Knowledge Center

Throughout the year, NSF Member companies share their expert knowledge by providing Educational webcasts through the SNIA BrightTalk channel. Check out some of our recent webcasts and see why viewers say:

Awesome presentation. Probably the most clearly comprehensible yet comprehensive webinar I've attended in some time. Great job you guys!

Speakers took special care to be vendor and technology neutral which I greatly appreciate.

Excellent balance of industry dynamics and details of the protocol

On Demand Webcasts

SAN Overview - How Fibre Channel Hosts and Targets Really Communicate 

Each SAN transport has its own way to initialize and transfer data. So how do initiators (hosts) and targets (storage arrays) communicate in Fibre Channel (FC) Storage Area Networks (SANs)? Find out in this webcast where Fibre Channel experts will answer:

  • How do FC links activate?
  • Is FC routable? 
  • What kind of flow control is present in FC?
  • How do initiators find targets and set up their communication?
  • Finally, how does actual data get transferred since that is the ultimate goal?

This session will introduce these concepts to demystify the FC SAN for the network professional.

View Webcast

Storage Technologies & Practices Ripe for Refresh: Part 2

In our second installment of our Storage Technologies & Practices Ripe for Refresh, we will cover older HDD device interfaces and file systems. Advice will be given on how to replace these in production environments as well as why these changes are recommended. Also, we will be covering protocols that you should consider removing from your networks, either older versions of protocols where only newer versions should be used, or protocols that have been supplanted by superior options and should be discontinued entirely.

Finally, we will look at physical networking interfaces and cabling that are popular today but face an uncertain future as networking speeds grow ever faster. 

View Webcast

Security of Data on NVMe-oF, The Armored Truck Way

With ever increasing threat vectors both inside and outside the data center, a compromised customer dataset can quickly result in a torrent of lost business data, eroded trust, significant penalties, and potential lawsuits. Vulnerabilities exist at every point when scaling out NVMe, which require data to be secured every time it leaves a server or the storage media, not only when leaving the data center. NVMe over Fabrics is poised to be the one of the most dominant transports of the future and securing and validating the vast amounts of data that would traverse this fabric is not just prudent, but paramount.

Join the webcast to hear industry experts discuss current and future strategies to secure and protect your mission critical data. You will learn:

  • Industry trends and regulations around data security
  • Potential threats and vulnerabilities
  • Existing security mechanisms and best practices
  • How to secure NVMe in flight and at rest
  • Ecosystem and market dynamics
  • Upcoming standards

View Webcast

Great Storage Debate: Hyperconverged vs. Disaggregated vs. Centralized

In the ongoing evolution of the datacenter, a popular debate involves how storage is allocated and managed. There are three competing visions about how storage should be done; those are Hyperconverged Infrastructure (HCI), Disaggregated Storage, and Centralized Storage.

IT architects, storage vendors, and industry analysts argue constantly over which is the best approach and even the exact definition of each. Isn’t Hyperconverged constrained? Is Disaggregated designed only for large cloud service providers? Is Centralized storage only for legacy applications?

View Webcast

NVMe-oF: Looking Beyond Performance Hero Numbers

When it comes to performance of NVMe over Fabrics (NVMe-oF) one should look beyond test results that demonstrate NVMe-oF’s dramatic reduction in latency. There are other, more important, questions that should be asked in order to understand the fabric’s real-world benefits. This webcast will attempt to answer questions beyond “it depends.”

Gain insights from an industry wide panel of NVMe and fabric technology experts as they discuss the thought process you can use to determine pros and cons of a fabric for your environment, including:

  • Use cases driving fabric choices
  • NVMe transports and their strengths
  • Industry dynamics driving adoption
  • Considerations for scale, security, and efficiency

View Webcast

Storage Technologies & Practices Ripe for Refresh

So much of what we discuss within SNIA is the latest emerging technologies in storage. While it’s good to know about what technology is coming, it’s also important to understand the technologies that should be sunsetted.

In this webcast, you’ll learn about storage technologies and practices in your data center that are ready for refresh or possibly retirement. Find out why some long-standing technologies and practices should be re-evaluated. We’ll discuss:

  • Obsolete hardware, protocols, interfaces and other aspects of storage
  • Why certain technologies are no longer in general use
  • Technologies on their way out and why
  • Drivers for change
  • Justifications for obsoleting proven technologies
  • Trade-offs risks: new faster/better vs. proven/working tech

View Webcast

Not Again! Data Deduplication for Storage Systems

Organizations inevitably store multiple copies of the same data. Users and applications store the same files over and over, intentionally or inadvertently. Developers, testers and analysts keep many similar copies of the same data. And backup programs copy the same or similar files daily, often to multiple locations or storage devices. It’s not unusual to end up with some data replicated thousands of times. So how do we stop the duplication madness? Watch this webcast where we discuss how to reduce the number of copies of data that get stored, mirrored, and backed up.

