Migrating to Azure : transforming legacy applications into scalable cloud-first solutions /: transforming legacy applications into scalable cloud-first solutions. ([2018])
- Record Type:
- Book
- Title:
- Migrating to Azure : transforming legacy applications into scalable cloud-first solutions /: transforming legacy applications into scalable cloud-first solutions. ([2018])
- Main Title:
- Migrating to Azure : transforming legacy applications into scalable cloud-first solutions
- Further Information:
- Note: Josh Garverick.
- Authors:
- Garverick, Josh
- Contents:
- Intro; Table of Contents; About the Author; About the Technical Reviewer; Acknowledgments; Introduction; Part I: Assessing the Legacy; Chapter 1: The Baseline; Conducting the Initial Discovery; Getting Details on the Short (and Long)-Term Goals of the Business; Learning the Business Context of Application Domains; Gathering Functional and Nonfunctional Requirements; Discovering Integration Points; Creating and Examining Dependency Graphs; Finding Existing Build and Release Pipelines; Proactively Seeking Out Pain Points; Summary; Chapter 2: Domain Architectures Identifying Primary, Secondary, and Tertiary ComponentsDocumenting Application Collaborations; Locating the Components; Constructing a Basic Infrastrucutre View; Enhancing the Infrastructure View; Physical Devices; Networking; Seeking Interactions with Applications, Technology and Data; Determining Information Consistency; Go with the Data Flow; Immediate Consistency; Eventual Consistency; Fleshing out the Build Process (Further); Lighting up the Runway; Summary; Chapter 3: Security and Compliance; Leading in with Expectations; Security Controls; PCI DSS; GDPR; Identifying Domain Risk Areas Data SecurityApplication Security; Identity and Access Management; Transport and Delivery Channels; Infrastructure Security; Network; Device; Node; Deployment Security; Software Security; Mitigating the Risks; Risk Register; Risk Mitigation Plan; Preparing for Regulatory and Compliance Audits; Summary; Chapter 4: Operating Models;Intro; Table of Contents; About the Author; About the Technical Reviewer; Acknowledgments; Introduction; Part I: Assessing the Legacy; Chapter 1: The Baseline; Conducting the Initial Discovery; Getting Details on the Short (and Long)-Term Goals of the Business; Learning the Business Context of Application Domains; Gathering Functional and Nonfunctional Requirements; Discovering Integration Points; Creating and Examining Dependency Graphs; Finding Existing Build and Release Pipelines; Proactively Seeking Out Pain Points; Summary; Chapter 2: Domain Architectures Identifying Primary, Secondary, and Tertiary ComponentsDocumenting Application Collaborations; Locating the Components; Constructing a Basic Infrastrucutre View; Enhancing the Infrastructure View; Physical Devices; Networking; Seeking Interactions with Applications, Technology and Data; Determining Information Consistency; Go with the Data Flow; Immediate Consistency; Eventual Consistency; Fleshing out the Build Process (Further); Lighting up the Runway; Summary; Chapter 3: Security and Compliance; Leading in with Expectations; Security Controls; PCI DSS; GDPR; Identifying Domain Risk Areas Data SecurityApplication Security; Identity and Access Management; Transport and Delivery Channels; Infrastructure Security; Network; Device; Node; Deployment Security; Software Security; Mitigating the Risks; Risk Register; Risk Mitigation Plan; Preparing for Regulatory and Compliance Audits; Summary; Chapter 4: Operating Models; Documenting the Existing Support Model; Sketching out the Process; Documenting the Suppliers; Lighting up the Locations; Organizing the Organizational Structure; Inventorying the Information Systems; Managing Metrics and the System of Management Zeroing in on Baseline DetailsTracing the Escalation Paths; Collating the Baseline and Target Models; Baseline Operating Model-Andromeda; Baseline Operating Model-Gamecorp; Beginning the Target Operating Model; On-Call Rotation; Site Reliability Outreach; Standardized Response; Wrapping Up the Draft; Summary; Part II: Planning for the Future; Chapter 5: The Wireframe; Common Migration Scenarios; Case 1: Lift and Shift; Case 2: Greenfield; Case 3: Hybrid; Case 4: Lift, Shift, and Enhance; The "Baseline" Target State; Business Architecture; Physical Architecture; Application Architecture Data ArchitectureTechnology Architecture; Security Architecture; Deployment Architecture; Reviewing the Roadmap; Work Breakdown Structure; Point of Sale Upgrades; Identity Providers; Selecting the Right Services; Conducting Assessments of Options; Reviewing Assessments with Stakeholders; Going Through Peer Review; Summary; Chapter 6: Capacity Planning; Network Architecture; Laying the Groundwork; Network Peering; ExpressRoute, the Backplane, and the Edge; Peering Routes and Custom Routes; Ingress Points and Load Balancing; Exploring Storage Options; Application Architecture … (more)
- Publisher Details:
- New York, NY : Apress
- Publication Date:
- 2018
- Copyright Date:
- 2018
- Extent:
- 1 online resource, colour illustrations
- Subjects:
- 004.6782
Computer science
Microsoft Azure (Computing platform)
Cloud computing
Application software -- Design
COMPUTERS / Computer Literacy
COMPUTERS / Computer Science
COMPUTERS / Data Processing
COMPUTERS / Hardware / General
COMPUTERS / Information Technology
COMPUTERS / Machine Theory
COMPUTERS / Reference
Computers -- Data Processing
Computers -- Enterprise Applications -- General
Information technology: general issues
Business mathematics & systems
Microsoft software
Microsoft .NET Framework
Management information systems
Computers -- Programming -- Microsoft Programming
Microsoft programming
Electronic books - Languages:
- English
- ISBNs:
- 9781484235850
1484235851 - Related ISBNs:
- 9781484235843
1484235843 - Notes:
- Note: Online resource; title from PDF title page (EBSCO, viewed October 29, 2018).
- Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.346777
- Ingest File:
- 01_300.xml