Microsoft Azure

How to Get Creative with Cloud Best Practices


Best practices are the foundation for any project, designed to provide inspiration within boundaries. This guide will show you how successful architects bend those boundaries on cloud adoption and best practices to deliver business-ready cloud solutions. Understand the Limits At CTP we have mastered the process for identifying each of the six Rs (refactor, rewrite, […]

Establishing a Complete & Secure Cloud Environment on Azure


Customer Challenges Needs a highly available, highly scalable technology platform that would be able to act as a hub for end-users, technology providers, merchants and banks to use for credit card processing activities CTP Solution Used automated code deployment to decrease the time to project completion Built reference architecture and baseline infrastructure to position team […]

Managed Container Services vs. Bring Your Own Container Stack


With 2017 seeing more than 40% of organizations either running production workloads in containers or piloting such efforts, it is safe to say 2018 and 2019 will be the years for mass adoption of container platforms. However, 2018 has brought an interesting option for container adoption within the enterprise — the release of managed container […]

The Maturation of Architects, Operations and Developers in the Cloud


Many roles, including architects, operations and developers, will fundamentally change as new capabilities become available, the market continues to speed ahead and business demands greater levels of operational efficiency. It is important that every member of these organizations take ownership for their own career growth and identify where their careers are headed. Ownership means understanding […]

Are Your Azure Environments Secure?


More and more enterprises are taking advantage of the competitive marketplace of public cloud providers. While AWS continues to be the leader, Microsoft Azure’s growth is exponential. What’s common to any public cloud initiative is the need to build a cloud security program that typically focuses on the following tasks: Recognizing the areas of information […]