Sorry, you need to enable JavaScript to visit this website.

An Introduction to the IEEE Security in Storage Working Group

Submitted by Anonymous (not verified) on

The IEEE Security In Storage Work Group (SISWG) produces standards that many storage developers, storage vendors, and storage system operators care about, including: a) A family of standards on sanitization: the IEEE 2883 family b) A family of standards on encryption methods for storage components: the IEEE 1619 family c) A standard on Discovery, Authentication, and Authentication in Host Attachments of Storage Devices: the IEEE 1667 specification IEEE has a different work group (IEEE P3172) focusing on post-quantum cryptography, but when they are done, a family method that recommends new q

What is the NVM Express® Flexible Data Placement (FDP)?

Submitted by Anonymous (not verified) on

This presentation by provides an overview of the NVM Express® ratified technical proposal TP4146 Flexible Data Placement and shows how a host can manage its user data to capitalize on a lower Write Amplification Factor (WAF) by an SSD to extend the life of the device, improve performance, and lower latency.

Riding the Long Tail of Optane’s Comet - Emerging Memories, CXL, UCIe, and More

Submitted by Anonymous (not verified) on

It’s been a year since the announcement that Intel would “Wind Down” its Optane 3D XPoint memories. Has anything risen to take its place? Should it? This presentation reviews the alternatives to Optane that are now available or are in development, and evaluates the likelihood that one or more of these could fill the void that is being left behind. We will also briefly review the legacy Optane left behind to see how that legacy is likely to be used to support persistent memories in more diverse applications, including cache memory chiplets.

An AI Inference Engine for Object Storage Systems

Submitted by Anonymous (not verified) on

Object storage systems provide significant value for storing and managing data. The nature of data stored in object systems opens up opportunities to get more value out of these systems than the common expectations of cost reduction, ease of use, resilience, and durability. Maintaining the metadata for large unstructured data sets is difficult and can be time consuming. The system I propose here is an add on engine that adds Artificial Intelligence inferencing functionality to object storage systems.

In-SRAM Compute For Generative AI and Large Language Models

Submitted by Anonymous (not verified) on

The recent uptick in generative artificial intelligence (GAI) has put the more pressure on hardware vendors to reduce the carbon footprint of running these power hungry large language models (LLM) in the datacenter. One way to accomplish a lower in-silicon power profile is to break the Von-Neumann bottleneck by tightly integrating traditional SRAM memory cells with interleaved programable processors in the same die.

Data Immutability – Retention Locking/WORM

Submitted by Anonymous (not verified) on

Data immutability and retention locking have gained enormous traction over the last many years owing to a severe surge in number of cyber and ransomware attacks. This presentation covers many aspects of data immutability and retention locking/WORM in the backup ecosystem. It talks about regulatory requirements for long term data retention, variants of retention locking, dual authorization model and role of security officer, various attributes of retention locking, integration of backup applications with retention locking, retention locking in replication and cloud storage.

Host Workloads Achieving WAF==1 in an FDP SSD

Submitted by Anonymous (not verified) on

Flexible Data Placement (FDP) is a new NVM Express® (NVMe) feature that advertises the ability to achieve Write Amplification Factor (WAF) of 1. This presentation will describe what a WAF of 1 means for an SSD. Several example workloads achieving a WAF of 1 will be discussed. Additionally, some Hosts have an increased ability to restrict either the deallocate behavior or the write behavior of their various workloads. For this reason, a review of different Host side rule implementations will be discussed.

Programming with Computational Storage

Submitted by Anonymous (not verified) on

There is an exponential growth of stored data and of applications processing data in the cloud and the edge. These applications based on traditional CPU based architectures may run into resource limits. Recent developments in Computational Storage have emerged as a promising solution to alleviate the limitations associated with traditional models. In this model, compute is performed near data thereby overcoming CPU, memory and fabric limitations.

Re-thinking Security in a Distributed Storage System

Submitted by Anonymous (not verified) on

In our current data driven world, the ability to store massive amounts of data is inevitable for not just large enterprises. As the legislation evolves, there are more and more requirements against distributed storage systems, but security has been there since the beginning, just as in Apache Ozone. We have different layers where security considerations have to play a central role. Data storage, data access, data transfer, or encryption just to name a few. All layers have their own specialities, and an already established frame for solutions defined mainly by already mature systems.

Subscribe to