logo
episode-header-image
Aug 12
33m 25s

15 Architectural Decisions Series: Contr...

Pure Storage
About this episode
Our series around Pure's fundamental design principles continues. Episode 3 discusses three key architectural decisions: stateless controllers, the second controller, and limited error paths. Hear from co-hosts JD Wallace and Andrew Miller about how stateless controllers mean no identity or state is stored within the controller itself, allowing for easy repl ... Show More
Up next
Aug 19
15 Architectural Decisions Series: Snapshots, Realistic Efficiency Metrics, and Adaptive RAID
Episode 4 of our series around Pure's fundamental design principles dives into aspects of Pure's technology that drive realistic efficiency for users. This episode tackles capabilities most Storage professionals are familiar with - snapshots, efficiency metrics and adaptive flexi ... Show More
34m 32s
Aug 5
15 Architectural Decisions Series: Flash and Data Reduction
Our series around Pure's fundamental design principles continues. Episode two of the series centers in on the choice to use exclusively Flash memory and how best to leverage it. Next, the team dives into innovations in a wide range of data reduction technologies and advantages fo ... Show More
37m 54s
Jul 29
15 Architectural Decisions Series: Simplicity and Scale
Pure Storage’s foundational approach to product engineering is guided by 15 architectural decisions that were established at the company’s inception and have shaped both the technical and user experience across its product lines. These architectural choices were not made arbitrar ... Show More
23m 25s
Recommended Episodes
Oct 2024
Balancing Security with Usability in Cybersecurity
In this episode of Threat Vector, host David Moulton talks with guest speaker Brian Wrozek, Forrester Principal Analyst in Security & Risk, about the complexities of aligning security strategies across global teams. Brian draws on his extensive experience in cybersecurity, operat ... Show More
41m 41s
Apr 2025
Cybersecurity Today: Virtual Employees, AI Security Agents, and CVE Program Updates
In this episode of 'Cybersecurity Today,' host Jim Love discusses various pressing topics in the realm of cybersecurity. Highlights include Anthropic's prediction on AI-powered virtual employees and their potential security risks, Microsoft’s introduction of AI security agents to ... Show More
7m 47s
Oct 2024
Navigating NIST CSF 2.0: Guide to Frameworks and Governance
In this episode, we sat down with Lukasz Gogolkiewicz, an Australia-based Cybersecurity Leader and former pentester, to explore his journey from offensive security into cybersecurity leadership. Lukasz, also a speaker coach at BlackHat USA, brings valuable insights into what it t ... Show More
36m 29s
Dec 2024
Cyber Security Today Weekend Panel: Month In Review, December 7th, 2024
Cyber Security Today: Navigating Novel Phishing Campaigns and Ransomware Tactics Join host Jim Love and the Cyber Security Today panel featuring Terry Cutler of Cyology Labs, David Shipley of Beauceron Security, and cybersecurity executive John Pinard. In this episode, they delve ... Show More
57m 47s
Mar 2025
Cybersecurity Today: Exploited Vulnerabilities and Innovative Threat Mitigations: Wednesday, March 19, 2025
Cybersecurity Today: Exploited Vulnerabilities and Innovative Threat Mitigations In this episode of Cybersecurity Today, host Jim Love discusses several pressing cybersecurity issues including the exploitation of a server-side request forgery (SSRF) vulnerability in OpenAI's Chat ... Show More
8m 10s
Feb 2025
Ransomware Payments Drop:Cyber Security Today for Monday, February 10, 2025
In this episode of Cyber Security Today with host Jim Love, we delve into the significant 35% drop in global ransomware payments in 2024, highlighting a growing resistance to hacker demands and improved law enforcement actions. We also discuss a national security crisis sparked b ... Show More
7m 18s
Feb 2025
DeepSeek: The Game-Changer in AI and the Impact on Cybersecurity
In this episode of Cybersecurity Today, host Jim Love dives deep into the latest advancements in AI technology with a focus on the new open-source model, DeepSeek, from China. Love discusses the significant cost differences in training and running this model compared to competito ... Show More
48m 19s
Nov 2024
Bridging AI and Cybersecurity Gaps with Mileva Security Labs’ Harriet Farlow
Join us in this episode of Threat Vector as guest host Michael Heller shares his conversation with Harriet Farlow, CEO of Mileva Security Labs and a pioneer in AI security research. With a background spanning AI and national cybersecurity, Harriet shares her journey into adversar ... Show More
27m 17s