Microsoft Tech Library

Microsoft SharePoint Monitoring

Thu, 18 Jan 2018 16:54:00 GMT

Download this eBook to learn how to maintain peak performance of systems connected to SharePoint and see the benefits of putting AppDynamics and SharePoint to work for your enterprise. Read on.

Ensuring Visibility into Microservices and Containers

Thu, 18 Jan 2018 16:54:00 GMT

Download this ebook and learn more about the benefits and use cases of Microservices, Containers, and APM. Read on.

IDC: Critical Application and Business KPIs for Successful Cloud Migration

Thu, 18 Jan 2018 16:54:00 GMT

Download this ebook and See how 600 global enterprises are planning and measuring cloud migration success. Read on.

What .NET Developers Need to Know About Azure

Thu, 18 Jan 2018 16:54:00 GMT

Download this eBook and find out if Microsoft Azure is the right choice for your cloud initiatives by downloading the eBook now. Read on.

Performance Testing and APM in the AWS Cloud

Thu, 18 Jan 2018 16:54:00 GMT

Download this white paper now to see how the complementary capabilities between APM and AWS let you test your applications with precision and confidence. Read on.

Simplifying Virtualization while Innovating with Red Hat Testimonials

Wed, 17 Jan 2018 23:43:00 GMT

Virtualization can vastly improve efficiency, free up resources, and cut costs--without sacrificing performance, security, and existing investments. This testimonials document lists 15 enterprise customers who are using Red Hat Virtualization and 4 of them share how it's helping their business and why they chose Red Hat.

Discover The Real ROI of DevOps & Database DevOps

Wed, 15 Nov 2017 23:17:00 GMT

DevOps is moving into the mainstream and the database is entering the picture. But what ROI can you expect, and what should CEOs, CIOs and IT Managers care about? This pioneering white paper reveals the facts and the figures. Learn more.

Record Matching: Tackling® International Challenges with MatchUp

Fri, 03 Nov 2017 15:15:00 GMT

International record matching and deduping is a challenge because of varied formats and address elements. This application note discusses ways to develop a matching strategy that accurately identifies duplicates but doesn’t group false positives. Read now!

.NET Monitoring Decrypted: Code Level Performance Metrics, Azure Monitoring, Structured Logging and More

Tue, 01 Aug 2017 00:02:00 GMT

Stackify strives to make developers’ jobs easier. Here, we’ve compiled extensive best practices for .NET monitoring. We offer in-depth details on measuring application performance metrics, structured logging, finding application errors and more!

Solving Database Deployments with Database DevOps

Fri, 28 Jul 2017 15:54:00 GMT

This whitepaper explains how to overcome challenges presented by database change management. By extending DevOps practices to the database, you gain consistency across applications and databases while increasing team efficiencies. Read more.

Essential .NET Core: Methods for Optimizing Web Apps in Azure, Logging, Deploying to IIS, and More

Fri, 07 Jul 2017 15:37:00 GMT

Stackify strives to make developers’ jobs easier. Here, we’ve compiled extensive best practices for running your apps with .NET Core. We offer in-depth details on converting to .NET Core, logging, creating Windows Services and more! Read more.

The Build vs. Buy Challenge: Insight into a Hybrid Approach

Fri, 07 Jul 2017 15:37:00 GMT

Data Quality is essential for success. The key to success is knowing when you should build a custom data quality tools over canned solutions. Download our whitepaper for insight. Read more.

The Proactive Security Paradigm: How Containers Can Revamp Your Approach to Security

Fri, 09 Jun 2017 16:00:00 GMT

Ask most DevOps engineers about the benefits of containers and microservices, and their responses will center on the agility, modularity and scalability that microservices-based architectures provide. But there is another crucial and oft-overlooked advantage of migrating to containers and microservices: Security. Containers offer a number of opportunities for building and deploying more secure applications and environments. Read on.

Life After Deployment: 4 Tips for Maintaining Software Post Launch

Fri, 07 Apr 2017 22:10:00 GMT

Read this white paper to learn four crucial tips to help you plan for and handle the maintenance of your software toward the end of the development life cycle. Learn more.

How to Securely Configure a Linux Host to Run Containers

Tue, 04 Apr 2017 17:13:00 GMT

This guide, as part of the Twistlock Container Security How-To Guides series, describes the concrete steps that you can follow to configure a Linux host to run Docker containers securely. Learn more.

Guide to PCI Compliance for Containers

Tue, 04 Apr 2017 17:06:00 GMT

With the prevalence of electronic payments, nearly every organization is impacted by Payment Card Industry (PCI) Data Security Standard (DSS) requirements. However, there’s very little guidance on how to run containers in a manner that’s compliant with these requirements. The Twistlock Guide to PCI Compliance for Containers breaks down the PCI DSS requirements section by section and provides clear instructions on how to design and operate a containerized environment in a compliant manner. Learn more.