Several SSD and networking vendors have recently demonstrated ways to connect SSDs directly to an Ethernet network. They propose that deploying Ethernet SSDs will be more scalable, easier to manage, more performant, and/or lower cost than traditional storage networking solutions that use a storage controller (or hyperconverged node) between the SSDs and the network.
Who would want to attach SSDs directly to the network? Are these vendors brilliant or simply trying to solve a problem that doesn’t exist? What are the different solutions that could benefit from Ethernet SSDs? Which protocols would one use to access them? And how do Ethernet SSDs relate to computational storage? Join this SNIA Networking Storage Forum webcast to learn all this and more as SNIA experts discuss:
- What are the appropriate use cases for Ethernet SSDs?
- Why Ethernet SSDs could be appealing and more efficient
- How Ethernet SSDs compare to other forms of storage networking
- Different ways Ethernet SSDs can be accessed, such as JBOF/NBOF, NVMe-oF, and Key Value
- How do Ethernet-attached SSDs enable composable infrastructures?

There are many types of storage technologies, both in how they are interconnected, consumed and designed. Object storage is no different in that it brings its own set of unique characteristics to the market. Join to hear storage experts explain:
- What object storage is and what it does
- How to use object storage
- Essential characteristics of typical consumption
- Why object storage is important to the future of storage and computing technologies

Since the initial publication of the National Institute of Standards and Technology (NIST) definition of cloud computing in 2011, international standards development organizations (SDOs) have sought to refine and expand the cloud computing landscape. This webinar will:
- Identify key published and draft cloud standards
- Discuss their interdependencies
- Highlight their importance
- Identify potential future work.
In addition, related technologies such as virtualization, federation, and fog/edge computing will be addressed. Lastly, the relevance of the standards will be explored to help organizations understand ways these documents can be exploited.

Get prepared for SNIA’s Persistent Memory Summit with this webcast from Objective Analysis and Coughlin Associates. Following up on their 2018 groundbreaking report on emerging memories, Jim Handy and Tom Coughlin will update us on 2019 advances in support from SNIA, the launch of Optane memory on DIMMs, new MRAM types, and more. You won’t want to miss their analysis on the progress made, and their perspective on the groundwork that still needs to be covered to bring persistent memory to mainstream computing.

The Storage Performance Development Kit (SPDK) has gained industry-wide recognition as a framework for building highly performant and efficient storage software with a focus on NVMe™. This includes software drivers and libraries for building NVMe-oF™ host and target solutions. In this presentation, technical leaders from SPDK will provide an overview of the project, NVMe-oF use cases that are best suited for SPDK, and insights into how SPDK achieves its storage networking performance and efficiency.

Failing to protect sensitive information can put a lot of people at risk of being exploited by cybercriminals, and can make a company face enormous legal penalties. The way information is shared and stored can put the information at risk. It is risky to store personal information on portable devices, which are easily lost or stolen. In addition, the consequences of a data breach can be devastating. Identity theft could lead to financial losses, and a company could face lawsuits and legal penalties. This presentation will cover what kinds of personal information must be protected & guidelines for keeping this info safe.

What do Hyperscalers like Facebook and Microsoft have in common? They are cloud market leaders using NVMe™ SSDs in their architectures. Get a close up look into their application requirements and challenges, why they chose NVMe flash for the storage, and how they are successfully deploying NVMe to fuel their businesses.
Watch Video:

Software defined storage, or SDS, is growing in popularity in both cloud and enterprise accounts. But what makes it different from traditional storage arrays? Does it really save money? Is it more complicated to support? Is it more scalable or higher-performing? And does it have different networking requirements than traditional storage appliances? Watch this webcast to learn more.

What does it mean to be protected and safe? You need the right people and the right technology. This presentation is going to go into the broad introduction of security principles in general. This will include some of the main aspects of security, including defining the terms that you must know, if you hope to have a good grasp of what makes something secure or not. We’ll be talking about the scope of security, including threats, vulnerabilities, and attacks – and what that means in real storage terms. In this live webcast we will cover:
- Protecting the data (Keeping “the bad” out)
- Threat landscape, Bad actors/hackers
- Attack vectors, attack surfaces, vulnerabilities
- Physical security issues
- Layers of protection (encryption – last line of defense)
- Remediation after a breach/incident

This webcast will take a look at when it’s appropriate to run a stateful workload in cluster, or out. We’ll discuss the best options for running a workload like a database on the cloud, or in the cluster, and what’s needed to set that up.
