
Building and Securing Kubernetes Native Products: The Pure Storage Product Security Journey
Acquired by Pure Storage in October 2020, Portworx began its upgrade to an enterprise-grade...
Read PostAcquired by Pure Storage in October 2020, Portworx began its upgrade to an enterprise-grade...
Read PostWe evaluate changes and enhancements to our partner program annually to ensure we continue...
Read PostAvailable with Purity//FA 6.4.2, NVMe/TCP unlocks the full power of NVMe for Ethernet networks,...
Read PostTwo leaders in our partner sales organization, Wendy Stusrud and Mike Marinchak, have been...
Read PostBlockchains will create immense amounts of immutable data—and how that data is stored can...
Read PostWith such clear advantages to migrating to Kubernetes, join us as we look at...
Read PostThe telecom cloud has come a long way over the years. Here, we look...
Read PostSustainable IT solutions should address the four Cs of sustainability: cost, consumption models, containerisation,...
Read PostSeven new Pure Storage IT Professional Certifications will help IT professionals attain the broadest...
Read PostDocker images and Docker containers are closely related, but they’re not the same thing....
Read PostAs software takes the wheel, this leading vehicle manufacturer is building on its reputation...
Read PostIn a highly competitive market, one telecom embraces the cloud to scale quickly and...
Read PostVideo games have always been a testing ground and showcase for technology. We sat...
Read PostCustomers can use Pure1 to assess how to improve power efficiency by metering watts per unit of data on the array that can be read back. This works hand in hand with the energy efficiency SLA.Product Marketing Leader
Pure Storage has not only been named a 2022 CRN Annual Report Card (ARC)...
Read PostDockerfile and Docker Compose are both part of the Docker universe but are different...
Read PostWe’re in the third wave of IT agility, and it’s all about data. Businesses...
Read PostIn part 2 of our three-part cloud data security blog, we discussed the issue...
Read PostIn part 1 of our three-part cloud data security blog, we discussed the issue...
Read Post