Knowledge Center

Throughout the year, CSTI Member companies share their expert knowledge by providing educational webinars through the SNIA BrightTALK channel. Check out some of our recent webinars and see why viewers say:

Good technical content, and also highly vendor agnostic which I very much appreciate.

Great explanations, extremely comprehensive and knowledgeable presenters!

Good, thought-provoking stuff here. Clear and concise with good links for follow-up.

On Demand Webinars

AIOps: Reactive to Proactive - Revolutionizing the IT Mindset

The digital landscape is in hyperdrive, demanding an IT metamorphosis that transcends mere tools. Enter AIOps – not just a technological upgrade, but a paradigm shift redefining how we approach IT operations. This presentation delves beyond the nuts and bolts, unveiling AIOps as a revolution that infuses AI's intelligence into the very fabric of IT thinking and processes,

View Webinar

Ceph: The Linux of Storage Today

A decade ago, the market was aggressively embracing public storage because of its agility and scalability. People are now rethinking that approach, moving toward on-premises storage with cloud consumption models. The new cloud native architecture on-premises has the promise of the traditional data center’s security and reliability with cloud agility and scalability. In this webinar, we describe how Ceph is uniquely qualified to satisfy this architecture and how the technology community is investing to enable the vision of “Ceph, the Linux of Storage Today.”

View Webinar

Navigating the Complexities of Object Storage Compatibility

Object Storage has firmly established itself as a cornerstone of modern data centers and cloud infrastructure. Ensuring API compatibility has become crucial for object storage developers who want to benefit from the wide ecosystem of existing applications. However, achieving compatibility can be challenging due to the complexity and variety of the APIs, access control mechanisms, and performance and scalability requirements.

In this webinar, we'll highlight real-world incompatibilities found in various object storage implementations. We'll discuss specific examples of existing discrepancies, such as missing or incorrect response headers, unsupported API calls, and unexpected behavior. We’ll also describe the implications these have on actual client applications.

View Webinar

Simplified Namespace Management - The Open Standards Way

The days of simple, static, self-contained file systems have long passed. Today, we have complex, dynamic namespaces, mixing block, file, object, key-value, queue, and graph-based resources, accessed via multiple protocols, and distributed across multiple systems and geographic sites. These complexities result in new challenges for simplifying management.

The good news is, that the SNIA Cloud Data Management Interface (CDMI™), an open ISO standard (ISO/IEC 17826:2022) for managing data objects and containers, already includes extensive capabilities for simplifying the management of complex namespaces. In this webinar, attendees will learn how to simplify namespace management – the open standards way, including namespace discovery, introspection, exports, imports and more.

View Webinar

Why Distributed Edge Data is the Future of AI

AI is disrupting so many domains and industries and by doing so, AI models and algorithms are becoming increasingly large and complex. This complexity is driven by the proliferation in size and diversity of localized data everywhere, which creates the need for a unified data fabric and/or federated learning. It could be argued that whoever wins the data race will win the AI race, which is inherently built on two premises: 1) Data is available in a central location for AI to have full access to it, 2) Compute is centralized and abundant.

Edge AI though, defies these assumptions. If centralized (or in the cloud) AI is a superpower and super expert, edge AI is a community of many smart wizards. As humans, we can appreciate the power of cumulative knowledge over a central superpower. In this webinar, we will touch on:

  • The value and use cases of distributed edge AI
  • How data fabric on the edge differs from the cloud and its impact on AI
  • Edge device data privacy trade-offs and distributed agency trends
  • Privacy mechanisms for federated learning, inference, and analytics
  • How interoperability between cloud and edge AI can happen

View Webinar

The Rise of Confidential AI

With cloud data privacy regulations evolving worldwide and accelerated adoption of AI technologies such as ChatGPT, Large Language Models (LLMs) and more, companies must ensure data and AI models are compliant. Confidential AI is a new collaborative platform for data and AI teams to work with sensitive data sets and run AI models in a confidential environment. It includes infrastructure, software, and workflow orchestration to create a secure, on-demand work environment that meets organizations' privacy requirements and complies with regulatory mandates. In this session, you’ll learn:

  • What confidential AI is and why it is important
  • Changing privacy and compliance landscape for AI use and models
  • Biggest data privacy threats and opportunities 
  • Pragmatic examples and next steps
 

Data Fabric: Connecting the Dots between Structured and Unstructured Data

Data Fabric is an architecture, set of services and platform that standardizes and integrates data across the enterprise regardless of data location (On-Prem, Cloud, Multi Cloud, Hybrid Cloud), enabling self-service data access to support various applications, analytics, and use cases. The data fabric leaves data where it lives and applies intelligent automation to govern, secure and bring AI to your data.

