This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
2023 was a rollercoaster year in tech, and we at the AWS ArchitectureBlog feel so fortunate to have shared in the excitement. As always, thanks to our readers and to the many talented and hardworking Solutions Architects and other contributors to our blog. Building endless aisle architecture for order processing Check it out!
The Storage Architecture Spectrum: Why “Shared-nothing” Means Nothing by Pure Storage Blog This blog on the storage architecture spectrum is Part 2 of a five-part series diving into the claims of new data storage platforms. And just as important, why there is more to any product or platform than just architecture.
This blog post shows how to architect for disaster recovery (DR) , which is the process of preparing for and recovering from a disaster. For most examples in this blog post, we use a multi-Region approach to demonstrate DR strategies. Active/passive and active/active DR strategies. Backup and restore.
In my first blog post of this series , I introduced you to four strategies for disaster recovery (DR). My subsequent posts shared details on the backup and restore , pilot light, and warm standby active/passive strategies. DR strategies: Multi-site active/active. Implementing multi-site active/active.
What is Zero Trust Architecture? Why Is Zero Trust Architecture So Important Today? How a Zero Trust Architecture Is Implemented A zero trust architecture (ZTA) is not a catchall in cybersecurity, but it is a vast improvement on traditional network security techniques. In today’s landscape, trust should never be assumed.
The Overlooked Bottleneck in Data Visibilityand Its Impact on Cyber Resilience by Pure Storage Blog Summary Every second counts in cybersecurity. They’re used to track system activity to detect anomalies, contain threats, and serve as crucial forensic evidence. Security guards intervene before the theft happens.
Firms designing for resilience on cloud often need to evaluate multiple factors before they can decide the most optimal architecture for their workloads. This will help you achieve varying levels of resiliency and make decisions about the most appropriate architecture for your needs. P5 – Multi-Region active-active.
The post also introduces a multi-site active/passive approach. The multi-site active/passive approach is best for customers who have business-critical workloads with higher availability requirements over other active/passive environments. You would just need to create the records and specify failover for the routing policy.
In a previous blog post , I introduced you to four strategies for disaster recovery (DR) on AWS. In Figure 5, we show a possible architecture for detecting and responding to events that impact your workload availability. For example, instead of a Lambda function, the data restore event might activate a runbook on Systems Manager.
Non Disruptive Upgrades: The Pure Storage Ship of Theseus by Pure Storage Blog Summary With FlashArray, upgrades can be done non-disruptively in just one to two hours, providing both technical and financial benefits to organizations. Run some commands to fail the active older controller to the new one. We call it a “Reverse Headstand.”
In this blog post, we share a reference architecture that uses a multi-Region active/passive strategy to implement a hot standby strategy for disaster recovery (DR). With the multi-Region active/passive strategy, your workloads operate in primary and secondary Regions with full capacity. DR strategies. Conclusion.
How to Achieve IT Agility: It’s All About Architecture by Pure Storage Blog In our conversations with business and IT leaders, one overarching theme comes up again and again: “How can your company help me achieve my tactical and strategic IT goals, without straining my budget and resources?”
What is Zero Trust Architecture? Why Is Zero Trust Architecture So Important Today? How a Zero Trust Architecture Is Implemented A zero trust architecture (ZTA) is not a catchall in cybersecurity, but it is a vast improvement on traditional network security techniques. In today’s landscape, trust should never be assumed.
In Part I of this two-part blog , we outlined best practices to consider when building resilient applications in hybrid on-premises/cloud environments. In Part II, we’ll provide technical considerations related to architecture and patterns for resilience in AWS Cloud. Considerations on architecture and patterns. Data storage.
ZTNA vs. VPN by Pure Storage Blog Summary As data breaches become more common, organizations need a better way to protect their data. A zero trust network architecture (ZTNA) and a virtual private network (VPN) are two different solutions for user authentication and authorization. ZTNA requires additional account verification (e.g.,
Compliance, Confidence, and Cyber Resilience: Unlocking the Power of Pure Storage and Superna by Pure Storage Blog Summary Superna and Pure Storage have teamed up to deliver a joint solution that enables enterprises to detect and respond to threats at the data layer, providing a new level of cyber resilience.