View Webcast

Optimizing NVMe over Fabrics Peformance with Different Ethernet Transports: Host Factors

NVMe over Fabrics technology is gaining momentum and getting more traction in data centers, but there are three kinds of Ethernet based NVMe over Fabrics transports: iWARP, RoCEv2 and TCP. How do we optimize NVMe over Fabrics performance with different Ethernet transports?
This discussion won’t tell you which transport is the best. Instead we unfold the performance of each transport and tell you what it would take for each transport to get the best performance, so that you can make the best choice for your transport for NVMe over Fabrics solutions.

View Webcast

Compression: Putting the Squeeze on Storage

Everyone knows data volumes are exploding faster than IT budgets. And customers are increasingly moving to flash storage, which is faster and easier to use than hard drives, but still more expensive. To cope with this conundrum and squeeze more efficiency from storage, storage vendors and customers can turn to data reduction techniques such as compression, deduplication, thin provisioning and snapshots. This webcast will specifically focus on data compression, which can be done at different times, at stages in the storage process, and using different techniques. We’ll discuss:

  • Where compression can be done: at the client, on the network, on the storage controller, or within the storage devices
  • What types of data should be compressed
  • When to compress: real-time compression vs. post-process compression
  • Different compression techniques
  • How compression affects performance

View Webcast

The Key to Value: Understanding the NVMe Key-Value Standard

The storage industry has many applications that rely on storing data as objects. In fact, it’s the most popular way that unstructured data is accessed.

At the drive level, however, the devil is in the details. Normally, storage devices store information as blocks, not objects. This means that there is some translation that goes on between the data as it is consumed (i.e., objects) and the data that is stored (i.e., blocks).

Naturally, being efficient means that there are performance boosts, and simplicity means that there are fewer things that can go wrong. Moving towards storing key value pairs that get away from the traditional block storage paradigm make it easier and simpler to access objects.This presentation discusses the benefits of Key Value storage, presents the major features of the NVMe-KV Command Set and how it interacts with the NVMe standards. It also covers the SNIA KV-API and open source work that is available to take advantage of Key Value storage.

View Webcast

Everything You Wanted to Know About Storage But Were Too Proud to Ask: Data Reduction

This webcast will specifically focus on the fundamentals of data reduction, which can be performed in different places and at different stages of the data lifecycle. Like most technologies, there are related means to do this, but with enough difference to cause confusion. For that reason, we’re going to be looking at:

  • How companies end up with so many copies of the same data
  • Difference between deduplication and compression – when should you use one vs. the other?
  • Where to reduce data: application-level, networked storage, backups, and during data movement
  • When to collapse the copies: real-time vs. post-process deduplication
  • Performance considerations

View Webcast

Storage Networking Security Series: Applied Cryptography

The rapid growth in infrastructure to support the real time and continuous collection and sharing of data to make better business decisions has led to an age of unprecedented information access and storage. This proliferation of data sources and of high-density data storage has put volumes of data at one’s fingertips. While the collection of large amounts of data has increased knowledge and efficiencies for businesses, it has also made attacks upon that information—theft, modification, or holding it for ransom--more tempting and easier. Cryptography is often used to protect valuable data.

This webcast presents an overview of applied cryptography techniques for the most popular use cases. We discuss ways of securing data, the factors and trade-offs that must be considered, as well as some of the general risks that need to be mitigated, including:

  • Encryption techniques for authenticating users 
  • Encrypting data—either at rest or in motion
  • Using hashes to authenticate/ Information coding and data transfer methodologies
  • Cryptography for Blockchain

View Webcast

Storage Networking Security Series: Security & Privacy Regulations

Worldwide, regulations are being promulgated and aggressively enforced with the intention of protecting personal data. These regulatory actions are being taken to help mitigate exploitation of this data by cybercriminals and other opportunistic groups who have turned this into a profitable enterprise. Failure to meet these data protection requirements puts individuals at risk (e.g., identity theft, fraud, etc.), as well as subjecting organizations to significant harm (e.g., legal penalties).

