Remove 2022 Remove Architecture Remove Blog Remove Security
article thumbnail

Top Architecture Blog Posts of 2023

AWS Disaster Recovery

2023 was a rollercoaster year in tech, and we at the AWS Architecture Blog feel so fortunate to have shared in the excitement. As always, thanks to our readers and to the many talented and hardworking Solutions Architects and other contributors to our blog. Building endless aisle architecture for order processing Check it out!

article thumbnail

Introducing Citrix on Azure enterprise-scale reference architecture

Citrix

Back in 2020 and 2021, I created a blog series that aligned Citrix design methodologies to the Microsoft Cloud Adoption Framework.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Dual Nature of Microsoft SQL Server 2022

Pure Storage

This week at PASS Data Community Summit 2022, the largest in-person data conference in the world, Microsoft announced the release candidate (RC) of Microsoft SQL Server 2022. In this version, improvements enable direct connections using Simple Storage Service (S3) from SQL Server 2022. Decrease time to insights for analytics.

Backup 98
article thumbnail

Empower Data for the Anywhere Business with Pure Storage at Gartner® IOCS 2022

Pure Storage

That means the data underlying these offerings must be agile, accessible, secure, and always online–without exception. . How can an organization better prepare for ongoing ransomware attacks and security breaches? . Join Pure Storage at Gartner IOCS 2022 in Las Vegas . Reduce risk with future-ready innovation.

article thumbnail

Helping Healthcare Organizations Stay Agile and Protect Data

Pure Storage

Helping Healthcare Organizations Stay Agile and Protect Data by Pure Storage Blog Imagine that your healthcare business pays $22 million in cryptocurrency to cybercriminals to recover data and systems encrypted in a ransomware attack that targeted a subsidiary, causing massive disruption across the industry.

article thumbnail

ISC East Session Preview: Securing IIoT Using Zero Trust — The Future of IIoT Cybersecurity

Security Industry Association

ISC East 2022 is coming up Nov. Among the robust lineup of conference sessions is the presentation Securing IIoT Using Zero Trust – The Future of IIoT Cybersecurity. In this blog, Knehr provides expert insights on this critical topic and gives a sneak peek of what to expect during this session. Join us Thursday, Nov.

article thumbnail

Cloud Data Security Challenges, Part 3: Getting Control

Pure Storage

According to Cybersecurity Insiders’ 2022 Cloud Security Report : . Nearly half (47%) of organizations cite “loss of visibility and control” as one of their biggest challenges around securing multi-cloud environments. . In part 2 of our three-part cloud data security blog series, we discussed the issue of complexity.