Webcasts On Demand

xPU Deployment and Solutions Deep Dive
Wednesday, August 24, 2022
10:00 am PT / 1:00 pm ET

Our 1st and 2nd webcasts in this xPU series explained what xPUs are, how they work, and what they can do. In this 3rd webcast, we will dive deeper into next steps for xPU deployment and solutions, discussing:

When to deploy

  • Pros and cons of dedicated accelerator chips versus running everything on the CPU
  • xPU use cases across hybrid, multi-cloud and edge environments
  • Cost and power considerations

Where to deploy

  • Deployment operating models: Edge, Core Data Center, CoLo, Public Cloud
  • System location: In the server, with the storage, on the network, or in all those locations?

How to deploy

  • Mapping workloads to hyperconverged and disaggregated infrastructure
  • Integrating xPUs into workload flows
  • Applying offload and acceleration elements within an optimized solution

Download PDF

Kubernetes is Everywhere – What About Cloud Native Storage?
Tuesday, July 19, 2022
10:00 am PT / 1:00 pm ET

Organizations are adopting containers at an increasingly rapid rate. In fact, there are few organizations that haven’t implemented containers in their environment today.
 
Storage implications for Kubernetes will be the topic of this live webcast where storage experts from SNIA and Kubernetes experts from the Cloud Native Computing Foundation (CNCF) will discuss:

  • Key storage attributes of cloud native storage for Kubernetes
  • How do we use cloud native storage in Kubernetes environments?
  • Workloads and real-world use cases

 This webcast will help you better understand and address storage and persistent data challenges in a Kubernetes environment.

Download PDF

Read Q&A Blog

Storage Life on the Edge: Accelerated Performance Strategies
Tuesday, July 12, 2022
10:00 am PT / 1:00 pm ET

Edge is the new frontier of compute and data in today’s world, driven by the explosive growth of mobile devices, work from home, digital video, smart cities, and connected cars. An increasing percentage of data is generated and processed at the edge of the network. With this trend comes the need for faster computing, access to storage, and movement of data at the edge as well as between the edge and the data center. 

  • The increasing need to do more at the edge across compute, storage and networking
  • The rise of intelligent edge locations
  • Different solutions that provide faster processing or data movement at the edge
  • How computational storage can speed up data processing and transmission at the edge
  • Security considerations for edge processing

We look forward to having you join us to cover all this and more. We promise to keep you on the edge of your virtual seat!

Download PDF

xPU Accelerator Offload Functions
Wednesday, June 29, 2022
11:00 am PT / 2:00 pm ET

As covered in our first webcast “SmartNICs and xPUs: Why is the Use of Accelerators Accelerating,” we discussed the trend to deploy dedicated accelerator chips to assist or offload the main CPU. These new accelerators (xPUs) have multiple names such as SmartNIC, DPU, IPU, APU, NAPU.   

This second webcast in this series will cover a deeper dive into the accelerator offload functions of the xPU. We’ll discuss what problems the xPUs are coming to solve, where in the system they live, and the functions they implement, focusing on:

  •  Network Offloads 
  •  Security Offloads
  • Compute Offloads 
  • Storage Offloads

Download PDF

Read Q&A Blog

Is the Data Really Gone? A Primer on the Sanitization of Storage Devices
Wednesday, June 29, 2022
9:00 am PT / 12:00 noon ET

What do you think is a more secure way of securely removing data from a hard drive - putting it through a shredder, or doing an instant secure erase? The answer might surprise you! Companies go to great lengths to secure their data and prevent confidential information from being made available to others. When a company is done using its ICT equipment, including the storage device, it is important to render the data inaccessible. Sanitization is a process or method to render access to target data on storage media infeasible for a given level of effort. SSDs and HDDs have various security features that make this sanitization quick, secure, and verifiable.

In this webcast, we will go over the different types of sanitization defined in the new IEEE P2883 Specification for Sanitization of Storage and cover easy ways to perform “Clear”, “Purge,” and “Destruct in mainstream storage interfaces like SATA, SAS, and NVMe. We discuss recommendations for the verification of sanitization to ensure that devices are meeting stringent requirements and explain how the purge technique for media sanitization can be quick, secure, reliable, and verifiable - and most importantly keeps the device in one piece.

Download PDF

SmartNICs to xPUs – Why is the Use of Accelerators Accelerating?
Thursday, May 19, 2022
11:00 am PT / 2:00 pm ET

As applications continue to increase in complexity and users demand more from their workloads, there is a trend to again deploy dedicated accelerator chips to assist or offload the main CPU. These new accelerators (xPUs) have multiple names such as SmartNIC, DPU, IPU, APU, NAPU. How are these different than GPU, TPU, CPU? xPUs accelerate and offload functions including math, networking, storage, cryptography, security, and management. This webcast will cover key topics about, and clarify questions surrounding, xPUs.

Download PDF

Read Q&A Blog

Storage Life on the Edge: Security Challenges
Wednesday, April 27, 2022
10:00 am PT / 1:00 pm ET

The complex and changeable structure of edge computing, together with its network connections, massive real-time data, challenging operating environment, distributed edge cloud collaboration, and other characteristics, create a multitude of security challenges. This panel of experts will explore these challenges and wade into the debate as to whether existing security practices and standards are adequate for this emerging area of computing. Join us for a discussion that will cover:

  • Understanding the key security issues associated with edge computing
  • Identify potentially relevant standards and industry guidance (e.g., IoT security)
  • Offer awareness of new security initiatives focused on edge computing

Download PDF

Data Protection considerations for Cloud-native containerised applications
Wednesday, April 13, 2022
17.00 IST

This presentation will define the data protection landscape particularly in the context of modern cloud-native containerized applications. It describes various constructs and capabilities of these applications thereby articulating data protection challenges. We will also cover different Backup and Recovery solution considerations for scale, performance, optimizations and protection from any ransomware attack. 

15 Minutes in the Cloud: Data Privacy vs. Governance vs. Security
Wednesday, March 30, 2022
10:00 am PT / 1:00 pm ET

Data privacy, data governance and data security are all terms that are mistakenly used interchangeably. They are indeed related, particularly when it comes to keeping data in the cloud protected, private and secure, but the definitions and mechanics of executing on each are all quite different.

Join us for another “15 Minutes in the Cloud” session for an overview of what each of these terms means, how and where they intersect, and why it’s a balancing act to pay adequate attention to each one or risk threatening the overall security of your data.

Presenting will be security experts Thomas Rivera, CISSP, CIPP/US, CDPSE and Strategic Success Manager at VMware Carbon Black together with Eric Hibbard, CISSP-ISSAP, ISSMP, ISSEP, CIPP/US, CIPT, CISA, CDPSE, CCSK and Director, Product Planning – Storage Networking & Security, Samsung Semiconductor.

Download PDF

Storage Life on the Edge: Edge Storage Use Cases
Tuesday, March 22, 2022
10:00 am PT / 1:00 pm ET

This second webcast in the Storage Life on the Edge series, provides an overview of edge to cloud use cases where storage and compute resources need to be deployed in practical topologies that deliver the very best in application performance. From data analytics and AI inference to emerging IoT edge applications, our panelists will provide a cornucopia of use cases across these categories along with specific, real-world examples.

Download PDF

Read Q&A Blog

Pages