Knowledge Center

Throughout the year, NSF Member companies share their expert knowledge by providing Educational webcasts through the SNIA BrightTalk channel. Check out some of our recent webcasts and see why viewers say:

Awesome presentation. Probably the most clearly comprehensible yet comprehensive webinar I've attended in some time. Great job you guys!

Speakers took special care to be vendor and technology neutral which I greatly appreciate.

Excellent balance of industry dynamics and details of the protocol

On Demand Webcasts

Notable Updates in NVMe-oF 1.1

In the past couple of years since its introduction, NVMe™ over Fabrics (NVMe-oF™) has not been resting on any laurels. Work has been ongoing, and there are several updates that are worth talking about.There is more to a technology than its core standard, of course, and many different groups have been hard at work at improving upon, and fleshing out, many of the capabilities that are related to NVMe-oF. This webcast explores a few of these projects and how they relate to implementing the technology. In particular, we’ll be looking at:

  • A summary of new items in NVMe-oF 1.1
  • Updates about what is happening in FC-NVMe-2
  • How SNIA’s provisioning model helps NVMe-oF Ethernet Bunch of Flash (EBOF) devices
  • Managing and provisioning NVMe-oF devices with SNIA Swordfish

View Webcast

Storage Networking Security Series: Key Management

There’s a lot that goes into effective key management. In order to properly use cryptography to protect information, one has to ensure that the associated cryptographic keys themselves are also protected. Careful attention must be paid to how cryptographic keys are generated, distributed, used, stored, replaced and destroyed in order to ensure that the security of cryptographic implementations is not compromised. This webcast introduces the fundamentals of cryptographic key management including key lifecycles, key generation, key distribution, symmetric vs. asymmetric key management, and integrated vs. centralized key management models. 

View Webcast

Storage Networking Security Series: Protecting Data-at-Rest

There’s a lot to understand about how to keep your data secure. As this series shows, there are many places along the chain where a weak link can break the entire process. One of the key aspects of keeping data secure – and probably the place where most people think of security – is what happens when the data is “at rest,” or being stored in some sort of stable drive or disk. Watch as we break down the aspects of securing data at rest as part of the overall goal of understanding storage security. In particular, we’ll be looking at:

View Webcast

Storage Networking Security Series: Encryption 101

Encryption has been used through the ages to protect stored secrets, authenticate messages, communicate secretly in broad daylight, and even to check that messages were properly transmitted and received without tamper.  Now, it’s often our first go-to tool for making sure that data simply isn’t readable to prying eyes, ears or AI bots. But how does encryption actually work, what makes it tick, and how is it managed?  How do we ensure compatibility? How do we protect the keys; i.e., “Who will guard the guards themselves?”

View Webcast

QUIC - Will it Replace TCP/IP?

QUIC is a new UDP-based transport protocol for the Internet, and specifically, the web. Originally designed and deployed by Google, it already makes up 35% of Google's egress traffic, which corresponds to about 7% of all Internet traffic. The strong interest by many other large Internet players in the ongoing IETF standardization of QUIC is likely to lead to an even greater deployment in the near future. This talk will highlight:

  • Unique design aspects of QUIC
  • Differences to the conventional HTTP/TLS/TCP web stack
  • Early performance numbers
  • Potential side effects of a broader deployment of QUIC

View Webcast

Ethernet-attached SSDs: Brilliant Idea or Storage Silliness?

Several SSD and networking vendors have recently demonstrated ways to connect SSDs directly to an Ethernet network. They propose that deploying Ethernet SSDs will be more scalable, easier to manage, more performant, and/or lower cost than traditional storage networking solutions that use a storage controller (or hyperconverged node) between the SSDs and the network.

Who would want to attach SSDs directly to the network? Are these vendors brilliant or simply trying to solve a problem that doesn’t exist? What are the different solutions that could benefit from Ethernet SSDs? Which protocols would one use to access them? And how do Ethernet SSDs relate to computational storage? 

View Webcast

Object Storage: What, How and Why

There are many types of storage technologies, both in how they are interconnected, consumed and designed. Object storage is no different in that it brings its own set of unique characteristics to the market. In this webcast, you'll learn:

  • What object storage is and what it does
  • How to use object storage
  • Essential characteristics of typical consumption
  • Why object storage is important to the future of storage and computing technologies

View Webcast

Where does SPDK fit in the NVMe-oF Landscape?

The Storage Performance Development Kit (SPDK) has gained industry-wide recognition as a framework for building highly performant and efficient storage software with a focus on NVMe. This includes software drivers and libraries for building NVMe-oF host and target solutions. In this presentation, technical leaders from SPDK will provide an overview of the project, NVMe-oF use cases that are best suited for SPDK, and insights into how SPDK achieves its storage networking performance and efficiency.

View Webcast

View All On-Demand Networking Storage Forum Webcasts