This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Weve watched in awe as the use of real-world generative AI has changed the tech landscape, and while we at the ArchitectureBlog happily participated, we also made every effort to stay true to our channels original scope, and your readership this last year has proven that decision was the right one. What a winning combo!
Pure Storage and Rubrik are expanding their partnership to offer a holistic and secure reference architecture that tackles the challenges of managing and securing unstructured data at scale. Unstructured data is highly susceptible to ransomware attacks due to its volume, critical nature, and often insufficient protection.
2023 was a rollercoaster year in tech, and we at the AWS ArchitectureBlog feel so fortunate to have shared in the excitement. As always, thanks to our readers and to the many talented and hardworking Solutions Architects and other contributors to our blog. Building endless aisle architecture for order processing Check it out!
Simplify Enterprise AI with Pure Storage, Certified Storage for NVIDIA DGX SuperPOD by Pure Storage Blog Summary Pure Storage FlashBlade is now a certified storage solution for NVIDIA DGX SuperPOD. Future blogs will dive into this new set of solutions in much more detail. All as-a-service.
Introducing the Pure//Launch Blog by Pure Storage Blog The Pure Storage data storage platform is the most innovative in the industry, constantly evolving to meet your data storage needs. This new reference architecture validation provides enterprises with more GPU server choices and de-risks AI initiatives, accelerating time to value.
The Storage Architecture Spectrum: Why “Shared-nothing” Means Nothing by Pure Storage Blog This blog on the storage architecture spectrum is Part 2 of a five-part series diving into the claims of new data storage platforms. And just as important, why there is more to any product or platform than just architecture.
What is a Resiliency Architecture and How Do You Build One? by Pure Storage Blog Meet “resiliency architectures”—a next-gen backup solution that gives organizations every chance to become more resilient in a rapidly evolving risk landscape. The post What is a Resiliency Architecture and How Do You Build One?
This blog post shows how to architect for disaster recovery (DR) , which is the process of preparing for and recovering from a disaster. For most examples in this blog post, we use a multi-Region approach to demonstrate DR strategies. Architecture of the DR strategies. Backup and restore DR architecture. Pilot light.
FlashBlade//EXA Has Arrived The Data Storage Platform to Transform Large-scale AI and HPC by Pure Storage Blog Summary FlashBlade//EXA is the newest member of the FlashBlade family. A blog we published last year offered insight into how service providers think and how automation and brutal standardization are critical to their operations.
Zero trust architectures have gained rapid adoption by cybersecurity teams recently with the rise of knowledge workers moving to remote or hybrid work models. Related Stories How to implement zero trust security for your network How to create a zero trust network It’s time to stop using consumer browsers for work.
What is Zero Trust Architecture? Why Is Zero Trust Architecture So Important Today? How a Zero Trust Architecture Is Implemented A zero trust architecture (ZTA) is not a catchall in cybersecurity, but it is a vast improvement on traditional network security techniques. In today’s landscape, trust should never be assumed.
FlashBlade//EXA: The Future of AI and HPC Storage Performance by Pure Storage Blog Summary Discover the power of FlashBlade//EXA, a purpose-built, advanced data storage platform designed to support the most demanding AI and HPC workloads. It leverages the powerful Purity engine to drive unheard-of data read/write speeds and file name space.
In my previous blog post , I discussed some of the observed challenges when implementing a zero trust architecture and how you can use Citrix technology to overcome them. In this post, I’ll dive deeper into the components that make … The post Diving deep into Citrix zero trust architecture first appeared on Citrix Blogs.
To put the challenger banks’ development into perspective, Monzo … The post The role of IT architecture in a transformed banking experience first appeared on Citrix Blogs.
The Overlooked Bottleneck in Data Visibilityand Its Impact on Cyber Resilience by Pure Storage Blog Summary Every second counts in cybersecurity. The Pure Storage architecture overcomes these limitations to provide true anomaly visibility. Organizations rely on security logs to help detect, respond to, and recover from cyber threats.
