{"version":"1.0","provider_name":"Microsoft Azure Blog","provider_url":"https:\/\/azure.microsoft.com\/en-us\/blog","author_name":"Mark Russinovich","author_url":"https:\/\/azure.microsoft.com\/en-us\/blog\/author\/mark-russinovich\/","title":"Advancing safe deployment practices | Microsoft Azure Blog","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"EQjhFwTZiI\"><a href=\"https:\/\/azure.microsoft.com\/en-us\/blog\/advancing-safe-deployment-practices\/\">Advancing safe deployment practices<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/azure.microsoft.com\/en-us\/blog\/advancing-safe-deployment-practices\/embed\/#?secret=EQjhFwTZiI\" width=\"600\" height=\"338\" title=\"&#8220;Advancing safe deployment practices&#8221; &#8212; Microsoft Azure Blog\" data-secret=\"EQjhFwTZiI\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/azure.microsoft.com\/en-us\/blog\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","description":"When running IT systems on-premises, you might try to ensure perfect availability by having gold-plated hardware, locking up the server room and throwing away the key. Software wise, IT would traditionally prevent as much change as possible \u2013 avoiding applying updates to the OS and\/or applications because they\u2019re too critical, and pushing back on change requests from users.","thumbnail_url":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2020\/02\/bf679ad2-9c14-484f-a30c-6ac44391150e.webp"}