This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Weve watched in awe as the use of real-world generative AI has changed the tech landscape, and while we at the Architecture Blog happily participated, we also made every effort to stay true to our channels original scope, and your readership this last year has proven that decision was the right one. Well, its been another historic year!
How to Set Up a Secure Isolated Recovery Environment (SIRE) by Pure Storage Blog If youve suffered a breach, outage, or attack, theres one thing you should have completed and ready to go: a secure isolated recovery environment (SIRE). I cover that in my blog post on why air gaps give a false sense of security. Its all about speed.
With enterprise organizations feeling the pressure to deploy applications faster and more frequently, it’s no surprise that demand for application developers is reaching an all-time high. But what exactly does an application developer do? Get the Buyer’s Guide Get the Buyer’s Guide --> What is an application developer?
Building a multi-Region application requires lots of preparation and work. In this 3-part blog series, we’ll explore AWS services with features to assist you in building multi-Region applications. Finally, in Part 3, we’ll look at the application and management layers. Considerations before getting started.
Optimize GenAI Applications with Retrieval-augmented Generation from Pure Storage and NVIDIA by Pure Storage Blog Generative AI (GenAI) is one of the fastest-adopted technologies in history. The post Optimize GenAI Applications with Retrieval-augmented Generation from Pure Storage and NVIDIA appeared first on Pure Storage Blog.
Hear first hand expert insights from Eric on his Podcast , Blog & EricHoldeman.com. Hear first hand expert insights from Eric on his Podcast , Blog & EricHoldeman.com. The need to achieve communications interoperability has haunted public agencies for years.
How a Data Platform Can Unlock Silos to Accelerate AI Pipelines by Pure Storage Blog Summary To unlock the full potential of AI, you’ll need to unify data silos and establish efficient data operations. Storage plays a crucial role in how data is ingested, processed, and used to create accurate, relevant responses in AI-powered applications.
Simplify Enterprise AI with Pure Storage, Certified Storage for NVIDIA DGX SuperPOD by Pure Storage Blog Summary Pure Storage FlashBlade is now a certified storage solution for NVIDIA DGX SuperPOD. Future blogs will dive into this new set of solutions in much more detail.
Pure Storage Partners with CERN openlab to Evaluate the Benefits of Flash for Scientific Research by Pure Storage Blog Summary Pure Storage and CERN openlab are working together to research how the European Laboratory for Particle Physics will use flash storage to support future research needs.
VMware Then and Now: How Virtualization Is Evolving by Pure Storage Blog Summary The virtualization world is undergoing some changes. Early adopters started by virtualizing low-risk applications, keeping critical workloads on bare metal servers. Finally, there’s the next generation of VMware vSphere Virtual Volumes (vVols).
How Pure Protect //DRaaS Shields Your Business from Natural Disasters by Pure Storage Blog Summary Pure Protect //DRaaS shields your business from the rising threat of natural disasters. Identify key systems: Prioritize the most critical data and applications for replication.
Let’s Read between the Lines with Vendor DRR Guarantees by Pure Storage Blog Summary While DRR guarantees may seem like a good deal, it’s important to look closer and test a vendor’s storage efficiency technologies against your actual applications, data, and workflows. Are you encrypting on the application side?
The position of a Chief Information Security Officer (CISO) can take a variety of job tasks and responsibilities depending on the size, hierarchy, industry vertical and compliance regulations applicable to the organization. What are the responsibilities of a CISO?
Leveraging Large Language Models for STRIDE Threat ModelingA Scalable and Modular Approach to Secure PoCs and Agile Projects by Pure Storage Blog Summary The security of PoCs and MVPs is often an afterthought, leaving them vulnerable to threats. Draft a new article: If no article exists, a new one is created based on the solution provided.
The Crucial Role of Data Forensics in Post-cyberattack Recovery by Pure Storage Blog Summary After a cyberattack, data forensics plays an important part in not only enabling you to dig deeper into what happened but also helping prevent being attacked again. Imagine coming home to find someone has broken into your house.
Example Corp has multiple applications with varying criticality, and each of their applications have different needs in terms of resiliency, complexity, and cost. The P1 pattern uses a Multi-AZ architecture where applications operate in multiple AZs within a single AWS Region. P3 – Application portfolio distribution.
The Opportunity: Modern Data Storage and Cyber Resilience for Modern Unstructured Data Needs Todays applications need real-time file services that can dynamically adapt to data storage needs.
How to Deploy a VM Analytics Collector with IPv6 IP Protocol and Static Networking by Pure Storage Blog VM Analytics has been a beloved feature of Pure1 ® Manage; however, historically, it has only worked with IPv4 IP protocol. Notice that you can only select to install VM Analytics Collector as the application running on an IPv6 OVA.
My guest is Steve Crimando, the founder and principal of Behavioral Science Applications LLC, and the director of the Homeland Security Human Factors Institute. Hear first hand expert insights from Eric on his Podcast , Blog & EricHoldeman.com.
While he provides a more detailed explanation of the Washington State and Pierce County Emergency Medical System (EMS) much of what he shares here is applicable in many ways to communities around the United States, although, there are likely many different variables from one state or community to others. Everyone should get CPR training!
It is a very positive application of the technology. Hear first hand expert insights from Eric on his Podcast , Blog & EricHoldeman.com. It is a very positive application of the technology. Hear first hand expert insights from Eric on his Podcast , Blog & EricHoldeman.com.
You can use these fault boundaries to build multi-Region applications that consist of independent, fault-isolated replicas in each Region that limit shared fate scenarios. However, applications typically don’t operate in isolation; consider both the components you will use and their dependencies as part of your failover strategy.
