{"id":3296,"date":"2015-03-13T08:32:59","date_gmt":"2015-03-13T13:32:59","guid":{"rendered":"http:\/\/www.poweradmin.com\/blog\/?p=3296"},"modified":"2015-04-24T16:14:12","modified_gmt":"2015-04-24T21:14:12","slug":"linkedin-feature-monitoring-in-the-cloud-examined","status":"publish","type":"post","link":"https:\/\/www.poweradmin.com\/blog\/linkedin-feature-monitoring-in-the-cloud-examined\/","title":{"rendered":"LinkedIn Feature: Monitoring in the Cloud Examined"},"content":{"rendered":"<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\"><a href=\"\/servermonitor\/?ref=blogad\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-3277 size-full\" src=\"\/blog\/wp-content\/uploads\/2015\/03\/pa-server-monitor-e1426088009503.jpg\" alt=\"PA Server Monitor\" width=\"680\" height=\"84\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2015\/03\/pa-server-monitor-e1426088009503.jpg 680w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2015\/03\/pa-server-monitor-e1426088009503-300x37.jpg 300w\" sizes=\"auto, (max-width: 680px) 100vw, 680px\"><\/a><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-3202 size-full\" src=\"\/blog\/wp-content\/uploads\/2015\/02\/breaking-news-linkedin-article.jpg\" alt=\"Breaking News LinkedIn Article\" width=\"300\" height=\"300\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2015\/02\/breaking-news-linkedin-article.jpg 300w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2015\/02\/breaking-news-linkedin-article-150x150.jpg 150w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\"><\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">It\u2019s that time again for a brand new, in-depth 3 part article we post on LinkedIn!<br>\n<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">So, starting today (March 13<sup>th <\/sup>2015), we are posting up a very special extended 3-part feature exclusively on LinkedIn entitled \u2018<strong>Monitoring in the Cloud<\/strong>\u2019<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">Cloud computing is very popular right now. That being said, there are definitely some risks and disadvantages you might want to consider before jumping head first into a cloud based service of any kind for your business.<br>\n<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">And so that\u2019s why we felt it our duty to produce for you all an extended 3-part guide as to how you may approach the decision of monitoring in the cloud (as well as using any other cloud services). Click on the links below to read the guide.<br>\n<\/span><\/p>\n<p><a title=\"What is Downtime, and What Causes It?\" href=\"https:\/\/www.linkedin.com\/pulse\/monitoring-cloud-part-1-security-risks-william-thompson?trk=object-title\" rel=\"nofollow\" target=\"_blank\"><span style=\"font-family: verdana,geneva; font-size: 12pt;\">Part 1 \u2013 \u2018Monitoring in the Cloud Part 1: The Security Risks\u2019 \u2013 is <b>live now<\/b>.<\/span><img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a><\/p>\n<p><a title=\"Monitoring in the Cloud Part 2: Shared Responsibilities\" href=\"https:\/\/www.linkedin.com\/pulse\/monitoring-cloud-part-2-shared-responsibilities-william-thompson?trk=mp-author-cardhttp:\/\/\" target=\"_blank\" rel=\"nofollow\"><span style=\"font-family: verdana,geneva; font-size: 12pt;\">Part 2 \u2013 \u2018Monitoring in the Cloud Part 2: Shared Responsibilities\u2019 \u2013 will be posted next <b>Thursday, March 19th 2015 at 9am PST<\/b>.<\/span><img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a><\/p>\n<p><a title=\"Monitoring in the Cloud: Words of Caution\" href=\"https:\/\/www.linkedin.com\/pulse\/monitoring-cloud-part-3-known-breaches-words-caution-william-thompson?trk=object-title\" rel=\"nofollow\" target=\"_blank\"><span style=\"font-family: verdana,geneva; font-size: 12pt;\">Part 3 \u2013 \u2018Monitoring in the Cloud Part 2: Known Breaches, and Words of Caution\u2019 \u2013 will be posted the following <b>Thursday, March 26<sup>th<\/sup> 2015 at 9am PST<\/b>.<\/span><img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">We\u2019ve worked very hard at accumulating the best information and advice for you all in these articles, and we hope that they will be as invaluable to you as they are to us.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">Enjoy them, and don\u2019t forget to share and follow Power Admin on LinkedIn as well.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">Happy monitoring, everyone!!<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>It\u2019s that time again for a brand new, in-depth 3 part article we post on LinkedIn! So, starting today (March 13th 2015), we are posting up a very special extended 3-part feature exclusively on LinkedIn entitled \u2018Monitoring in the Cloud\u2019 Cloud computing is very popular right now. That being said, there are definitely some risks [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":3202,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,13,6],"tags":[],"class_list":["post-3296","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general-it","category-pc-security","category-tech"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/3296","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/comments?post=3296"}],"version-history":[{"count":5,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/3296\/revisions"}],"predecessor-version":[{"id":3495,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/3296\/revisions\/3495"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/media\/3202"}],"wp:attachment":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/media?parent=3296"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/categories?post=3296"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/tags?post=3296"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}