{"id":2050,"date":"2015-09-06T01:46:19","date_gmt":"2015-09-06T01:46:19","guid":{"rendered":"https:\/\/evosec.eu\/?p=2050"},"modified":"2016-09-06T01:46:46","modified_gmt":"2016-09-06T01:46:46","slug":"it-operations","status":"publish","type":"post","link":"https:\/\/evosec.eu\/it\/it-operations\/","title":{"rendered":"IT Operations"},"content":{"rendered":"<div class=\"well well-sm\">Information technology operations, or IT operations, are the set of all processes and services that are both provisioned by an IT staff to their internal or external clients and used by themselves, to run themselves as a business.<\/div>\n<p><\/p>\n<div class=\"row\">\n<ul class=\"fa-ul\" style=\"list-style-type: none;\">\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Networking<\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Linux Servers<\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>BackUPs \/ Ransomware-proof backups<\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Monitoring of websites, IPs\/IP Ranges, devices etc<\/li>\n<\/ul>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Information technology operations, or IT operations, are the set of all processes and services that are both provisioned by an IT staff to their internal or external clients and used by themselves, to run themselves as a business. Networking Linux Servers BackUPs \/ Ransomware-proof backups Monitoring of websites, IPs\/IP Ranges, &hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[937],"tags":[],"class_list":["post-2050","post","type-post","status-publish","format-standard","hentry","category-it-operations-services"],"translation":{"provider":"WPGlobus","version":"3.0.2","language":"it","enabled_languages":["en","da","de","es","fi","fr","it","hu","nl","no","pl","pt","ru","sv"],"languages":{"en":{"title":true,"content":true,"excerpt":false},"da":{"title":false,"content":false,"excerpt":false},"de":{"title":false,"content":false,"excerpt":false},"es":{"title":false,"content":false,"excerpt":false},"fi":{"title":false,"content":false,"excerpt":false},"fr":{"title":false,"content":false,"excerpt":false},"it":{"title":false,"content":false,"excerpt":false},"hu":{"title":false,"content":false,"excerpt":false},"nl":{"title":false,"content":false,"excerpt":false},"no":{"title":false,"content":false,"excerpt":false},"pl":{"title":false,"content":false,"excerpt":false},"pt":{"title":false,"content":false,"excerpt":false},"ru":{"title":false,"content":false,"excerpt":false},"sv":{"title":false,"content":false,"excerpt":false}}},"_links":{"self":[{"href":"https:\/\/evosec.eu\/it\/wp-json\/wp\/v2\/posts\/2050","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/evosec.eu\/it\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/evosec.eu\/it\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/evosec.eu\/it\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/evosec.eu\/it\/wp-json\/wp\/v2\/comments?post=2050"}],"version-history":[{"count":1,"href":"https:\/\/evosec.eu\/it\/wp-json\/wp\/v2\/posts\/2050\/revisions"}],"predecessor-version":[{"id":2051,"href":"https:\/\/evosec.eu\/it\/wp-json\/wp\/v2\/posts\/2050\/revisions\/2051"}],"wp:attachment":[{"href":"https:\/\/evosec.eu\/it\/wp-json\/wp\/v2\/media?parent=2050"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/evosec.eu\/it\/wp-json\/wp\/v2\/categories?post=2050"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/evosec.eu\/it\/wp-json\/wp\/v2\/tags?post=2050"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}