This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Weve watched in awe as the use of real-world generative AI has changed the tech landscape, and while we at the ArchitectureBlog happily participated, we also made every effort to stay true to our channels original scope, and your readership this last year has proven that decision was the right one. What a winning combo!
Pure Storage and Rubrik are expanding their partnership to offer a holistic and secure reference architecture that tackles the challenges of managing and securing unstructured data at scale. Unstructured data is highly susceptible to ransomware attacks due to its volume, critical nature, and often insufficient protection.
2023 was a rollercoaster year in tech, and we at the AWS ArchitectureBlog feel so fortunate to have shared in the excitement. As always, thanks to our readers and to the many talented and hardworking Solutions Architects and other contributors to our blog. Building endless aisle architecture for order processing Check it out!
Simplify Enterprise AI with Pure Storage, Certified Storage for NVIDIA DGX SuperPOD by Pure Storage Blog Summary Pure Storage FlashBlade is now a certified storage solution for NVIDIA DGX SuperPOD. Future blogs will dive into this new set of solutions in much more detail. All as-a-service.
Introducing the Pure//Launch Blog by Pure Storage Blog The Pure Storage data storage platform is the most innovative in the industry, constantly evolving to meet your data storage needs. This new reference architecture validation provides enterprises with more GPU server choices and de-risks AI initiatives, accelerating time to value.
The Storage Architecture Spectrum: Why “Shared-nothing” Means Nothing by Pure Storage Blog This blog on the storage architecture spectrum is Part 2 of a five-part series diving into the claims of new data storage platforms. And just as important, why there is more to any product or platform than just architecture.
What is a Resiliency Architecture and How Do You Build One? by Pure Storage Blog Meet “resiliency architectures”—a next-gen backup solution that gives organizations every chance to become more resilient in a rapidly evolving risk landscape. The post What is a Resiliency Architecture and How Do You Build One?
This blog post shows how to architect for disaster recovery (DR) , which is the process of preparing for and recovering from a disaster. For most examples in this blog post, we use a multi-Region approach to demonstrate DR strategies. Architecture of the DR strategies. Backup and restore DR architecture. Pilot light.
FlashBlade//EXA Has Arrived The Data Storage Platform to Transform Large-scale AI and HPC by Pure Storage Blog Summary FlashBlade//EXA is the newest member of the FlashBlade family. A blog we published last year offered insight into how service providers think and how automation and brutal standardization are critical to their operations.
Zero trust architectures have gained rapid adoption by cybersecurity teams recently with the rise of knowledge workers moving to remote or hybrid work models. Related Stories How to implement zero trust security for your network How to create a zero trust network It’s time to stop using consumer browsers for work.
FlashBlade//EXA: The Future of AI and HPC Storage Performance by Pure Storage Blog Summary Discover the power of FlashBlade//EXA, a purpose-built, advanced data storage platform designed to support the most demanding AI and HPC workloads. It leverages the powerful Purity engine to drive unheard-of data read/write speeds and file name space.
In my previous blog post , I discussed some of the observed challenges when implementing a zero trust architecture and how you can use Citrix technology to overcome them. In this post, I’ll dive deeper into the components that make … The post Diving deep into Citrix zero trust architecture first appeared on Citrix Blogs.
What is Zero Trust Architecture? Why Is Zero Trust Architecture So Important Today? How a Zero Trust Architecture Is Implemented A zero trust architecture (ZTA) is not a catchall in cybersecurity, but it is a vast improvement on traditional network security techniques. In today’s landscape, trust should never be assumed.
But in reality, there’s no telling how or when a malicious actor might … The post Zero trust architecture benefits for your business first appeared on Citrix Blogs. In a perfect world, you could turn a blind eye to your company network and safely trust that anyone trying to access it had the purest intentions.
To put the challenger banks’ development into perspective, Monzo … The post The role of IT architecture in a transformed banking experience first appeared on Citrix Blogs.
