Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Migrating to Azure: Transforming Legacy Applications into Scalable Cloud-First Solutions

Buy

Design an enterprise solution from scratch that allows the migration of a legacy application. Begin with the planning and design phase and be guided through all the stages of selecting the architecture framework that fits your enterprise.

Join Microsoft MVP Josh Garverick as he addresses all major areas of design and implementation?application, infrastructure, data, security, and deployment?while leveraging the power and tools of Visual Studio Team Services (VSTS) to bring DevOps to the forefront.

With an emphasis on principles and best practices of enterprise design, you will discover how to recognize existing patterns within the legacy platform and to identify potential risks, bottlenecks, and candidates for automation.

What You’ll Learn

  • Accurately and completely capture baseline information about a legacy system
  • Leverage enterprise patterns for constructing next-generation platforms in the cloud
  • Design, plan, and implement deployment pipelines to enable continuous delivery
  • Identify and implement cloud-based platform components to reduce total cost of ownership
  • Understand testing and validation: iterative component authoring, monitoring, deployment, and performance
  • Price and perform capacity planning for cloud-based infrastructure and workloads

Who This Book Is For

Enterprise architects and IT professionals who are required to keep legacy applications relevant in today’s cloud-first world

(HTML tags aren't allowed.)

PHP & MySQL: The Missing Manual
PHP & MySQL: The Missing Manual

You’ve built a web page in HTML. You’ve even styled it with Cascading Style Sheets (CSS) and written a little JavaScript to validate your custom-built web forms. But that wasn’t enough, so you learned a lot more JavaScript, threw in some jQuery, and constructed a whole lot of web pages. You’ve even moved your...

Soft Computing and Signal Processing: Proceedings of ICSCSP 2018, Volume 2 (Advances in Intelligent Systems and Computing (898))
Soft Computing and Signal Processing: Proceedings of ICSCSP 2018, Volume 2 (Advances in Intelligent Systems and Computing (898))

The book includes research papers on current developments in the field of soft computing and signal processing, selected from papers presented at the International Conference on Soft Computing and Signal Processing (ICSCSP 2018). It features papers on current topics, such as soft sets, rough sets, fuzzy logic, neural networks,...

Beginning Microsoft SQL Server 2008 Administration
Beginning Microsoft SQL Server 2008 Administration
SQL Server 2008 introduces many new features that will change database administration procedures; many DBAs will be forced to migrate to SQL Server 2008. This book teaches you how to develop the skills required to successfully administer a SQL Server 2008 database; no prior experience is required. The material covers system installation and...

Visual Basic 2005 with .NET 3.0 Programmer's Reference
Visual Basic 2005 with .NET 3.0 Programmer's Reference

With this completely up-to-date tutorial and reference, you'll quickly learn how to develop Visual Basic (VB) programs that leverage the latest features of Vista and .NET 3.0. The tutorial section walks you through VB.NET from scratch, providing you with in-depth descriptions of the development environment, basic program syntax, and standard...

Talend for Big Data
Talend for Big Data

If you want to start working on big data projects fast, this is the guide you've been looking for. Delve deep into Talend and discover how just how easily you can revolutionize your data handling and presentation.

Overview

  • Write complex processing job codes easily with the help of clear and step by...
Check Point Next Generation Security Administration
Check Point Next Generation Security Administration
Check Point NG aims to teach its readers how to install and set up VPN-1/FireWall-1 Next Generation, the latest version of the highly respected firewall software from Check Point. Its authors--all with significant network and security certifications--accomplish their objective: it seems likely that this book will travel with a lot of Check...
©2020 LearnIT (support@pdfchm.net) - Privacy Policy