post-process deduplication
  • Performance considerations

View Webcast

Storage Networking Security Series: Applied Cryptography

The rapid growth in infrastructure to support the real time and continuous collection and sharing of data to make better business decisions has led to an age of unprecedented information access and storage. This proliferation of data sources and of high-density data storage has put volumes of data at one’s fingertips. While the collection of large amounts of data has increased knowledge and efficiencies for businesses, it has also made attacks upon that information—theft, modification, or holding it for ransom--more tempting and easier. Cryptography is often used to protect valuable data.

This webcast presents an overview of applied cryptography techniques for the most popular use cases. We discuss ways of securing data, the factors and trade-offs that must be considered, as well as some of the general risks that need to be mitigated, including:

  • Encryption techniques for authenticating users 
  • Encrypting data—either at rest or in motion
  • Using hashes to authenticate/ Information coding and data transfer methodologies
  • Cryptography for Blockchain

View Webcast

Storage Networking Security Series: Security & Privacy Regulations

Worldwide, regulations are being promulgated and aggressively enforced with the intention of protecting personal data. These regulatory actions are being taken to help mitigate exploitation of this data by cybercriminals and other opportunistic groups who have turned this into a profitable enterprise. Failure to meet these data protection requirements puts individuals at risk (e.g., identity theft, fraud, etc.), as well as subjecting organizations to significant harm (e.g., legal penalties).

This webcast highlights common privacy principles and themes within key privacy regulations. In addition, the related cybersecurity implications are explored. Lastly, the session will probe a few of the recent regulations/laws to outline interesting challenges due to over and under-specification of data protection requirements (e.g., “reasonable” security), covering:

  • How privacy and security is characterized
  • Data retention and deletion requirements
  • Core data protection requirements of sample privacy regulations from around the globe
  • The role that security plays with key privacy regulations
  • Data breach implications and consequences

View Webcast

Notable Updates in NVMe-oF 1.1

In the past couple of years since its introduction, NVMe™ over Fabrics (NVMe-oF™) has not been resting on any laurels. Work has been ongoing, and there are several updates that are worth talking about.There is more to a technology than its core standard, of course, and many different groups have been hard at work at improving upon, and fleshing out, many of the capabilities that are related to NVMe-oF. This webcast explores a few of these projects and how they relate to implementing the technology. In particular, we’ll be looking at:

  • A summary of new items in NVMe-oF 1.1
  • Updates about what is happening in FC-NVMe-2
  • How SNIA’s provisioning model helps NVMe-oF Ethernet Bunch of Flash (EBOF) devices
  • Managing and provisioning NVMe-oF devices with SNIA Swordfish

View Webcast

Storage Networking Security Series: Key Management

There’s a lot that goes into effective key management. In order to properly use cryptography to protect information, one has to ensure that the associated cryptographic keys themselves are also protected. Careful attention must be paid to how cryptographic keys are generated, distributed, used, stored, replaced and destroyed in order to ensure that the security of cryptographic implementations is not compromised. This webcast introduces the fundamentals of cryptographic key management including key lifecycles, key generation, key distribution, symmetric vs. asymmetric key management, and integrated vs. centralized key management models. 

View Webcast

Storage Networking Security Series: Protecting Data-at-Rest

There’s a lot to understand about how to keep your data secure. As this series shows, there are many places along the chain where a weak link can break the entire process. One of the key aspects of keeping data secure – and probably the place where most people think of security – is what happens when the data is “at rest,” or being stored in some sort of stable drive or disk. Watch as we break down the aspects of securing data at rest as part of the overall goal of understanding storage security. In particular, we’ll be looking at:

View Webcast

Storage Networking Security Series: Encryption 101

Encryption has been used through the ages to protect stored secrets, authenticate messages, communicate secretly in broad daylight, and even to check that messages were properly transmitted and received without tamper.  Now, it’s often our first go-to tool for making sure that data simply isn’t readable to prying eyes, ears or AI bots. But how does encryption actually work, what makes it tick, and how is it managed?  How do we ensure compatibility? How do we protect the keys; i.e., “Who will guard the guards themselves?”

View Webcast

QUIC - Will it Replace TCP/IP?

QUIC is a new UDP-based transport protocol for the Internet, and specifically, the web. Originally designed and deployed by Google, it already makes up 35% of Google's egress traffic, which corresponds to about 7% of all Internet traffic. The strong interest by many other large Internet players in the ongoing IETF standardization of QUIC is likely to lead to an even greater deployment in the near future. This talk will highlight:

  • Unique design aspects of QUIC
  • Differences to the conventional HTTP/TLS/TCP web stack
  • Early performance numbers
  • Potential side effects of a broader deployment of QUIC

View Webcast

Ethernet-attached SSDs: Brilliant Idea or Storage Silliness?

Several SSD and networking vendors have recently demonstrated ways to connect SSDs directly to an Ethernet network. They propose that deploying Ethernet SSDs will be more scalable, easier to manage, more performant, and/or lower cost than traditional storage networking solutions that use a storage controller (or hyperconverged node) between the SSDs and the network.

Who would want to attach SSDs directly to the network? Are these vendors brilliant or simply trying to solve a problem that doesn’t exist? What are the different solutions that could benefit from Ethernet SSDs? Which protocols would one use to access them? And how do Ethernet SSDs relate to computational storage? 

View Webcast

Object Storage: What, How and Why

There are many types of storage technologies, both in how they are interconnected, consumed and designed. Object storage is no different in that it brings its own set of unique characteristics to the market. In this webcast, you'll learn:

  • What object storage is and what it does
  • How to use object storage
  • Essential characteristics of typical consumption
  • Why object storage is important to the future of storage and computing technologies

View Webcast

Where does SPDK fit in the NVMe-oF Landscape?

The Storage Performance Development Kit (SPDK) has gained industry-wide recognition as a framework for building highly performant and efficient storage software with a focus on NVMe. This includes software drivers and libraries for building NVMe-oF host and target solutions. In this presentation, technical leaders from SPDK will provide an overview of the project, NVMe-oF use cases that are best suited for SPDK, and insights into how SPDK achieves its storage networking performance and efficiency.

View Webcast


View All On-Demand Networking Storage Forum Webcasts