This webcast highlights common privacy principles and themes within key privacy regulations. In addition, the related cybersecurity implications are explored. Lastly, the session will probe a few of the recent regulations/laws to outline interesting challenges due to over and under-specification of data protection requirements (e.g., “reasonable” security), covering:

  • How privacy and security is characterized
  • Data retention and deletion requirements
  • Core data protection requirements of sample privacy regulations from around the globe
  • The role that security plays with key privacy regulations
  • Data breach implications and consequences

View Webcast

Notable Updates in NVMe-oF 1.1

In the past couple of years since its introduction, NVMe™ over Fabrics (NVMe-oF™) has not been resting on any laurels. Work has been ongoing, and there are several updates that are worth talking about.There is more to a technology than its core standard, of course, and many different groups have been hard at work at improving upon, and fleshing out, many of the capabilities that are related to NVMe-oF. This webcast explores a few of these projects and how they relate to implementing the technology. In particular, we’ll be looking at:

  • A summary of new items in NVMe-oF 1.1
  • Updates about what is happening in FC-NVMe-2
  • How SNIA’s provisioning model helps NVMe-oF Ethernet Bunch of Flash (EBOF) devices
  • Managing and provisioning NVMe-oF devices with SNIA Swordfish

View Webcast

Storage Networking Security Series: Key Management

There’s a lot that goes into effective key management. In order to properly use cryptography to protect information, one has to ensure that the associated cryptographic keys themselves are also protected. Careful attention must be paid to how cryptographic keys are generated, distributed, used, stored, replaced and destroyed in order to ensure that the security of cryptographic implementations is not compromised. This webcast introduces the fundamentals of cryptographic key management including key lifecycles, key generation, key distribution, symmetric vs. asymmetric key management, and integrated vs. centralized key management models. 

View Webcast

Storage Networking Security Series: Protecting Data-at-Rest

There’s a lot to understand about how to keep your data secure. As this series shows, there are many places along the chain where a weak link can break the entire process. One of the key aspects of keeping data secure – and probably the place where most people think of security – is what happens when the data is “at rest,” or being stored in some sort of stable drive or disk. Watch as we break down the aspects of securing data at rest as part of the overall goal of understanding storage security. In particular, we’ll be looking at:

View Webcast

Storage Networking Security Series: Encryption 101

Encryption has been used through the ages to protect stored secrets, authenticate messages, communicate secretly in broad daylight, and even to check that messages were properly transmitted and received without tamper.  Now, it’s often our first go-to tool for making sure that data simply isn’t readable to prying eyes, ears or AI bots. But how does encryption actually work, what makes it tick, and how is it managed?  How do we ensure compatibility? How do we protect the keys; i.e., “Who will guard the guards themselves?”

View Webcast

QUIC - Will it Replace TCP/IP?

QUIC is a new UDP-based transport protocol for the Internet, and specifically, the web. Originally designed and deployed by Google, it already makes up 35% of Google's egress traffic, which corresponds to about 7% of all Internet traffic. The strong interest by many other large Internet players in the ongoing IETF standardization of QUIC is likely to lead to an even greater deployment in the near future. This talk will highlight:

  • Unique design aspects of QUIC
  • Differences to the conventional HTTP/TLS/TCP web stack
  • Early performance numbers
  • Potential side effects of a broader deployment of QUIC

View Webcast

Ethernet-attached SSDs: Brilliant Idea or Storage Silliness?

Several SSD and networking vendors have recently demonstrated ways to connect SSDs directly to an Ethernet network. They propose that deploying Ethernet SSDs will be more scalable, easier to manage, more performant, and/or lower cost than traditional storage networking solutions that use a storage controller (or hyperconverged node) between the SSDs and the network.

Who would want to attach SSDs directly to the network? Are these vendors brilliant or simply trying to solve a problem that doesn’t exist? What are the different solutions that could benefit from Ethernet SSDs? Which protocols would one use to access them? And how do Ethernet SSDs relate to computational storage? 

View Webcast

Object Storage: What, How and Why

There are many types of storage technologies, both in how they are interconnected, consumed and designed. Object storage is no different in that it brings its own set of unique characteristics to the market. In this webcast, you'll learn:

  • What object storage is and what it does
  • How to use object storage
  • Essential characteristics of typical consumption
  • Why object storage is important to the future of storage and computing technologies

View Webcast

Where does SPDK fit in the NVMe-oF Landscape?

The Storage Performance Development Kit (SPDK) has gained industry-wide recognition as a framework for building highly performant and efficient storage software with a focus on NVMe. This includes software drivers and libraries for building NVMe-oF host and target solutions. In this presentation, technical leaders from SPDK will provide an overview of the project, NVMe-oF use cases that are best suited for SPDK, and insights into how SPDK achieves its storage networking performance and efficiency.

View Webcast

View All On-Demand Networking Storage Forum Webcasts