View Webinar

12 Top Trends in Data and Cloud Storage

The SODA Foundation, in partnership with Linux Foundation Research, has recently published its Data and Storage Trends 2022 Report, “Data and Storage Strategies in the Era of the Data-Driven Enterprise.” The findings from this global study provide a comprehensive look at the intersection of cloud computing, data and storage management, the configuration of environments that end-user organizations are gravitating to, and priorities of selected capabilities over the next several years.

SNIA is pleased to host SODA members who led this important research for a live discussion and in-depth look at key trends driving data and storage.

View Webinar

Cyberstorage and XDR: Threat Detection through a Storage Lens

Cybercriminals have always been about data – stealing data, compromising data, holding data hostage. Is there anything we can do from within the storage layer to further enhance defense in depth? 
 
Enter "Cyberstorage" which does threat detection and response in storage software or hardware. A related trend is eXtended Detection and Response (XDR) which shifts some of the threat detection from centralized security monitoring tools (SIEMs) down into each domain for faster detection and automated response.

View Webinar

Training Deep Learning Models in the Cloud

Deep Learning models are gaining prominence. In this session, experts provide an assessment of various solution approaches and identify challenges faced by enterprises in their adoption of AI and Deep Learning technologies. They offer considerations for selection of Deep Learning infrastructure in on-premises and cloud data centers. Our presentation will include an assessment of various solution approaches and identify challenges faced by enterprises in their adoption of AI and Deep Learning technologies.

View Webinar

Journey to the Center of Massive Data: Digital Twins

Have you ever wondered how intelligent Industry 4.0 factories or smart cities of the future will process massive amounts of sensor and machine data? What you may not expect is a digital twin will most likely play a role. A digital twin is a virtual representation of an object, system or process that spans its lifecycle, is updated from real-time data, and uses simulation, machine learning and reasoning to help decision-making. Digital twins can be used to help answer what-if AI-analytics questions, yield insights on business objectives and make recommendations on how to control or improve outcomes. This presentations introduces digital twin usage in edge IoT applications, highlighting what is available today, what to expect in the next couple of years, and what the future holds. We will provide examples of how digital twin methods help capture virtual representation of real-world entities and processes

View Webinar

Kubernetes Trials & Tribulations: Cloud, Data Center, Edge

Kubernetes platforms offer a unique cloud-like experience — all the flexibility, elasticity, and ease of use — on premises, in a private or public cloud, even at the edge. The ease and flexibility of turning on services when you want them, turning them off when you don’t, is an enticing prospect for developers as well as application deployment teams, but it has not been without its challenges.
 
Our Kubernetes panel of experts will debate the challenges and how to address them, discussing:

  • So how are all these trends coming together?
  • Is cloud repatriation really a thing?
  • How are traditional hardware vendors reinventing themselves to compete?
  • Where does the data live?
  • How is the data accessed?
  • What workloads are emerging? 

View Webcast

15 Minutes in the Cloud: Kubernetes is Evolving, Are You? 

Wide-spread adoption of Kubernetes over the last several years has been remarkable and Kubernetes is now recognized as the most popular orchestration tool for containerized workloads. As applications and workflows in Kubernetes continue to evolve, so must the platform and storage.

So, where are we today, and where are we going? Find out in this “15 Minutes in the Cloud” session, where we’ll discuss:

  • Persistence - From ephemeral to persistent - what has putting persistence in the mix done to applications?
  • Business Continuity - What’s needed for business continuity, backup & recovery and DR?
  • Deployment - Kubernetes delivered as a service, in the cloud, on-premises, data center and edge. How is that different in each case?
  • Performance/Scalability – How do you scale and still ensure performance?
  • Trends – What are the business drivers and what does the future hold?

View Webcast

Kubernetes is Everywhere: What About Cloud Native Storage?

Organizations are adopting containers at an increasingly rapid rate. In fact, there are few organizations that haven’t implemented containers in their environment today.
 
Storage implications for Kubernetes will be the topic of this live webcast where storage experts from SNIA and Kubernetes experts from the Cloud Native Computing Foundation (CNCF) discuss:

  • Key storage attributes of cloud native storage for Kubernetes
  • How do we use cloud native storage in Kubernetes environments?
  • Workloads and real-world use cases

This webcast will help you better understand and address storage and persistent data challenges in a Kubernetes environment.

View Webcast

High Performance Storage at Exascale

Through massive scale-out capabilities, current parallel file systems are more than able to provide the capacity and raw bandwidth that is needed at Exascale. This webcast examines the different I/O workflows seen on supercomputers today, discussing the approaches the industry is taking to support the convergence of HPC and AI workflows, and highlighting some of the innovations in both storage hardware and parallel file system software that will enable high performance storage at Exascale and beyond.