How to Achieve IT Agility: It’s All About Architecture by Pure Storage Blog In our conversations with business and IT leaders, one overarching theme comes up again and again: “How can your company help me achieve my tactical and strategic IT goals, without straining my budget and resources?”
Cybersecurity Awareness Month 2024: Doing Our Part to #SecureOurWorld by Pure Storage Blog The 20th Cybersecurity Awareness Month is upon us, and we’re taking the month to spotlight resources and insights to help you improve cyber resilience and build a culture of security. Learn more in “ Why Identity Is the New Network Perimeter.”
Why Storage Is the Unsung Hero for AI by Pure Storage Blog Summary Storage is the backbone of AI, but as model complexity and data intensity increase, traditional storage systems cant keep pace. In addition to checkpointing, emerging architectures like retrieval-augmented generation (RAG) present unique challenges for storage systems.
Firms designing for resilience on cloud often need to evaluate multiple factors before they can decide the most optimal architecture for their workloads. This will help you achieve varying levels of resiliency and make decisions about the most appropriate architecture for your needs. Looking for more architecture content?
Leveraging Large Language Models for STRIDE Threat ModelingA Scalable and Modular Approach to Secure PoCs and Agile Projects by Pure Storage Blog Summary The security of PoCs and MVPs is often an afterthought, leaving them vulnerable to threats.
Why FlashStack Is Right for Your Customers by Pure Storage Blog This blog post on FlashStack is co-authored by Darren Williams, Director, Global Compute Storage Solutions at Cisco, and Mark Bridges, Sr. This full stack choice delivers increased density from its software-defined architecture. Is it security of the infrastructure?
Cybersecurity Month 2023: Doing Our Part to #SecureOurWorld by Pure Storage Blog The 20th Cybersecurity Awareness Month is upon us, and it’s the ideal time to build next-gen resilience into your critical infrastructure now while preparing for the cyber challenges of tomorrow. Is Your Enterprise IT Architecture Resilient and Ready?
Connected Cloud Architecture for EDA Workloads. To address these challenges, Pure Storage, Microsoft Azure, and Equinix have joined forces to develop a connected cloud architecture for EDA, HPC, and other highly parallel workloads, such as software build and testing. Director of EDA/HPC Solutions at Pure Storage.
Non Disruptive Upgrades: The Pure Storage Ship of Theseus by Pure Storage Blog Summary With FlashArray, upgrades can be done non-disruptively in just one to two hours, providing both technical and financial benefits to organizations. Figure 1: Nine years of NDUs across three Pure Storage platforms.
Boost Your Cybersecurity IQ on the Pure Storage Blog. Below is just a sample of the resources you can find on our blog , including practical tips, strategies, and discussion guides. Below is just a sample of the resources you can find on our blog , including practical tips, strategies, and discussion guides. Ransomware.
Prior to joining Echodyne, he built and led marketing and product marketing teams in the US and Europe for a broad range of companies, from technology startups to established brands, with an emphasis in carrier and large enterprise service delivery architectures.
by Pure Storage Blog Summary When reconsidering their VM strategies, many organizations might overlook the fact that legacy data storage could be making their VM problems worse. For example, legacy SAN/NAS architectures reliant on vendor-specific SCSI extensions or non-standardized NFSv3 implementations create hypervisor lock-in.
ZTNA vs. VPN by Pure Storage Blog Summary As data breaches become more common, organizations need a better way to protect their data. A zero trust network architecture (ZTNA) and a virtual private network (VPN) are two different solutions for user authentication and authorization. ZTNA requires additional account verification (e.g.,
How Flash-native Architecture Changes the Game. Flash-native architecture eliminates bottlenecks and is designed to enable parallelism. Flash-native architecture also eliminates the use of serial protocols associated with using disk software to talk to solid-state disks (SSDs). Supporting Modern Workloads.
Kremlin leaders might consider instead seeking a stable European security architecture that protects Russia's interests while also allowing for a vibrant and sovereign Ukraine. Moscow has unveiled outlandish security demands which sound aggressive and suggest that it may underestimate both NATO and Ukraine.