How to Achieve IT Agility: It’s All About Architecture by Pure Storage Blog In our conversations with business and IT leaders, one overarching theme comes up again and again: “How can your company help me achieve my tactical and strategic IT goals, without straining my budget and resources?”
Cybersecurity Awareness Month 2024: Doing Our Part to #SecureOurWorld by Pure Storage Blog The 20th Cybersecurity Awareness Month is upon us, and we’re taking the month to spotlight resources and insights to help you improve cyber resilience and build a culture of security. Learn more in “ Why Identity Is the New Network Perimeter.”
Why Storage Is the Unsung Hero for AI by Pure Storage Blog Summary Storage is the backbone of AI, but as model complexity and data intensity increase, traditional storage systems cant keep pace. In addition to checkpointing, emerging architectures like retrieval-augmented generation (RAG) present unique challenges for storage systems.
Firms designing for resilience on cloud often need to evaluate multiple factors before they can decide the most optimal architecture for their workloads. This will help you achieve varying levels of resiliency and make decisions about the most appropriate architecture for your needs. Looking for more architecture content?
The Overlooked Bottleneck in Data Visibilityand Its Impact on Cyber Resilience by Pure Storage Blog Summary Every second counts in cybersecurity. The Pure Storage architecture overcomes these limitations to provide true anomaly visibility. Organizations rely on security logs to help detect, respond to, and recover from cyber threats.
Leveraging Large Language Models for STRIDE Threat ModelingA Scalable and Modular Approach to Secure PoCs and Agile Projects by Pure Storage Blog Summary The security of PoCs and MVPs is often an afterthought, leaving them vulnerable to threats.
NetApp Is Livin’ La Vida Loca by Pure Storage Blog Summary While NetApp continues to sing the praises of legacy tech, Pure Storage has taken a fundamentally different approach with our DirectFlash Modules (DFMs), offering an engineered storage system designed for the modern data center. ” Better Science, Vol.
Why FlashStack Is Right for Your Customers by Pure Storage Blog This blog post on FlashStack is co-authored by Darren Williams, Director, Global Compute Storage Solutions at Cisco, and Mark Bridges, Sr. This full stack choice delivers increased density from its software-defined architecture. Is it security of the infrastructure?
Cybersecurity Month 2023: Doing Our Part to #SecureOurWorld by Pure Storage Blog The 20th Cybersecurity Awareness Month is upon us, and it’s the ideal time to build next-gen resilience into your critical infrastructure now while preparing for the cyber challenges of tomorrow. Is Your Enterprise IT Architecture Resilient and Ready?
Connected Cloud Architecture for EDA Workloads. To address these challenges, Pure Storage, Microsoft Azure, and Equinix have joined forces to develop a connected cloud architecture for EDA, HPC, and other highly parallel workloads, such as software build and testing. Director of EDA/HPC Solutions at Pure Storage.
Non Disruptive Upgrades: The Pure Storage Ship of Theseus by Pure Storage Blog Summary With FlashArray, upgrades can be done non-disruptively in just one to two hours, providing both technical and financial benefits to organizations. Figure 1: Nine years of NDUs across three Pure Storage platforms.
Boost Your Cybersecurity IQ on the Pure Storage Blog. Below is just a sample of the resources you can find on our blog , including practical tips, strategies, and discussion guides. Below is just a sample of the resources you can find on our blog , including practical tips, strategies, and discussion guides. Ransomware.
Bringing Data Strategies to Life with Expert Deployment by Pure Storage Blog Summary In the Deploy phase, the Pure Storage Advanced Services team helps organizations implement, integrate, and operationalize their data infrastructure. The journey to a modern, high-performance data platform doesnt end with strategic planning.
Prior to joining Echodyne, he built and led marketing and product marketing teams in the US and Europe for a broad range of companies, from technology startups to established brands, with an emphasis in carrier and large enterprise service delivery architectures.
by Pure Storage Blog Summary When reconsidering their VM strategies, many organizations might overlook the fact that legacy data storage could be making their VM problems worse. For example, legacy SAN/NAS architectures reliant on vendor-specific SCSI extensions or non-standardized NFSv3 implementations create hypervisor lock-in.
