Storage World Conference 2005

2005 Agenda

Color key
Blue: General Session: Keynotes, Rountables, Panels
Green: Tutorials: Part of the Storage World Education Program (SWEP)
Red: ASNP End-User Perspective Series



Thursday, June 9

Go to Tuesday, June 7, 2005

Go to Wednesday, June 8, 2005

7:00 am - 8:00 am Breakfast - Promenade Foyer
8:00 am - 9:50 am Tutorial Sessions

Architecture & Technology Track
Room 104A
Storage Management Track Room 104B Business Continuance/Disaster Recovery Track Room 104C
8:00 am - 8:50 am                                

Tutorial 13
NAS Technology & Futures

This tutorial surveys the evolution of NAS technology and presents some of the issues and complexities involved in large NAS deployments. The future of NAS technology will be explored, along with the impact on networked storage.

Tutorial 14
Storage Security

This tutorial introduces the attendee to storage security concepts and technologies. It will lay the groundwork for understanding basic security technology and progress to how today’s storage networks secure your assets. The attendee will learn about the basic elements and categories of security, encryption standards, common protocols, security technology, and how today’s SANs protect an organization's storage network assets.


  • History
  • Why storage Security
    Security definition
    Current networked storage security
  • Basic Fours
    Data Integrity
  • Main Categories of Security
    Hash Function
  • Data Encryption Standards
  • Common Security Protocols
  • Storage Security Technologies
  • SAN Security Standards
  • NAS Security Standards
  • Protecting Assets
  • Best Practices


Tutorial 15
Fabric  or Storage Based Replication - Myths and Realities

Storage-based replication dominates the replication market with products such as SRDF from EMC, PPRC from IBM and TrueCopy from HDS. Several analysts are predicting that five years from now, fabric-based replication will dominate the scene. What will cause this reversal?

This tutorial explains how storage-based replication works, its pros and cons and why it has become the de facto standard for data replication.


  • Various flavors of replication
  • Fabric-based replication
    Technology used
    Advantages and disadvantages
    Why it will gain traction over the next few years
  • Vendor-neutral products
    How technology is applied to solve a variety of problems
9:00 am - 9:50 am

Tutorial 16
Extending Storage Connectivity

Instructor: Noah Breslow, VP Marketing,    Tacit Networks 

Recent studies report that there are over 120,000 distributed enterprises worldwide with a total of over 4 million remote offices.  The challenge to IT professionals who have been charged with supporting these distributed enterprises has been to build a network infrastructure that allows them to effectively manage and support all data while offering real-time branch office user access to that data and the datacenter-class services that often reside at corporate headquarters.  In the best of all worlds, IT manager and architects would simply consolidate all data and services to a central location and offer branch office user access via the Wide Area Network (WAN).   WAN latency and unreliability have made this nearly impossible, however, leaving IT professionals to search out technologies that address WAN roadblocks and allow them to consolidate and centralize branch office storage and servers while offering real-time worldwide access to the data and services that will reside at these central locations.

Aimed at the working IT professional, this tutorial will offer an in-depth look at the new, best-in-class wide are distributed file and service access technologies that are solving this IT dilemma.  Among the technologies that this tutorial will address are wide area replication, WAN optimization and wide area file services (WAFS); and this tutorial will educate attendees on which of these technologies are right for their organizations by:

Tutorial 17
Compliance Applications and Implementations - Sarbanes Oxley, HIPAA. Regulatory Agencies, etc.

Is your company in compliance? Are you certain about it? Are you sure to the point of betting your job on your regulatory compliance?

Compliance is a serious issue, and the stakes can be high. This presentation covers a number of software tools that purport to perform this mission. Tools from Heroix, Netqos and Ecora, as well as others, will be surveyed by a vendor-neutral industry consultant. Without ties to any of these products, you’ll get an honest evaluation, not a “sales” job.

Tutorial 18
Using Tape for Backup and Archiving - Do you Really want to Archive?

