article thumbnail

Top Architecture Blog Posts of 2023

AWS Disaster Recovery

2023 was a rollercoaster year in tech, and we at the AWS Architecture Blog feel so fortunate to have shared in the excitement. As always, thanks to our readers and to the many talented and hardworking Solutions Architects and other contributors to our blog. Building endless aisle architecture for order processing Check it out!

article thumbnail

Introducing the Pure//Launch Blog

Pure Storage

Introducing the Pure//Launch Blog by Pure Storage Blog The Pure Storage data storage platform is the most innovative in the industry, constantly evolving to meet your data storage needs. This new reference architecture validation provides enterprises with more GPU server choices and de-risks AI initiatives, accelerating time to value.

Capacity 116
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Storage Architecture Spectrum: Why “Shared-nothing” Means Nothing

Pure Storage

The Storage Architecture Spectrum: Why “Shared-nothing” Means Nothing by Pure Storage Blog This blog on the storage architecture spectrum is Part 2 of a five-part series diving into the claims of new data storage platforms. And just as important, why there is more to any product or platform than just architecture.

article thumbnail

What is a Resiliency Architecture and How Do You Build One?

Pure Storage

What is a Resiliency Architecture and How Do You Build One? by Pure Storage Blog Meet “resiliency architectures”—a next-gen backup solution that gives organizations every chance to become more resilient in a rapidly evolving risk landscape. The post What is a Resiliency Architecture and How Do You Build One?

article thumbnail

What to know about zero trust architectures

Citrix

Zero trust architectures have gained rapid adoption by cybersecurity teams recently with the rise of knowledge workers moving to remote or hybrid work models. Related Stories How to implement zero trust security for your network How to create a zero trust network It’s time to stop using consumer browsers for work.

article thumbnail

What is Zero Trust Architecture?

Pure Storage

What is Zero Trust Architecture? Why Is Zero Trust Architecture So Important Today? How a Zero Trust Architecture Is Implemented A zero trust architecture (ZTA) is not a catchall in cybersecurity, but it is a vast improvement on traditional network security techniques. In today’s landscape, trust should never be assumed.

article thumbnail

Diving deep into Citrix zero trust architecture

Citrix

In my previous blog post , I discussed some of the observed challenges when implementing a zero trust architecture and how you can use Citrix technology to overcome them. In this post, I’ll dive deeper into the components that make … The post Diving deep into Citrix zero trust architecture first appeared on Citrix Blogs.