View Webcast

15 Minutes in the Cloud: Data Privacy vs. Governance vs. Security

Data privacy, data governance and data security are all terms that are mistakenly used interchangeably. They are indeed related, particularly when it comes to keeping data in the cloud protected, private and secure, but the definitions and mechanics of executing on each are all quite different.

Join us for another “15 Minutes in the Cloud” session for an overview of what each of these terms means, how and where they intersect, and why it’s a balancing act to pay adequate attention to each one or risk threatening the overall security of your data.

Presenting will be security experts Thomas Rivera, CISSP, CIPP/US, CDPSE and Strategic Success Manager at VMware Carbon Black together with Eric Hibbard, CISSP-ISSAP, ISSMP, ISSEP, CIPP/US, CIPT, CISA, CDPSE, CCSK and Director, Product Planning – Storage Networking & Security, Samsung Semiconductor.

View Webcast

15 Minutes in the Cloud: What is Cloud?

Everyone is familiar with the term “Cloud” but it’s still worth asking “What is cloud?”  The definition of Cloud has only been around for a dozen years or so. It can be defined as “networked computing facilities providing remote data storage and processing services via the internet.” While the definition is simple, the real-world of cloud is complex, and changing constantly. 
 
This first talk in the SNIA Cloud Storage Technologies Initiative “15 Minutes in the Cloud” series will present a brief history of “The Cloud.” If you are a cloud expert, these sessions might not be for you, but for everyone else, this series of short talks might clear up a lot of questions you may have.
 

5G Industrial Private Networks and Edge Data Pipelines

The convergence of 5G, Edge Compute and Artificial Intelligence (AI) promise to be catalyst for Digital transformation within industrial segments. Advanced 5G is specifically designed to address the needs of verticals with capabilities like enhanced mobile broadband (emBB), ultra-reliable low latency communications (urLLC), and massive machine type communications (mMTC), to enable near real-time distributed intelligence applications. For example, automated guided vehicle and autonomous mobile robots (AGV/AMRs), wireless cameras, augmented reality for connected workers, and smart sensors across many verticals ranging from healthcare and immersive media, to factory automation.

Using this data, manufacturers are looking to maximize operational efficiency and process optimization by leveraging AI and machine learning. To do that, they need to understand and effectively manage the sources and trustworthiness of timely data.

View Webcast

Why Use Multiple Clouds? 

As storing data in the cloud has become ubiquitous and mature, many organizations have adopted a multi-cloud strategy. Eliminating dependence on a single cloud platform is quite a compelling case.

But multi-cloud environments are not without challenges. Taking advantage of the benefits without increasing complexity requires a strategy that ensures applications are not tightly coupled to cloud-specific technologies. Supporting a storage abstraction layer that insulates the application from the underlying cloud provider's interfaces allows an application to be easily used with multiple clouds.

View Webcast

Cloud Storage and Big Data: A Marriage Made in the Clouds

This talk will focus on the history of “Big Data” and how it has pushed the storage envelope, eventually resulting in a seemingly perfect relationship with Cloud Storage. But local storage is the 3rd wheel in this relationship, and won’t go down easy. Can this marriage survive when Big Data is being pulled in two directions? Should Big Data pick one, or can the three of them live happily ever after? 

View Webcast

Moving Genomics to the Cloud: Compute and Storage Considerations

The study of genomics in modern biology has revolutionized the discovery of medicines and driven the rapid development of vaccines. Genomics, however, requires a significant amount of compute power and data storage to make new discoveries possible. This session will feature expert viewpoints from both bioinformatics and technology perspectives with a focus on some of the compute and data storage challenges for genomics workflows.

View Webcast

Extending Storage to the Edge: How it Should Afffect Your Storage Strategy

Data gravity has pulled computing to the Edge and enabled significant advances in hybrid cloud deployments. The ability to run analytics from the datacenter to the Edge, where the data is created and lives, also creates new use cases for nearly every industry and company. However, this movement of compute to the Edge is not the only pattern to have emerged. How might these other use cases impact your storage strategy.

