basic advantages include: deployer knows where the log came from, deployer can control severity, deployer can log anywhere