Instructor: Brett Schecter, Senior Storage Evangelist, Sony Electronics Corp., Component Solutions Business   

This tutorial surveys existing tape backup technology and provides an assessment of future trends and their impact on networked storage applications.


  • Comparison of tape versus disk backup
  • Advantages of tape
  • Current role of tape in backup and how it works
  • New networked storage topologies
  • Indications for use
  • Implementation
    Management benefits
    Role of software
  • Issues with using tape for backup
  • New products for backup to tape

9:50 - 10:05 am Break - Grand Ballroom Foyer
10:10 am - Noon General Session - Grand Ballroom
10:10 am - 10:55

CTO Roundtable - Thinking About the Not-so-Obvious

Moderator: Fred Moore, President, Horison Information Strategies, Inc.  

11:00 am - 11:25 am Analyst Presentation - W. Curtis Preston, VP Data Protection Services, GlassHouse Technologies
11:30 am - 11:55 am ASNP End-User Perspective Series: Case Study -  
12:00 pm - 1:15 pm Buffet Luncheon with Analyst Presentations - Rooms 101A, 101B, 102A
1:15 pm - 3:00 pm PM Breakout Sessions

Breakout Track A Room 104A Breakout Track B Room 104B Breakout Track C Room 104C 
1:15 pm - 2:05 pm

Breakout 13
Can NAS Get to the Next Level?

Moderator: Randy Kerns, Senior Partner, Evaluator Group  

NAS and its near plug and play attributes have seen increased popularity since the late 1990s. Still, issues remain: is NAS fast enough for many applications, NAS
gateways, NAS clustering; does it have the ability to handle blocks, data base support, multi-host access; and the scalability of NAS compared to SANs are lodged in the critical path to the future for  NAS. This discussion will outline what lies
ahead for NAS and analyze its long-term

Breakout 14
Storage Security Goes Mainstream

Today's IT infrastructures are exposed to physical and digital vulnerabilities. The looming threat to delivering high data availability is now the "intrusion factor", and storage security has become the
newest storage management discipline. In reality, there is no silver bullet in place to implement
a fool-proof and secure IT infrastructure; however, minimizing security risks has become the top priority for many IT organizations and accomplishing this task is possible, though costly. This session will discuss the state-of-the-art of storage security.

Breakout 15
Getting DR/BC Practices on the Same Page

Disaster Recovery and Business Continuity are closely related and should be carefully aligned, but the number of ways to implement each vary considerably.

Disaster recovery focuses on getting the entire storage network up and running while business continuity works on getting critical business processes back to a fully operational state.This panel will address the best practices currently deployed to attain the highest levels of DR/BC.

2:10 pm - 3:00 pm                             

Breakout 16
ASNP End-User Perspective Series - 
How to Justify New Technologies
to Upper Management

Technology has been booming and along
with it has come many major advancements
in connectivity, storage management, backup, and other areas.  Management is always skeptical of implementing new technologies
-- even if it can save $$, time and people. In this special session, hear from other users on the best way to get management approvals on new technology.

Breakout 17
ASNP End-User Perspective  Series - How to Manage Your Storage Management Costs

Moderator: Marc Staimer, President & CDS, DragonSlayer Consulting 

Hear how other users have gained control of managing their storage, including building a successful storage team.

Breakout 18
ASNP End-User Perspective Series - How to Create the Best Disaster Recovery Plan

Moderator: Mike Karp, Senior Analyst, Enterprise Management Associates 

Management is all over the IT department to make sure that their Data is safe and protected.  What is the best way to create an effective plan that not only protects your data, but also enables recovery from any disaster?  End users from a wide range of businesses will relate their secrets about the most effective ways to create and implement a plan that does just that!

3:00 pm - 3:15 pm Break, Promenade Foyer
3:20 pm - 5:10 pm Tutorials

Architecture & Technology Track
Room 104A
Storage Management Track
Room 104B
Business Continuance/Disaster Recovery Track Room 104C
3:20 pm - 4:10 pm

Tutorial 19
SAS and SATA Technology and their impact on Storage Applications

This tutorial investigates how Serial ATA and Serial Attached SCSI will impact the future of the storage marketplace. The attendee will learn about each alternative including connectivity, distance, and implementation. The attendee will understand the market trends behind these technologies and where they most likely will be deployed.