How to Easily Deploy Confidential Computing

Confidential Computing is architected to provide security for data in use to meet this critical need for enterprises today. This webcast provides insight into how data center, cloud and edge applications may easily benefit from cost-effective, real-world Confidential Computing solutions. This educational discussion provides end-user examples, tips on how to assess systems before and after deployment, as well as key steps to complete along the journey to mitigate threat exposure. You'll learn:

To counter the ever-increasing likelihood of catastrophic disruption and cost due to enterprise IT security threats, data center decision makers need to be vigilant in protecting their organization’s data. Confidential Computing is architected to provide security for data in use to meet this critical need for enterprises today. This webcast provides insight into how data center, cloud and edge applications may easily benefit from cost-effective, real-world Confidential Computing solutions. This educational discussion will provide end-user examples, tips on how to assess systems before and after deployment, as well as key steps to complete along the journey to mitigate threat exposure. Presenting are Steve Van Lare (Anjuna), Anand Kashyap (Fortanix), and Michael Hoard (Intel), who will discuss: What would it take to build-your-own Confidential Computing solution? Emergence of easily deployable, cost-effective Confidential Computing solutions Real world usage examples and key technical, business and investment insights

View Webcast

Confidential Computing: Protecting Data in Use

As noted in our panel discussion “What is Confidential Computing and Why Should I Care?,” Confidential Computing is an emerging industry initiative focused on helping to secure data in use. The efforts can enable encrypted data to be processed in memory while lowering the risk of exposing it to the rest of the system, thereby reducing the potential for sensitive data to be exposed while providing a higher degree of control and transparency for users.

As computing moves to span multiple environments from on-premises to public cloud to edge, organizations need protection controls that help safeguard sensitive IP and workload data wherever the data resides. In this live webcast we’ll cover:

View Webcast

What is Confidential Computing and Why Should I Care?

In the "arms race" of security, new defensive tactics are always needed. One significant approach is Confidential Computing: a technology that can isolate data and execution in a secure space on a system, which takes the concept of security to new levels. This SNIA Cloud Storage Technologies Initiative (CSTI) webcast will provide an introduction and explanation of Confidential Computing and will feature a panel of industry architects responsible for defining Confidential Compute. It will be a lively conversation on topics including:

View Webcast

Continuous Delivery: Cloud Software Development on Speed

In the world of cloud services development, it's necessary to gain an edge on the myriad of competition facing your product or service. Volume and variety are not just characteristics of cloud data, but also of the software needed to deliver accurate decisions. While a variety of software techniques exist to create effective development teams, sometimes it's worthwhile to look elsewhere for additional success factors. In this webcast, we'll be focusing on adapting some of the principles of modern manufacturing to add to the development toolbox. A Continuous Delivery methodology ensures that the product is streamlined in its feature set while building constant value to the customer via the cloud. Watch to learn:

View Webcast

The Ethics of Artificial Intelligence

Artificial Intelligence technologies are possibly the most substantive and meaningful change to modern business.  The ability to process large amounts of data with varying degrees of structure and form enables large leaps in insight to drive revenue and profit.  Likewise, governments and civil society have significant opportunity for improvement of the lives of the populace.  However, with the power that AI brings comes the risks of any technology innovation.  This interactive session will cover some of the ethical issues that AI can bring.  Attendees should expect to learn:

View Webcast

Data Protection and Data Privacy in the COVID Era

The COVID-19 Pandemic has amplified cybersecurity concerns particularly related to the cloud. Threat actors have recognized a unique opportunity to exploit pandemic-related vulnerabilities through social engineering attacks, business email compromise, work from home or other remote weak points. This results in increased risk and occurrence of ransomware attacks and data breaches that can disrupt or totally compromise organizations’ ability to conduct business. These security incidents can also subject victims to liability for violations of privacy and data breach notification laws. Join this webcast as SNIA experts will discuss:

View webcast

Cloud Data Management & Interoperability: What a CDMI Standard Matters

The Cloud Data Management Interface (CDMI™) International Standard is intended for application developers who are implementing cloud storage systems, and who are developing applications to manage and consume cloud storage. It documents how to access cloud storage namespaces and how to manage the data stored in these namespaces. In this webcast we’ll provide an overview of the CDMI standard and cover CDMI 2.0:

View Webcast

How Video Analytics is Changing the Way We Store Video

There is a new wave of cognitive services based on video and image analytics, leveraging the latest in machine learning and deep learning. In this webcast, we will look at some of the benefits and factors driving this adoption, as well as explore compelling projects and required components for a successful video-based cognitive service. This includes some great work in the open source community to provide methods and frameworks, some standards that are being worked on to unify the ecosystem and allow interoperability with models and architectures. Finally, we’ll cover the data required to train such models, the data source and how it needs to be treated.

However, there are challenges in how we do this. Many archives were analog and tape based which doesn’t stand up well to mass ingestion or the back and forth of training algorithms. How can we start to define new architectures and leverage the right medium to make our archives accessible whilst still focusing on performance at the point of capture?

