Ransomware!!! – an Analysis of Practical Steps for Mitigation and Recovery

Submitted by Anonymous (not verified) on

Malware, short for malicious software, is a blanket term for viruses, worms, trojans and other harmful software that attackers use to damage, destroy, and gain access to sensitive information; software is identified as malware based on its intended use, rather than a particular technique or technology used to build it. Ransomware is a blended malware attack that uses a variety of methods to target the victim’s data and then requires the victim to pay a ransom (usually in crypto currency) to the attacker to regain access to the data upon payment (with no guarantees).

Data Management going beyond storage boxes.

Submitted by Anonymous (not verified) on

Most of the top storage vendors are moving to storage as a service solution. Exploring all the ecosystem components including open source solutions to build a complete data management solution on top of the existing storage capabilities. The intensity of this move is accelerated as more cloud-native and hybrid use cases are in demand. In this session, we will see an overall architecture for a typical stack with key data management including data protection and monitoring across existing storage infrastructure. We will also see how this trend is shaping container and cloud-native storage.

DNA Sequencing at Scale

Submitted by Anonymous (not verified) on

DNA Sequencing using Sequencing-by-synthesis (SBS) technology is today responsible for the majority of sequencing done worldwide. This presentation will cover the fundamentals behind SBS, the steps involved in going from a DNA sample to data, and the current state of art of sequencing platforms. The presentation will end by discussing how DNA sequencing can be applied to DNA-based data storage.

Introduction to HDD Field Accessible Reliability Metrics to Machine Learning Applications

Submitted by Anonymous (not verified) on

Data is growing at an exponential pace and the need to manage this data at the core and edge is a multi-facet problem. New innovative methods to ensure data availability & utilization of the resources that store this data are being developed. Storage device health monitoring & utilization is one such issue. Developing models to predict drive degradation while using machine learning principles is highly desirable. A recent Google blog described the machine learning techniques being used to promote & improve drive maintenance of their fleet.

Computational Storage Moving Forward with an Architecture and API

Submitted by Anonymous (not verified) on

The SNIA Computational Storage TWG is driving forward with both a CS Architecture specification and a CS API specification. How will these specification affect the growing industry Computational Storage efforts? Learn what is happening in industry organizations to make Computational storage something that you can buy from a number of vendors to move your computation to where your data resides. Hear what is being developed in different organizations to make your data processing faster and allow for scale-out storage solutions to multiply your compute power.

Quantum Technology and Storage: Where Do They Meet?

Submitted by Anonymous (not verified) on

Although quantum technology can be leveraged to do many amazing things, it is not able to provide a general replacement for the storage capabilities we have today with HDDs and SSDs. However, there are a few things where quantum can be leveraged to provide some capabilities that are related to storage and this presentation will cover them. The presentation will start with a quick overview of some of the basic concepts of quantum technology and the reasons why quantum computing may potentially provide significant performance improvements over classical computing for certain applications.

SkyhookDM: An Arrow-Native Storage System

Submitted by Anonymous (not verified) on

With the ever-increasing dataset sizes, several file formats like Parquet, ORC, and Avro have been developed to store data efficiently and to save network and interconnect bandwidth at the price of additional CPU utilization. However, with the advent of networks supporting 25-100 Gb/s and storage devices delivering 1, 000, 000 reqs/sec the CPU has become the bottleneck, trying to keep up feeding data in and out of these fast devices.

High Performance NVMe Virtualization with SPDK and vfio-user

Submitted by Anonymous (not verified) on

Presenting paravirtualized devices to virtual machines has historically required specialized drivers to be present in the guest operating system. The most popular example is virtio-blk or virtio-scsi. These devices can be constructed using either the host system operating system (KVM, for example, can emulate virtio-blk and virtio-scsi devices for use by the guest) or by a separate user-space process (the vhost-user protocol can connect to these targets, typically provided by SPDK). However, only Linux currently ships with virtio-blk and virtio-scsi drivers built-in.

A Primer on GPUDirect Storage

Submitted by Anonymous (not verified) on

Extreme Compute needs Extreme IO. The convergence of HPC and AI are using GPUs in wider range of applications than ever before on multitude of platforms ranging from edge devices, commodity hardware to high performance supercomputers. Larger datasets enable more accurate AI models which gathers deeper information enabling enterprises to collect more and more data. This virtuous cycle is enabling the explosive demands in processing larger amounts of data and the need to reduce IO bottlenecks is greater than ever.

Subscribe to