  • SATA Architectural overview
    Distance and device capabilities
    Target market segments and applications
  • SAS Architectural overview
    Distance and device capabilities
    Target market segments and applications
  • Architectural Layer comparison
  • SATA and SAS Compatibility
    SATA Advantages and Disadvantages
    SAS Advantages and Disadvantages
  • Impact on Fibre Channel market
  • Impact on parallel SCSI

Tutorial 20
Tips, Trends, and Techniques for Purchasing Storage

Instructor: William R. (Bill) Peldzus, Director of Storage Architecture, GlassHouse Technologies, Inc. 


This tutorial clarifies the questions you should be asking of ALL of your storage vendors, and other important tips and techniques for writing an air-tight RFI or RFP (they’re different!) Using case studies, you will learn:


  • How to base an RFI on business drivers, not technology
  • The importance of a storage reference architecture for RFPs
  • The difference between an RFI and RFP
  • How to get responses that promote an ‘apples-to-apples’ comparison
  • Important notes on document structure and vendor correspondence
  • Tips on objectively rating and scoring the responses
  • Negotiation techniques
  • The important items to evaluate beyond price

Tutorial 21

Continuous Data Protection in the www World


Instructors: Dan Tanner, Founder, ProgresSmart

David Hill, Principal, Mesabi Group, LLC


In this www world , there is no “downtime” and business must run around the clock. IT Executives must be prepared to ensure continuous access to business-critical applications from here to eternity.

This session investigates the critical role that Continuous Data Protection plays in your disaster recovery plans, and how it can promote seamless, uninterrupted access to data you need to keep your business up and running – even during disasters, whether natural, manmade or due to faulty infrastructure.


What software and hardware is actually available to make this possible? This session will survey many possible solutions and open your eyes to the vision of a  www world being online forever.


4:20 pm - 5:10 pm                               

Tutorial 22
High Availability Using Intelligent Switches

Instructor: Marc Staimer, President & CDS, DragonSlayer Consulting

High availability is not just about servers and infrastructures. This session will prepare you for designing, developing and implementing an HA plan to help ensure that whatever you need to be highly available is truly that.


  • Technology Overview
    Primary Storage
    Secondary Storage
  • Networks and Transport Technologies
    IP Storage
  • Current High Availability Implementations
    Optical Networking
    Fibre Channel Extensions
    Heterogeneous Combinations
  • Performance Considerations
  • Protection Architectures & Techniques
  • Developing, Designing & Implementing a High Availability Plan

Tutorial 23
Tiered Storage - No More Tears

As the amount of storage escalates in a company, a tiered storage implementation becomes increasingly beneficial. Tiered storage represents a striking balance between how much a business is willing to pay for storage versus tradeoffs in access time and availability. The wide range of price per GB between enterprise class disk, low-cost SATA disk and automated tape have made tiered storage a critical initiative for many IT businesses in 2005. This tutorial will explain the concept and value of tiered storage, identify the steps to determine which type of data is best suited for each tier, and how to begin implementation.

Tutorial 24
Defining Disaster Recovery Policies and Procedures

Instructor: Charles Curtis, Senior Storage Engineer, Landata Systems  

Do you have a Contingency Audit Questionnaire? Is your Business Impact Analysis done? Surely you have completed your Dependency Analysis Worksheet, haven’t you?

This session will not only detail the requirements needed to create an effective Disaster Recovery Policy, but will teach you WHY you need to comply with ISO 17799 section 11 (which REQUIRES appropriate business continuity and disaster recovery planning). This session will cover the ABC’s of CAQ+BIA+DAW+DP!

Conference Adjourns

Go to Tuesday, June 7, 2005                                                                       Go to Wednesday, June 8, 2005