In this blog post, you will learn about two more active/passive strategies that enable your workload to recover from disaster events such as natural disasters, technical failures, or human actions. These are both active/passive strategies (see the “Active/passive and active/active DR strategies” section in my previous post).
Many AWS services have features to help you build and manage a multi-Region architecture, but identifying those capabilities across 200+ services can be overwhelming. In this 3-part blog series, we’ll explore AWS services with features to assist you in building multi-Region applications. AWS CloudTrail logs user activity and API usage.
In Part 1 of this blog series, we looked at how to use AWS compute, networking, and security services to create a foundation for a multi-Region application. It can even be used to sync on-premises files stored on NFS, SMB, HDFS, and self-managed object storage to AWS for hybrid architectures. Purpose-built global database architecture.
Pure Storage Architecture 101: Built-in Performance and Availability by Pure Storage Blog The world of technology has changed dramatically as IT organizations now face, more than ever, intense scrutiny on how they deliver technology services to the business. Going entirely active/passive wasn’t the route we wanted to take either.
Architecture overview. In our architecture, we use CloudWatch alarms to automate notifications of changes in health status. Please check out the Creating Disaster Recovery Mechanisms Using Amazon Route 53 blog post for additional DR mechanisms using Amazon Route 53. Looking for more architecture content? ElastiCache.
For more on the history of S3 and how this feature came about, check out my previous blog post. SQL Server 2022 is the most dynamic version Microsoft has ever released, developing and elevating features that take us to a true hybrid architecture. Learn how to: Expand your edge to cloud architecture. Reduce backup times.
Pure Simplifies and Accelerates AI Success with AIRI Built on NVIDIA DGX BasePOD by Pure Storage Blog The deployment of AI is a major challenge with many different choices when it comes to technology and infrastructure. FlashBlade//S easily integrates with the DGX BasePOD architecture and lowers overall storage fabric management overhead.
Tips for Securing Your Data by Pure Storage Blog Summary Cyber extortion is a type of cybercrime thats surging. Continuously monitor system logs to detect unusual activity, such as failed login attempts or unauthorized data transfers. Activate the incident response plan (IRP) Having a pre-established incident response plan is critical.
The malware infects or deletes Active Directory. . Active Directory (AD) is a top target for attackers because it forms the foundation of most organizations’ accounts and data assets. To head off any issues with backup malfunctions, some enterprises are moving to more resilient snapshot-based architectures for recovery.
Using a smart software architecture, elPrep delivers remarkable performance on workflows, running a whole-genome sequencing sample in less than six hours. In particular, using elPrep and FlashBlade together eliminated the need for manual, time-consuming, data-staging activities (See Figure 1). What Is imec elPrep and Why Is It So Fast?
Bogus Statements) by Pure Storage Blog (For the purposes of this post, “B.S.” Item #3: “ Active/Active Controller Architecture”¹⁴ Is a Good Thing We see this B.S. Each controller is “active,” however, volumes (LUNs) are owned by a particular single controller. Uncovering Dell EMC’s PowerStore B.S.
Pure Cloud Block Store Now Available for Microsoft Azure VMware Solution by Pure Storage Blog Let’s think in terms of outcomes. To maximize ROI and minimize disruption to business, a cloud migration approach that preserves application architecture with a consumption-based pricing model is the ideal approach.
These are backup and restore, active/passive (pilot light or warm standby), or active/active. This architecture enables customers facing challenges of cost overhead with redundant Session Initiation Protocol (SIP) trunks for the DC and DR sites. Solution architecture of DR on AWS for a third-party IVR solution.
