article thumbnail

Top Architecture Blog Posts of 2023

AWS Disaster Recovery

2023 was a rollercoaster year in tech, and we at the AWS Architecture Blog feel so fortunate to have shared in the excitement. Building endless aisle architecture for order processing Check it out! #9: Warm standby with managed services Check it out! Reusable ETL framework architecture Check it out! #4: Figure 5. #5:

article thumbnail

Technical architecture: What IT does for a living

CIO Governance

Technical architecture is the sum and substance of what IT deploys to support the enterprise. As such, its management is a key IT practice. Which leads to the question, What constitutes good technical architecture? Or more foundationally, What constitutes technical architecture, whether good, bad, or indifferent?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Volunteers Wanted: Help SIA Develop New Architectural Graphics Standard

Security Industry Association

The Security Industry Association (SIA) Architectural Graphics Working Group invites interested volunteers to participate in the development of a fully updated version of the SIA AG-01 standard. Interested volunteers are encouraged to attend the meeting and join the Architectural Graphics Working Group.

article thumbnail

A beginner’s guide to implementing zero-trust architecture

Online Computers

This is why, regardless of the size of your business, you need to beef up your cybersecurity, and the best way to do so is to implement a zero-trust security architecture. What is zero-trust architecture? With zero-trust architecture, you never assume trust even within your network. Then trust our experts at Online Computers.

article thumbnail

U.S. Office of Management and Budget Introduces New Zero Trust Architecture Strategy

Security Industry Association

In a presidential response to reinforce federal defenses against threats to public safety, infrastructure and privacy, a new zero trust architecture (ZTA) strategy, requiring agencies to meet specific cybersecurity standards and objectives by the end of 2024, is being implemented. The post U.S.

article thumbnail

How to Achieve IT Agility: It’s All About Architecture

Pure Storage

How to Achieve IT Agility: It’s All About Architecture by Pure Storage Blog In our conversations with business and IT leaders, one overarching theme comes up again and again: “How can your company help me achieve my tactical and strategic IT goals, without straining my budget and resources?” The result is the antithesis of IT agility.

article thumbnail

What is Zero Trust Architecture?

Pure Storage

What is Zero Trust Architecture? Why Is Zero Trust Architecture So Important Today? How a Zero Trust Architecture Is Implemented A zero trust architecture (ZTA) is not a catchall in cybersecurity, but it is a vast improvement on traditional network security techniques. In today’s landscape, trust should never be assumed.