dcsimg

Microsoft's Cloud-Based Dog Food Good Enough To Eat

WEBINAR:
On-Demand

Application Security Testing: An Integral Part of DevOps


Microsoft coined the phrase "eating your own dog food" over 20 years ago, beginning a tradition that showed that not only were Microsoft products good enough for the world, they were good enough for Microsoft themselves to use.

Microsoft's Windows Azure Cloud still has to prove itself good enough to eat. A recent blog from the Windows Azure team talked about how Microsoft uses Windows Azure in various parts of the business. Although that's true, Microsoft themselves hosts the cloud service, and most of the company's IT infrastructure does not run in the cloud--but it's a good start.

Microsoft coined the phrase "eating your own dog food" over 20 years ago, beginning a tradition that showed that not only were Microsoft products good enough for the world, they were good enough for Microsoft themselves to use.

View Article



Comments

  • There are no comments yet. Be the first to comment!

  • You must have javascript enabled in order to post comments.

Leave a Comment
  • Your email address will not be published. All fields are required.

Top White Papers and Webcasts

  • Discover the best practices from HPE’s IT Advisory Consulting Services for migrating and transforming applications in Hybrid IT by capitalizing on innovative platforms, modern application architectures, agile development tools and proven methodologies. There are a number of challenges our customers face when migrating and transforming applications for a Hybrid IT environment. This guide provide proven strategies and application approaches that can help them understand and reduce risks and complexity.

  • The Internet of Things (IoT), a growing network of physical devices with Internet connectivity, can collect and exchange rich data. Organizations utilizing the Enterprise of Things (EoT) are also at a greater risk for data breaches and cybersecurity threats. Healthcare organizations striving to realize the full potential of the EoT must also be able to confidentially and reliably transmit highly sensitive data between connected devices. Read this white paper to discover the best cybersecurity strategies to get …

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date
×
We have made updates to our Privacy Policy to reflect the implementation of the General Data Protection Regulation.