ZTNA vs. VPN by Pure Storage Blog Summary As data breaches become more common, organizations need a better way to protect their data. A zero trust network architecture (ZTNA) and a virtual private network (VPN) are two different solutions for user authentication and authorization. ZTNA requires additional account verification (e.g.,
Your Cyber Resilience Wish List for 2025and How to Achieve It by Pure Storage Blog Summary Mounting cybersecurity threats are putting IT teams under increased pressure. Watch the Webinar The post Your Cyber Resilience Wish List for 2025and How to Achieve It appeared first on Pure Storage Blog.
How Flash-native Architecture Changes the Game. Flash-native architecture eliminates bottlenecks and is designed to enable parallelism. Flash-native architecture also eliminates the use of serial protocols associated with using disk software to talk to solid-state disks (SSDs). Supporting Modern Workloads.
Kremlin leaders might consider instead seeking a stable European security architecture that protects Russia's interests while also allowing for a vibrant and sovereign Ukraine. Moscow has unveiled outlandish security demands which sound aggressive and suggest that it may underestimate both NATO and Ukraine.
This is due to the limited, rigid architecture legacy storage uses, which was never designed for upgradability—especially between storage generations. With traditional storage architectures, this painful cycle will repeat itself again and again. It’s the antithesis of the IT agility that organizations are actually looking for.
FlashBlade//S builds on the simplicity, reliability, and scalability of the original FlashBlade ® platform, with a unique modular and disaggregated architecture that enables organizations to unlock new levels of power, space, and performance efficiency using an all-QLC flash design. FlashBlade//S: A Solution for Tomorrow’s Challenges .
by Pure Storage Blog This is part one in a series about air gaps and resiliency architectures. Read part two: Without A Tiered Backup Architecture, Are You Truly Resilient? Thankfully, theres an arsenal of technologies and architecture paradigms to do just that. appeared first on Pure Storage Blog.
Beyond the Hype: The Truth behind the Marketing Claims of Many New Data Storage Platforms by Pure Storage Blog This is Part 1 of a five-part series diving into the claims of new data storage platforms. In the upcoming blogs in this series, we’ll get into many of the interesting areas in greater detail.
How We Built the Threat Model Mentor GPT: Democratizing Cybersecurity Expertise by Pure Storage Blog Summary Threat Model Mentor GPT is an AI-powered tool created by Pure Storage that automates threat modeling and democratizes cybersecurity expertise. OWASP: A treasure trove of best practices for application security.
Many AWS services have features to help you build and manage a multi-Region architecture, but identifying those capabilities across 200+ services can be overwhelming. In this 3-part blog series, we’ll explore AWS services with features to assist you in building multi-Region applications. Looking for more architecture content?
Experience Colossal Performance, Scalability, and Adaptability at GTC by Pure Storage Blog Summary NVIDIA GTC AI conference takes place in San Jose, California, March 17-21, 2025. Schedule it Now The post Experience Colossal Performance, Scalability, and Adaptability at GTC appeared first on Pure Storage Blog.
Meeting the Moment: Welcome to Our Revitalized Reseller Partner Program by Pure Storage Blog Summary Pure Storages ability to reach so many organizations worldwide is only possible through our partner ecosystem. Learn More The post Meeting the Moment: Welcome to Our Revitalized Reseller Partner Program appeared first on Pure Storage Blog.
Mitigate Security Risks with a Connected-Cloud Architecture. With a connected cloud architecture, businesses can mitigate security risks for IP and chip design data. The post Data Mobility for HPC and EDA Workloads from On-premises to Azure Cloud appeared first on Pure Storage Blog. Seamless Data Mobility.
3 New IT Certifications That Will Define the Future of Enterprise Data Management by Pure Storage Blog At Pure Storage, we do things differently. Discover Pure IT Certifications The post 3 New IT Certifications That Will Define the Future of Enterprise Data Management appeared first on Pure Storage Blog.
We organize all of the trending information in your field so you don't have to. Join 25,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content