{"id":5766,"date":"2015-12-22T16:38:16","date_gmt":"2015-12-22T06:38:16","guid":{"rendered":"http:\/\/nsrd.info\/blog\/?p=5766"},"modified":"2016-02-01T17:52:19","modified_gmt":"2016-02-01T07:52:19","slug":"2015-thats-a-wrap","status":"publish","type":"post","link":"https:\/\/nsrd.info\/blog\/2015\/12\/22\/2015-thats-a-wrap\/","title":{"rendered":"2015 &#8211; that&#8217;s a wrap!"},"content":{"rendered":"<p>As we approach\u00a0the end of 2015 I wanted to spend a bit of time reflecting on some of the data\u00a0protection enhancements we&#8217;ve seen over the year. There&#8217;s\u00a0certainly been a lot!<\/p>\n<p><a href=\"https:\/\/nsrd.info\/blog\/2015\/12\/22\/2015-thats-a-wrap\/businessman-hand-drawing-an-umbrella-above-a-family-concept-for\/\" rel=\"attachment wp-att-5767\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-5767\" src=\"https:\/\/nsrd.info\/blog\/wp-content\/uploads\/2015\/12\/bigStock-Protection-Umbrella.jpg\" alt=\"Protection\" width=\"900\" height=\"604\" srcset=\"https:\/\/nsrd.info\/blog\/wp-content\/uploads\/2015\/12\/bigStock-Protection-Umbrella.jpg 900w, https:\/\/nsrd.info\/blog\/wp-content\/uploads\/2015\/12\/bigStock-Protection-Umbrella-300x201.jpg 300w, https:\/\/nsrd.info\/blog\/wp-content\/uploads\/2015\/12\/bigStock-Protection-Umbrella-768x515.jpg 768w\" sizes=\"auto, (max-width: 900px) 100vw, 900px\" \/><\/a><\/p>\n<h3>NetWorker 9<\/h3>\n<p>NetWorker 9 of course was a big\u00a0part to the changes in\u00a0the data protection landscape in 2015, but that&#8217;s not by any means the\u00a0<em>only<\/em>\u00a0advancement we saw.\u00a0I covered some of the advances in NetWorker 9 in my initial post about it (<a href=\"https:\/\/nsrd.info\/blog\/2015\/10\/02\/networker-9-the-future-of-backup\/\" target=\"_blank\">NetWorker 9: The Future of Backup<\/a>), but to summarise just a\u00a0<em>few<\/em> of the key new features, we saw:<\/p>\n<ul>\n<li><strong>A policy based\u00a0engine<\/strong> that unites backup, cloning, snapshot management and\u00a0protection of virtualisation into a single, easy to understand\u00a0configuration.\u00a0Data protection activities in NetWorker can be fully aligned to service\u00a0catalogue requirements,\u00a0and the easier configuration engine actually extends the power of NetWorker by offering more complex configuration options.<\/li>\n<li><strong>Block based backups for Linux filesystems<\/strong> \u2013\u00a0speeding up backups for highly dense filesystems considerably.<\/li>\n<li><strong>Block based backups for Exchange, SQL Server, Hyper-V<\/strong>, and so on \u2013\u00a0NMM for\u00a0NetWorker 9 is a block based backup\u00a0engine. There&#8217;s a whole swathe of enhancements in NMM version 9, but the 3-4x backup performance improvement\u00a0has to be a big win for organisations struggling against existing backup windows.<\/li>\n<li><strong>Enhanced snapshot management<\/strong> \u2013\u00a0I was speaking to a customer only a few days ago about NSM (NetWorker Snapshot Management), and his reaction to NSM was palpable. Wrapping NAS snapshots into an effective and coordinated data protection policy with\u00a0the backup software orchestrating\u00a0the whole process from\u00a0snapshot creation,\u00a0rollover to backup media and expiration just\u00a0<em>makes sense<\/em>\u00a0as the\u00a0conventional data storage\u00a0protection and backup\/recovery activities continue to converge.<\/li>\n<li><strong>ProtectPoint Integration<\/strong> \u2013 I&#8217;ll get to ProtectPoint\u00a0a little further below, but being able to manage ProtectPoint processes in the same way NSM manages file-based snapshots will be a big win as well for those customers who need ProtectPoint.<\/li>\n<li><strong>And more!