Why Storage Is the Unsung Hero for AI by Pure Storage Blog Summary Storage is the backbone of AI, but as model complexity and data intensity increase, traditional storage systems cant keep pace. Real-time applications, such as autonomous driving, require low-latency storage capable of processing incoming data instantly.
Visit Pure Storage and Explore AI at NVIDIA GTC 2024 by Pure Storage Blog In just a few weeks, AI thought leaders, tech industry heavyweights, and business leaders will gather in San Jose, California, from March 18-21 for the first in-person NVIDIA GTC conference in five years.
How We Built the Threat Model Mentor GPT: Democratizing Cybersecurity Expertise by Pure Storage Blog Summary Threat Model Mentor GPT is an AI-powered tool created by Pure Storage that automates threat modeling and democratizes cybersecurity expertise. OWASP: A treasure trove of best practices for application security.
How energy storage using batteries is a good choice for a number of applications, be it for a home, business or a utility. Hear first hand expert insights from Eric on his Podcast , Blog & EricHoldeman.com. How energy storage using batteries is a good choice for a number of applications, be it for a home, business or a utility.
In the podcast we examine the status of drone technology and the applications that can be explored via different payloads that are carried by drones. Hear first hand expert insights from Eric on his Podcast , Blog & EricHoldeman.com. Hear first hand expert insights from Eric on his Podcast , Blog & EricHoldeman.com.
This is all enabled by our built-from-the-ground-up approach to delivering multi-dimensional performance and multi-protocol support with software and hardware designed around development principles for modern applications. Many of these applications require fast file and fast object storage—and the demand will continue to increase.
A majority of this data is on hard disk,” Giancarlo says, “and hard disk systems just barely have the performance necessary for whatever applications they support. It’s largely hidden behind applications. To copy it, you have to do it through the application,” such as ERP platforms. It’s not a first-class citizen.
– A History of Containers and Kubernetes by Pure Storage Blog In Part 2 of our four-part Portworx series, we look at how containerization and Kubernetes came about and how that changed the way application and developer teams consume infrastructure. The post Part 2: The Helmsman Arrives!
New Pure1 Mobile App Features Enhance Security and Storage Optimization by Pure Storage Blog Introducing the latest evolution of the Pure1 ® Mobile Application! Update your Pure1 Mobile Application today and experience these exciting new features firsthand. Figure 4: Biometric authentication. Figure 5: New “More” menu.
35% Better Performance than iSCSI for Demanding Workloads NVMe/TCP gets around the bottlenecks that made iSCSI less than ideal for performance intensive applications, and unlike iSCSI, NVMe protocol was designed for flash media instead of spinning media. Read our detailed how-to blog for self-service upgrades in Pure1.
ZTNA vs. VPN by Pure Storage Blog Summary As data breaches become more common, organizations need a better way to protect their data. Now they need to access data using an internal business application. application username and password) to authenticate into the software and access data.
Avoid Tricks and Treat Yourself to Energy-efficient Storage by Pure Storage Blog Summary While a storage system may appear to be an energy-efficient solution in a benchmark, the actual performance may differ when it’s scaled to meet the specific needs of a business.
Why It’s More Important Now Than Ever to Rightsize Your vSphere Deployment by Pure Storage Blog One constant that spans the entire timeline of my career has been the concept of “rightsizing” virtual machine (VM) workloads, and even deployments. I was trying to rightsize the workload for the resources I had.
Key Points in This Article: CIOs and IT administrators must ensure that their networks remain free and clear of outdated software applications, which can pose a tremendous security risk. Outdated applications can provide a backdoor for ransomware attacks, malware, and viruses. Why You Need to Retire Outdated Software Applications.
by Pure Storage Blog Snapshots have become a de facto tool in managing and protecting data on primary storage. Organizations are taking advantage of automation to quickly test workflows, data, and applications. For example, let’s say you have a specific data set on an application volume. appeared first on Pure Storage Blog.
Announcing the Newly Redesigned Pure1 Mobile App by Pure Storage Blog Today, I’m thrilled to announce the general availability of the newly redesigned Pure1 ® Mobile Application. We initially introduced the Pure1 Mobile Application in October 2018, and since then, we’ve witnessed a rapid adoption rate among our customer base.
Business Continuity Solutions from Kyndryl and Portworx by Pure Storage by Pure Storage Blog This blog post is co-authored by Cyrus Niltchian, Director, Offering Management at Kyndryl, and Scott Dedman, AVP, Global Strategy & Solutions at Pure Storage. Check out the latest episodes of The Pure Report podcast!
This blog was originally published in 2014. Tier 1”) used for your typical mix of enterprise applications and physical and virtual servers, my experience is that finding a customer who needs even 100K IOPS is very rare. When you run a synthetic benchmark tool such as Iometer, the only application you’ll measure is Iometer.
If you think about it, each of the six pitfalls could apply to (or be solved by) your FlashStack ® database and application infrastructure overall. With more complex applications come more demanding SLAs and shrinking budgets and resources. Databases and enterprise applications require top performance and fail-proof resiliency.
Virtualized environments require large-scale and high-performance deployments and often comprise thousands of virtual machines (VMs) running a wide range of operating systems and applications. Improved availability: SAN storage is accessible through multiple paths and remains independent of the applications it supports.
Generative AI, RAG, and Data Infrastructure by Pure Storage Blog This blog on generative AI initially appeared on Medium. How do we build optimal data infrastructure for a RAG-powered generative AI application? It has been republished with the author’s credit and consent. Part of my job is to promote AI to people in IT.
Though we can’t exist everywhere at once, your business applications sure can. With Zerto’s one-to-many replication functionality, you can ensure consistent application uptime against any threat. One-to-many replication works by protecting application components (e.g., What is One-to-Many Replication?
We organize all of the trending information in your field so you don't have to. Join 25,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content