View Webcast

Storage Implications at the Velocity of 5G Streaming

The broad adoption of 5G, Internet of things (IoT) and edge computing will reshape the nature and role of enterprise and cloud storage over the next several years. What building blocks, capabilities and integration methods are needed to make this happen? You'll hear:

View Webcast

Using Data Literacy to Drive Insight

Having access to data does not automatically grant the knowledge of how to interpret that data or the ability to derive insight. It is even challenging to judge the accuracy or value in that data. The skill required is known as data literacy, and in this presentation we will look at how access to one data source will inevitably drive the need to access more. We will examine:

View Webcast

Does Your Storage Need a Cyber Insurance Tune Up?

Protection against cyber threats is recognized as a necessary component of an effective risk management approach, typically based on a well-known cybersecurity framework. A growing area to further mitigate risks and provide organizations with the high level of protection they need is cyber insurance. However, it’s not as simple as buying a pre-packaged policy.

This webcast provides overview of how cyber insurance fits in a risk management program. It will identify key terms and conditions that should be understood and carefully negotiated. Cyber insurance policies may not cover all types of losses, so it is critical to identify what risks and conditions are excluded from a cyber insurance policy before you buy.

View Webcast

IT Modernization with AIOps: The Journey

The almost overnight shift of resources toward remote work introduces the need for far more flexible, dynamic and seamless end-to-end applications, putting us on a path that requires autonomous capabilities using AIOps – Artificial Intelligence for IT Operations.

This webcast will provide an overview of concepts and strategies to accelerate the digitalization of critical enterprise IT resources, and help architects rethink what applications and underlying infrastructure are needed to support an agile, seamless end-to-end data centric environment.  This session will specifically address migration from monolithic to microservices, transition to Cloud Native services, and the platform requirements to help accelerate AIOps application delivery within our dynamic hybrid and multi-cloud world.  

View Webcast

A Multi-tenant Multi-cluster Kubernetes Datapocalypse is Coming

The need for rapid deployment of scalable clusters is creating an opportunity for container solutions such as Kubernetes. But what are the implications of multiple Kubernetes clusters in a broad deployment? What happens if a cluster goes down? What’s the impact on business resiliency? Managing and securing multiple clusters is becoming a key topic and area of debate. Multi-cluster Kubernetes that provides robustness & resilience is rapidly moving from “best practice” to a “must have”.

View Webcast

Storage Scalability in Hybrid Cloud and Multicloud Environments

As data growth in enterprises continues to sky rocket, datacenter cloud scalability whether on premises, in hybrid cloud or in multicloud deployments is key for businesses. So, what are enterprise IT organizations supposed to do, given that 'run anything anywhere' is becoming more important than ever? Customers are finding that hybrid cloud storage solutions better meet their IT and business growth needs, so they can rapidly scale their IT infrastructure and cover a wider array of services.

View Webcast

The Influence of IoT on Data Strategy

More and more we are seeing compute and inference move to the edge. This is driven by the growth in capability to not only generate data from sensors, devices and by people operating in the field, but also by the interaction between those devices. This new source of data and information brings with it unique challenges to the way we store and transmit data as well as the way we need to curate it. In this webcast we will look at:

View Webcast

The Impact of Artificial Intelligence on Storage and IT

Artificial intelligence (AI) and machine learning (ML) have been having quite the impact on most industries in the last couple of years, but what about our own IT industry? In this webcast find out how the rise of machine learning has created a new type of demand on IT operations teams as well as how those same teams can utilize new insights and capabilities driven by machine learning. We will explore:

View Webcast

Cloud Standards: What They Are, Why You Should Care

Since the initial publication of the National Institute of Standards and Technology (NIST) definition of cloud computing in NIST SP 800-145 in 2011, international standards development organizations (SDOs) have sought to refine and expand the cloud computing landscape. This webinar will identify key published and draft cloud standards, discuss their interdependencies, and highlight their importance as well as identify potential future work. In addition, related technologies such as virtualization, federation, and fog/edge computing will be addressed. Lastly, the relevance of the standards will be explored to help organizations understands ways these documents can be exploited.

View Webcast

Kubernetes in the Cloud - Part Three: Almost Everything You Need to Know about Stateful Workloads (August 2019)

Kubernetes is great for running stateless workloads, like web servers. It’ll run health checks, restart containers when they crash, and do all sorts of other wonderful things. So, what about stateful workloads?

This webcast will take a look at when it’s appropriate to run a stateful workload in cluster, or out. We’ll discuss the best options for running a workload like a database on the cloud, or in the cluster, and what’s needed to set that up. We cover:

View Webcast


View All On-Demand Cloud Storage Technologies Initiative Webcasts