Ethos Blog

Updates about the latest Tech News

What you need to know about the Flash Express Suite from Pure Storage?
Jess Martin
Ethos Technology
The Flash Express Suite is a new bundled offering (array + software + support + Pure Cloud Block Store) aimed at making Pure Storage suitable for any organisation. What's included with FlashExpress Suite? • FlashArray: X20R2• Capacity: 11TB to 63TB RAW• Support: Silver Advanced• Cloud Block Store: 10 TIBs for 12 months• Right Size Guarantee: 4:1 da...
Continue reading
Discover Pure Storage's new FlashExpress Suite
Jess Martin
Ethos Technology
Pure Storage has announced its newest Bundle service, the FlashExpress Suite. It is a package that brings together Support, Hardware, and the cloud in one place with security and much more practicality for your company. Know more! Storage without compromise - Fast, Efficient, Reliable, and Effortless There’s no need to compromise anymore. Pure...
Continue reading
5 reasons to have Pure Storage as your data storage supplier
Jess Martin
Ethos Technology
Data is part of every step of creating services and products, and without them, your company would probably not be working. To grow more and more as a company, you need a good data storage provider that is functional, agile and does not Spring surprise costs on you after a few months or years. Pure Storage has proven itself to be the fastest-growin...
Continue reading
How Do F1 Engineers Use Data to Help Drivers Win Races?
Jess Martin
Ethos Technology
Last weekend, George Russell took third place at the Spanish Grand Prix. To reach that podium, Russell needed more than just his driving skills. The Mercedes-AMG team has a great deal of credit for this podium, not only for the support and speed but also for the data analysis involved in a race like this, cause, after all, everything is #DrivenByDa...
Continue reading
How to prevent a ransomware attack
Jess Martin
Ethos Technology
A ransomware attack is characterized by an invasion of a data storage system that steals and encrypts this data, keeping access only to the hacker and asking for a ransom payment for the user to regain access. Preventing ransomware attacks through cybersecurity best practices and regular snapshots is the best option. Learn more about preventing a r...
Continue reading