{"id":278,"date":"2010-08-07T00:00:00","date_gmt":"2010-08-07T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2010\/08\/07\/cloudfail-net-posting-failures-of-the-most-popular-cloud-providers\/"},"modified":"2021-12-30T11:36:54","modified_gmt":"2021-12-30T11:36:54","slug":"cloudfail-net-posting-failures-of-the-most-popular-cloud-providers","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2010\/08\/07\/cloudfail-net-posting-failures-of-the-most-popular-cloud-providers\/","title":{"rendered":"CloudFail.net: Posting Failures of the Most Popular Cloud Providers"},"content":{"rendered":"<p>It&#8217;s difficult to know how often a cloud computing service fails.  In this regard, services that provide updates about outages can be invaluable.  CloudFail.net monitors service updates from companies such as Amazon, Google and Rackpace.  On Thursday, for instance, it reported a Google service update for Postini, the enterprise email security service.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>If nothing else, it helps them ask questions of the service provider.<\/p>\n<p>CloudFail also covers services such as Twitter and Basecamp.  In this respect, CloudFail is not purely for cloud computing service providers.  Twitter is a microblogging network, not a cloud service.  It actually has its own data center at NTT America.  But its inclusion does reflect that many view Twitter and Amazon Web Services in the same category.<\/p>\n<p>With more sophisticated third-party reporting, benchmarks can be established that rate services.  That would be valuable information for a customer to have.<\/p>\n<p>http:\/\/www.readwriteweb.com\/cloud\/2010\/08\/cloudfail-how-to-know-when-a-c.php<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5],"tags":[],"class_list":["post-278","post","type-post","status-publish","format-standard","hentry","category-cloud"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/278","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=278"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/278\/revisions"}],"predecessor-version":[{"id":2765,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/278\/revisions\/2765"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=278"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=278"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=278"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}