Sorry, you need to enable JavaScript to visit this website.

Taming the Multi-Protocol Jungle: Unifying File and Object Access in Modern Data Workflows

Submitted by Anonymous (not verified) on

Over the past 30+ years, I/O workflows have evolved and changed dramatically.  Data access via file protocols has morphed to Data access via object protocols. Permission granularity control requirements have grown from modebits to Access Control Lists to Identity Policies.  The sheer size of the datasets both in capacity and number of items has grown exponentially. Modern workflows, including those related to AI and Machine learning, involve access to data across multiple protocols with vastly different methods of permissioning and control.

Zoned XFS: Transparent and Efficient Zoned Storage Support For Scalable Storage Systems

Submitted by Anonymous (not verified) on
Zoned storage enables higher storage densities with Shingled Magnetic Recording (SMR) hard disks and reduces costs and improves tail latency with Zoned Namespace (ZNS) SSDs. Zoned XFS adds zoned storage support to the existing scalable XFS file system for Linux to seamlessly enable the benefits of zoned storage for unmodified applications such as key-value stores or distributed storage systems with performance beating that of existing zone-aware file systems on Linux. We present an overview of Zoned XFS design and performance evaluation results which show that Zoned XFS achieves better thr

Report from September ‘25 Cloud Object Storage Plugfest (community driven S3 compatibility testing)

Submitted by Anonymous (not verified) on
SNIA's Cloud Object Storage community organized and hosted the industry first open multi-vendor compatibility testing (Plugfest) at SDC’24, in Santa Clara, CA. Most of the participants focused on their S3 server and client implementations.  Community driven testing revealed significant areas to collaborate, including ambiguities among protocol options, access control mechanisms, missing or incorrect response headers, unsupported API calls and unexpected behavior (as well as sharing best practices and fixes).

Scaling Secure File Access - what's New in Linux SMB3.1.1: Performance, Security, and Beyond

Submitted by Anonymous (not verified) on

Accessing servers from Linux over SMB3.1.1 continues to improve in exciting ways. This talk will explore the latest enhancements to the Linux SMB3.1.1 client, enabling more secure, efficient, and compatible access to remote storage across a wide range of SMB3 file servers—including Samba, Azure (the "largest server in the world"), ksmbd, Windows, NetApp, and macOS. There are also exciting improvements to smbdirect (SMB over RDMA), including making this high-performance path easier to use for both the client and server, as well as userspace applications like Samba. 

SNIA Cloud Object Storage Test Tools - Foundation for Heterogeneous Multi-Vendor Interoperability

Submitted by Anonymous (not verified) on
SNIA has created a collaborative Cloud Object Storage (COS) industry community to drive multi-vendor heterogeneous interoperability test events (Plugfests), and participants identified an obvious pain point in the industry - the need to develop automated COS interoperability test tools.  SNIA COS community efforts help empower developers to share best practice around latest challenges, gain consensus on resolution and find bugs before customers find them.

Drive Regeneration in Action: Enhancing Fault Tolerance in Datacenters

Submitted by Anonymous (not verified) on
Datacenter reliability and storage availability are critical to ensuring uninterrupted access to data in today’s fast-paced digital landscape. Today, HDD defects (such as media defects) are managed as part of fault tolerance. Storage Element Depopulation, also known as Drive Regeneration, is an innovative HDD technology that expands fault tolerance by allowing drives with larger defects (such as a degraded recording head) to remain operational rather than being decommissioned.

New Developments in Data Security Algorithms

Submitted by Anonymous (not verified) on
Storage developers need to understand that the algorithms and protocols used for data protection are in the midst of significant changes. This is driven by increases in the size of storage devices, the complexity of large data storage systems, discoveries of weaknesses, and improvements in attacks on encryption. Storage devices are seeing changes in block encryption algorithms and in implementations of those algorithms. Post-quantum cryptographic (PQC) algorithms will improve resistance to attacks using quantum computers, and a new timeline is in effect for adoption of those algorithms.

SPDM PQC & Authorization

Submitted by Anonymous (not verified) on

DMTF’s Security Protocol and Data Model (SPDM) protocol is a widely used set of standards that enable secure communication and device authentication for platform-level security. This session will give an update on major developments by the SPDM Working Group, and where the group is going over the next year. In the past year, DMTF has released SPDM version 1.4, the first version to support CNSA 2.0 algorithms for post-quantum cryptography.

Host Addressing of NVMe Subsystem Local Memory

Submitted by Anonymous (not verified) on
While a host has been able to address NVMe device memory using Controller Memory Buffer (CMB) and Persistent Memory Region (PMR), that memory has never been addressable by NVMe commands. NVMe introduced the Subsystem Local Memory IO Command Set (SLM), which allowed NVMe device memory to be addressable by NVMe commands; however, this memory could not be addressed by the host using host memory addresses. A new technical proposal is being developed by NVM Express that would allow SLM to be assigned to a host memory address range.
Subscribe to