<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>Urolime Blogs</provider_name><provider_url>https://www.urolime.com/blogs</provider_url><author_name>Urolime Technologies</author_name><author_url>https://www.urolime.com/blogs/author/blogadmin/</author_url><title>Cloud complexity and data security</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="ZWgJmmdFQZ"&gt;&lt;a href="https://www.urolime.com/blogs/cloud-complexity-and-data-security/"&gt;Cloud complexity and data security&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://www.urolime.com/blogs/cloud-complexity-and-data-security/embed/#?secret=ZWgJmmdFQZ" width="600" height="338" title="&#x201C;Cloud complexity and data security&#x201D; &#x2014; Urolime Blogs" data-secret="ZWgJmmdFQZ" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script type="text/javascript"&gt;
/* &lt;![CDATA[ */
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
/* ]]&gt; */
&lt;/script&gt;
</html><thumbnail_url>https://www.urolime.com/blogs/wp-content/uploads/2020/08/URO-BLOG-18.png</thumbnail_url><thumbnail_width>768</thumbnail_width><thumbnail_height>432</thumbnail_height><description>Most enterprises are aware of operational problems that arise when dealing with two or more IaaS cloud providers at the same time, but most have not yet linked complexity with security issues.</description></oembed>
