Edge is the new frontier of compute and data in today’s world, driven by the explosive growth of mobile devices, work from home, digital video, smart cities, and connected cars. An increasing percentage of data is generated and processed at the edge of the network. With this trend comes the need for faster computing, access to storage, and movement of data at the edge as well as between the edge and the data center.
- The increasing need to do more at the edge across compute, storage and networking
- The rise of intelligent edge locations
- Different solutions that provide faster processing or data movement at the edge
- How computational storage can speed up data processing and transmission at the edge
- Security considerations for edge processing
We look forward to having you join us to cover all this and more. We promise to keep you on the edge of your virtual seat!

What do you think is a more secure way of securely removing data from a hard drive - putting it through a shredder, or doing an instant secure erase? The answer might surprise you! Companies go to great lengths to secure their data and prevent confidential information from being made available to others. When a company is done using its ICT equipment, including the storage device, it is important to render the data inaccessible. Sanitization is a process or method to render access to target data on storage media infeasible for a given level of effort. SSDs and HDDs have various security features that make this sanitization quick, secure, and verifiable.
In this webcast, we will go over the different types of sanitization defined in the new IEEE P2883 Specification for Sanitization of Storage and cover easy ways to perform “Clear”, “Purge,” and “Destruct in mainstream storage interfaces like SATA, SAS, and NVMe. We discuss recommendations for the verification of sanitization to ensure that devices are meeting stringent requirements and explain how the purge technique for media sanitization can be quick, secure, reliable, and verifiable - and most importantly keeps the device in one piece.

As covered in our first webcast “SmartNICs and xPUs: Why is the Use of Accelerators Accelerating,” we discussed the trend to deploy dedicated accelerator chips to assist or offload the main CPU. These new accelerators (xPUs) have multiple names such as SmartNIC, DPU, IPU, APU, NAPU.
This second webcast in this series will cover a deeper dive into the accelerator offload functions of the xPU. We’ll discuss what problems the xPUs are coming to solve, where in the system they live, and the functions they implement, focusing on:
- Network Offloads
- Security Offloads
- Compute Offloads
- Storage Offloads

As applications continue to increase in complexity and users demand more from their workloads, there is a trend to again deploy dedicated accelerator chips to assist or offload the main CPU. These new accelerators (xPUs) have multiple names such as SmartNIC, DPU, IPU, APU, NAPU. How are these different than GPU, TPU, CPU? xPUs accelerate and offload functions including math, networking, storage, cryptography, security, and management. This webcast will cover key topics about, and clarify questions surrounding, xPUs.

The complex and changeable structure of edge computing, together with its network connections, massive real-time data, challenging operating environment, distributed edge cloud collaboration, and other characteristics, create a multitude of security challenges. This panel of experts will explore these challenges and wade into the debate as to whether existing security practices and standards are adequate for this emerging area of computing. Join us for a discussion that will cover:
- Understanding the key security issues associated with edge computing
- Identify potentially relevant standards and industry guidance (e.g., IoT security)
- Offer awareness of new security initiatives focused on edge computing

This presentation will define the data protection landscape particularly in the context of modern cloud-native containerized applications. It describes various constructs and capabilities of these applications thereby articulating data protection challenges. We will also cover different Backup and Recovery solution considerations for scale, performance, optimizations and protection from any ransomware attack.

Data privacy, data governance and data security are all terms that are mistakenly used interchangeably. They are indeed related, particularly when it comes to keeping data in the cloud protected, private and secure, but the definitions and mechanics of executing on each are all quite different.
Join us for another “15 Minutes in the Cloud” session for an overview of what each of these terms means, how and where they intersect, and why it’s a balancing act to pay adequate attention to each one or risk threatening the overall security of your data.
Presenting will be security experts Thomas Rivera, CISSP, CIPP/US, CDPSE and Strategic Success Manager at VMware Carbon Black together with Eric Hibbard, CISSP-ISSAP, ISSMP, ISSEP, CIPP/US, CIPT, CISA, CDPSE, CCSK and Director, Product Planning – Storage Networking & Security, Samsung Semiconductor.

This second webcast in the Storage Life on the Edge series, provides an overview of edge to cloud use cases where storage and compute resources need to be deployed in practical topologies that deliver the very best in application performance. From data analytics and AI inference to emerging IoT edge applications, our panelists will provide a cornucopia of use cases across these categories along with specific, real-world examples.

Digital transformation is driving technology to rapidly evolve towards modernisation of applications with microservices-based architecture being at the core. With the ubiquitous adoption of Kubernetes, cloud-native container technologies are enabling microservices-based application modernization. Such architecture drives the value across the stack and eventually enables business spanning from small-to-medium businesses to large enterprises to be more agile. Such architectural pattern evolution applied across industry vertical drives the need for an infrastructure solution tailor-made for application modernization. In this talk, we present a vendor neutral viewpoint, experiences and observation of the application mordernization trend across the industry and how modern day hyper converged systems are emerging to cater to this growing need.

Everyone is familiar with the term “Cloud” but it’s still worth asking “What is cloud?” It can be defined as “networked computing facilities providing remote data storage and processing services via the internet.” While that definition is simple, the real-world of cloud is complex, and changing constantly.
This first talk in the SNIA Cloud Storage Technologies Initiative “15 Minutes in the Cloud” series will present a brief history of “The Cloud.” If you are a cloud expert, these sessions might not be for you, but for everyone else, this series of short talks might clear up a lot of questions you may have. Join us for a discussion on:
- Common Cloud Terminology
- How all the parts work together
- Why the cloud and what it’s used for
- Example use cases
- SNIA Educational resources on Cloud