The unique architecture enables us to upgrade any component in the stack without disruption. . Pure Cloud Block Store removes this limitation with an architecture that provides high availability. Controller 1 is actively using those resources while controller 2 is in a standby configuration.
World Backup Day: Four Data Protection Best Practices to Know by Pure Storage Blog This article originally appeared on SolutionsReview.com. Implementing a multi-tier data protection and resiliency architecture is an excellent way to build resilience and durability into a recovery strategy. But how do you achieve it?
The Threat of AI-powered Ransomware Attacks by Pure Storage Blog Alongside its many benefits, AI has also empowered malicious actors to launch increasingly sophisticated cyberattacks, with ransomware emerging as a particularly potent threat. In a previous blog , we dispelled some myths about air gaps.
How Banks Benefit from the New Digital Operational Resilience Act by Pure Storage Blog We’ve all seen how ransomware can bring businesses, local governments, and other organizations to their knees. Promptly detect anomalous activities. They must have a plan, ready for execution, in a “day after attack” situation.
Jointly architectured by two of the industry’s most trusted companies, FlashRecover//S is designed specifically to deliver a powerful yet easy-to-use solution with multiple levels of built-in ransomware protection that can provide petabyte-scale recovery of data in just hours. .
It employs a zero-trust architecture and hardened Linux virtual appliances that follow the principles of least privilege. Section 404 – Anomaly Detection & Intelligent Insights at the Ready for Audits The Zerto Cyber Resilience Vault provides a secure audit trail by logging all activity inside the vault to keep a record.
Fortifying Cyber Resilience: The Power of Defense-in-Depth from Pure Storage and Rubrik by Pure Storage Blog Summary Cyberattack vectors are evolving quickly and constantly. A new comprehensive reference architecture from Pure Storage and Rubrik provides a multi-layered approach that strengthens cyber resilience.
In this blog post, we’ll dive into the benefits for databases (we used MySQL in our test) when using AWS Outposts with FlashArray. AWS Outposts with FlashArray Deployment Architecture . The post Improve Open Source Database Operations with AWS Outposts by 4x appeared first on Pure Storage Blog.
This allows you to build multi-Region applications and leverage a spectrum of approaches from backup and restore to pilot light to active/active to implement your multi-Region architecture. Conclusion This blog post has looked at four different high-level approaches for creating an organizational multi-Region failover strategy.
Most solutions aren’t innovative enough to support the advanced data activities required for business transformation. Simplicity isn’t a feature, it’s an architecture. The post Uncomplicate Data Storage, Forever appeared first on Pure Storage Blog. It’s uninspiring. Data Storage Architected for Innovators. Evergreen by Nature.
When designing a Disaster Recovery plan, one of the main questions we are asked is how Microsoft Active Directory will be handled during a test or failover scenario. Overview of architecture. In the following architecture, we show how you can protect domain-joined workloads in the case of a disaster. Prerequisites.
Software-defined storage (SDS), a storage architecture that decouples storage software from its hardware, enabling greater scalability, flexibility, and control over your data storage infrastructure. That means embracing the tools that give people their time back—STaaS, SDS, and hybrid cloud architectures—and equipping our people to use them.
KDDI is also leveraging technology to power sustainable growth and aims to achieve net-zero CO2 emissions in its business activities by 2030. Pure Storage is one of the foundations for KDDI’s sustainable data architecture. Winner for Asia Pacific appeared first on Pure Storage Blog.
VDI deployment needs to be done on an architecture that is simple and can scale and integrate. You get the latest in compute, network, and storage components in a single integrated architecture that accelerates time to deployment, lowers overall IT costs, and reduces deployment risk. . Cache Assignment. Storage Pools. Front-end Ports.
An AI Data Platform for All Seasons by Pure Storage Blog They (some wise anonymous folks out there) say that there is a time and place for everything. As a consequence of these activities, RAG provides the bespoke use case-specific context to an organization’s proprietary GenAI LLM applications.
We organize all of the trending information in your field so you don't have to. Join 25,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content