<\/strong> \u2013 VBA enhancements (notably the native HTML5 interface and a CLI for Linux), NetWorker Virtual Edition (NVE), dynamic\u00a0parallel savestreams, NMDA enhancements, restricted datazones and scaleability all got a boost in NetWorker 9.<\/li>\n<\/ul>\n<p>It&#8217;s difficult to summarise\u00a0everything that came in NetWorker 9 in\u00a0so few words, so if you&#8217;ve not read it yet, be sure to check out my essay-length &#8216;summary&#8217; of it referenced\u00a0above.<\/p>\n<h3>ProtectPoint<\/h3>\n<p>In the world of mission critical databases where impact minimisation on the application host is a must yet backup performance is equally a must, ProtectPoint is an absolute\u00a0<em>game changer<\/em>. To quote Alyanna Ilyadis, when it comes to\u00a0those\u00a0<em>really<\/em> important databases within a business,<\/p>\n<blockquote><p>&#8220;Ideally, you&#8217;d want the performance of a snapshot, with the functionality of a backup.&#8221;<\/p><\/blockquote>\n<p>Think about the real bottleneck in a mission\u00a0critical database backup: the data gets\u00a0transferred (even best case) via fibre-channel from the storage layer to the application\/database layer before being passed across to\u00a0the data protection storage. Even\u00a0if you direct-attach data protection storage to the application server, <em>or<\/em> even if you mount\u00a0a snapshot of the database at another location, you\u00a0<em>still<\/em> have the fundamental requirement\u00a0to:<\/p>\n<ul>\n<li>Read from production storage into a server<\/li>\n<li>Write from that server out to protection storage<\/li>\n<\/ul>\n<p>ProtectPoint\u00a0<em>cuts the middle-man out of the equation<\/em>. By integrating\u00a0storage level snapshots with application layer\u00a0control, the process effectively becomes:<\/p>\n<ul>\n<li>Place database into hot backup mode<\/li>\n<li>Trigger snapshot<\/li>\n<li>Pull\u00a0database out of hot backup mode<\/li>\n<li>Storage\u00a0system sends\u00a0backup data directly to\u00a0Data Domain \u2013 <em>no server involved<\/em><\/li>\n<\/ul>\n<p>That in itself is a good starting point for performance improvement \u2013 your database is only in hot backup mode for a few seconds at most.\u00a0But then the real power of\u00a0ProtectPoint kicks in. You see, when you first configure ProtectPoint, a block based copy from primary storage to Data Domain storage starts in the background straight away.\u00a0With Change Block Tracking incorporated into ProtectPoint, the data transfer from primary to protection storage\u00a0kicks into high gear \u2013 only\u00a0the changes between\u00a0the\u00a0last copy and the current state at\u00a0the time of the snapshot need to be transferred. <em>And<\/em> the Data Domain handles creation of a virtual synthetic full from each backup \u2013 full backups daily at the cost of an incremental.\u00a0We&#8217;re literally seeing backup performance improvements in the order of 20x or more with ProtectPoint.<\/p>\n<p>There&#8217;s some great videos\u00a0explaining <a href=\"https:\/\/www.youtube.com\/watch?v=98y5-qa6nYs\" target=\"_blank\">what ProtectPoint does<\/a>\u00a0and the <a href=\"https:\/\/www.youtube.com\/watch?v=I2PkZ-NbEvU\" target=\"_blank\">sorts of problems it solves<\/a>, and even it <a href=\"https:\/\/www.youtube.com\/watch?v=dD1eZE42-uc\" target=\"_blank\">integrating into NetWorker 9<\/a>.<\/p>\n<h3>Database and Application Agents<\/h3>\n<p>I&#8217;ve been in\u00a0the data\u00a0protection business for nigh on 20 years, and if there&#8217;s one thing that&#8217;s remained\u00a0remarkably consistent\u00a0throughout that time\u00a0it&#8217;s that many DBAs are unwilling to give up control over the data protection configuration and scheduling\u00a0for their babies.