This is due to the limited, rigid architecture legacy storage uses, which was never designed for upgradability—especially between storage generations. With traditional storage architectures, this painful cycle will repeat itself again and again. It’s the antithesis of the IT agility that organizations are actually looking for.
FlashBlade//S builds on the simplicity, reliability, and scalability of the original FlashBlade ® platform, with a unique modular and disaggregated architecture that enables organizations to unlock new levels of power, space, and performance efficiency using an all-QLC flash design. FlashBlade//S: A Solution for Tomorrow’s Challenges .
by Pure Storage Blog This is part one in a series about air gaps and resiliency architectures. Read part two: Without A Tiered Backup Architecture, Are You Truly Resilient? Thankfully, theres an arsenal of technologies and architecture paradigms to do just that. appeared first on Pure Storage Blog.
Beyond the Hype: The Truth behind the Marketing Claims of Many New Data Storage Platforms by Pure Storage Blog This is Part 1 of a five-part series diving into the claims of new data storage platforms. In the upcoming blogs in this series, we’ll get into many of the interesting areas in greater detail.
How We Built the Threat Model Mentor GPT: Democratizing Cybersecurity Expertise by Pure Storage Blog Summary Threat Model Mentor GPT is an AI-powered tool created by Pure Storage that automates threat modeling and democratizes cybersecurity expertise. OWASP: A treasure trove of best practices for application security.
Many AWS services have features to help you build and manage a multi-Region architecture, but identifying those capabilities across 200+ services can be overwhelming. In this 3-part blog series, we’ll explore AWS services with features to assist you in building multi-Region applications. Looking for more architecture content?
Experience Colossal Performance, Scalability, and Adaptability at GTC by Pure Storage Blog Summary NVIDIA GTC AI conference takes place in San Jose, California, March 17-21, 2025. Schedule it Now The post Experience Colossal Performance, Scalability, and Adaptability at GTC appeared first on Pure Storage Blog.
Meeting the Moment: Welcome to Our Revitalized Reseller Partner Program by Pure Storage Blog Summary Pure Storages ability to reach so many organizations worldwide is only possible through our partner ecosystem. Learn More The post Meeting the Moment: Welcome to Our Revitalized Reseller Partner Program appeared first on Pure Storage Blog.
Mitigate Security Risks with a Connected-Cloud Architecture. With a connected cloud architecture, businesses can mitigate security risks for IP and chip design data. The post Data Mobility for HPC and EDA Workloads from On-premises to Azure Cloud appeared first on Pure Storage Blog. Seamless Data Mobility.
3 New IT Certifications That Will Define the Future of Enterprise Data Management by Pure Storage Blog At Pure Storage, we do things differently. Discover Pure IT Certifications The post 3 New IT Certifications That Will Define the Future of Enterprise Data Management appeared first on Pure Storage Blog.
We continue to disrupt the file and object storage market by building for what’s actually needed by customers today with a future-proofed architecture- instead of making incremental improvements to what already exists. FlashBlade is the perfect example of this commitment. Gartner and Magic Quadrant are registered trademarks of Gartner, Inc.
For Healthcare IT Challenges, Storage Subscriptions Could Be the Cure by Pure Storage Blog This year’s Gartner IT Symposium/Xpo theme of “Unleash Possibility” was fitting as all of us in IT collectively rebound from an intense few years and recalibrate for what’s next.
Architecture overview. In our architecture, we use CloudWatch alarms to automate notifications of changes in health status. Please check out the Creating Disaster Recovery Mechanisms Using Amazon Route 53 blog post for additional DR mechanisms using Amazon Route 53. Looking for more architecture content? ElastiCache.
In Part 1 of this blog series, we looked at how to use AWS compute, networking, and security services to create a foundation for a multi-Region application. It can even be used to sync on-premises files stored on NFS, SMB, HDFS, and self-managed object storage to AWS for hybrid architectures. Purpose-built global database architecture.
We organize all of the trending information in your field so you don't have to. Join 25,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content