Remove Architecture Remove Authorization Remove Benchmark Remove Blog
article thumbnail

MPI Storage Benchmarks with Docker

Pure Storage

This article originally appeared on Medium.com and has been republished with permission from the author. Two common benchmarks used in HPC environments are IOR and mdtest , focusing on throughput and filesystem metadata respectively. These benchmarks are based on MPI for multi-computer processing. Software Challenges.

article thumbnail

How to Implement Threat Modeling in Your DevSecOps Process

Pure Storage

How to Implement Threat Modeling in Your DevSecOps Process by Pure Storage Blog This blog on threat modeling was co-authored by Dr. Ratinder Paul Singh Ahuja, CTO for Security and Networking, and Rajan Yadav , Director of Engineering, CNBU (Portworx), Pure Storage. What Are Authentication Bypass Attacks?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

5 Questions to Ask Your CISO

Pure Storage

Consider engaging in a discussion with the CISO about the benefits of tiered security architectures and “ data bunkers ,” which can help retain large amounts of data and make it available immediately. Only by running through all possible attack scenarios can the CISO and security team confidently benchmark the time to normal operations.

article thumbnail

Simplify Elastic Operations without Compromising Data Searchability Using FlashBlade

Pure Storage

This article originally appeared on Medium.com and is republished with permission from the author. The diagram below contrasts the traditional hot/warm node architecture based on direct-attached storage to the new hot/frozen disaggregated architecture. Scaling log analytics to petabyte scale is hard.