{"id":271,"date":"2010-06-02T00:00:00","date_gmt":"2010-06-02T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2010\/06\/02\/google-touts-benefits-of-cloud-computing\/"},"modified":"2021-12-30T11:36:53","modified_gmt":"2021-12-30T11:36:53","slug":"google-touts-benefits-of-cloud-computing","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2010\/06\/02\/google-touts-benefits-of-cloud-computing\/","title":{"rendered":"Google touts benefits of cloud computing"},"content":{"rendered":"<p>Google has launched a new campaign designed to tempt more enterprises onto its cloud computing applications.  The Go Google cloud calculator offers insights into the capabilities of cloud applications in an effort to allay some common concerns.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>An accompanying video suggests that companies need spend only two minutes answering two questions before deciding whether the cloud is right for them.<\/p>\n<p>The tool creates custom URLs, presentations, spreadsheets and posters which can be used internally to spread the word about the benefits of the cloud.<\/p>\n<p>Google estimates that organisations can save thousands of pounds a year by making the switch, while adding new capabilities and storage to common applications like email.<\/p>\n<p>http:\/\/www.v3.co.uk\/v3\/news\/2263998\/google-offers-cloud-trial<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5],"tags":[],"class_list":["post-271","post","type-post","status-publish","format-standard","hentry","category-cloud"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/271","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=271"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/271\/revisions"}],"predecessor-version":[{"id":2758,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/271\/revisions\/2758"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=271"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=271"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=271"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}