article thumbnail

Application developer: Roles and responsibilities to become a successful developer

BMC

With enterprise organizations feeling the pressure to deploy applications faster and more frequently, it’s no surprise that demand for application developers is reaching an all-time high. But what exactly does an application developer do? Get the Buyer’s Guide Get the Buyer’s Guide --> What is an application developer?

article thumbnail

How an insurance company implements disaster recovery of 3-tier applications

AWS Disaster Recovery

In this post, we explore how one of our customers, a US-based insurance company, uses cloud-native services to implement the disaster recovery of 3-tier applications. At this insurance company, a relevant number of critical applications are 3-tier Java or.Net applications.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

What is Zero Trust Architecture?

Pure Storage

What is Zero Trust Architecture? Why Is Zero Trust Architecture So Important Today? How a Zero Trust Architecture Is Implemented A zero trust architecture (ZTA) is not a catchall in cybersecurity, but it is a vast improvement on traditional network security techniques. In today’s landscape, trust should never be assumed.

article thumbnail

Stateful vs. Stateless Applications: What’s the Difference?

Pure Storage

Stateful vs. Stateless Applications: What’s the Difference? by Pure Storage Blog “Stateful” and “stateless” describe what, if anything, an application records around processes, transactions, and/or interactions. Stateful applications retain data between sessions, stateless applications don’t. Money in, candy out.

article thumbnail

What is Zero Trust Architecture?

Pure Storage

What is Zero Trust Architecture? Why Is Zero Trust Architecture So Important Today? How a Zero Trust Architecture Is Implemented A zero trust architecture (ZTA) is not a catchall in cybersecurity, but it is a vast improvement on traditional network security techniques. In today’s landscape, trust should never be assumed.

article thumbnail

How to Achieve IT Agility: It’s All About Architecture

Pure Storage

How to Achieve IT Agility: It’s All About Architecture by Pure Storage Blog In our conversations with business and IT leaders, one overarching theme comes up again and again: “How can your company help me achieve my tactical and strategic IT goals, without straining my budget and resources?” The result is the antithesis of IT agility.

article thumbnail

Creating a Multi-Region Application with AWS Services – Part 2, Data and Replication

AWS Disaster Recovery

In Part 1 of this blog series, we looked at how to use AWS compute, networking, and security services to create a foundation for a multi-Region application. Data is at the center of many applications. For this reason, data consistency must be considered when building a multi-Region application.