<\/p>\n<p>It&#8217;s actually understandable for many organisations. In some places its entrenched habit, and in those situations you can integrate data protection for\u00a0databases directly into the backup and recovery software. For other organisations though there&#8217;s complex scheduling requirements based on batch jobs, data warehousing activities and so on which can&#8217;t possibly be controlled by a regular backup scheduler. Those organisations need to initiate the backup job for a database not at a\u00a0<em>particular time<\/em>, but when it&#8217;s\u00a0<em>the right time<\/em>, and based on the amount of data or the amount of processing, that could be a highly variable time.<\/p>\n<p>The traditional problem with backups for databases and applications being handled\u00a0<em>outside<\/em> of the\u00a0backup product is the chances of the backup data being\u00a0written to primary storage, which is\u00a0<em>expensive<\/em>. It&#8217;s normally more than one copy, too.\u00a0I&#8217;d hazard a guess that 3-5 copies is the norm for most\u00a0database backups when\u00a0they&#8217;re being written to primary storage.<\/p>\n<p>The\u00a0Database and Application agents for Data Domain allow a business to sidestep\u00a0all these problems by centralising the backups for\u00a0mission critical systems\u00a0onto highly protected, cost effective, deduplicated storage.\u00a0The plugins work directly with\u00a0each supported application (Oracle, DB2,\u00a0Microsoft SQL Server, etc.) and give the DBA full control over managing the scheduling of the backups while ensuring those\u00a0backups are stored under management of the data protection team. What&#8217;s more, primary storage is freed up.<\/p>\n<p>Formerly known as &#8220;Data Domain Boost for Enterprise Applications&#8221; and &#8220;Data Domain Boost for Microsoft Applications&#8221;, the Database and Application Agents respectively reached version 2 this year,\u00a0enabling new options and flexibility for businesses. Don&#8217;t just take my word for it though: check out some of the videos about it <a href=\"https:\/\/www.youtube.com\/watch?v=tWG-0YNPQUQ\" target=\"_blank\">here<\/a> and <a href=\"https:\/\/www.youtube.com\/watch?v=xsgsooVPvQg\" target=\"_blank\">here<\/a>.<\/p>\n<h3>CloudBoost 2.0<\/h3>\n<p><a href=\"http:\/\/australia.emc.com\/data-protection\/cloudboost\/index.htm#!\" target=\"_blank\">CloudBoost<\/a> version 1 was released last\u00a0year and\u00a0I&#8217;ve had many conversations with\u00a0customers interested in leveraging it over time to reduce their reliance on tape for long term retention.\u00a0You can read my <a href=\"https:\/\/nsrd.info\/blog\/2015\/05\/16\/networker-to-the-cloud\/\" target=\"_blank\">initial\u00a0overview of CloudBoost here<\/a>.<\/p>\n<p>2015 saw the release of CloudBoost 2.0.\u00a0This\u00a0significantly extends the storage capabilities for CloudBoost, introduces the option for a local cache, and adds the option for a physical appliance for businesses that would prefer to keep their data protection infrastructure physical. (You can see the tech specs for <a href=\"http:\/\/australia.emc.com\/collateral\/data-sheet\/h14524-cloudboost-techspecs.pdf\" target=\"_blank\">CloudBoost appliances here<\/a>.)<\/p>\n<p>With version 2, CloudBoost can now scale to 6PB of cloud managed\u00a0long term retention, and every bit of that data pushed out to a cloud is\u00a0deduplicated, compressed\u00a0<em>and<\/em> encrypted for maximum protection.<\/p>\n<h3>Spanning<\/h3>\n<p>Cloud is a big topic, and a big topic within\u00a0that big topic is SaaS \u2013\u00a0Software as a Service. Businesses of all\u00a0types are\u00a0placing core services in the Cloud to be managed by providers such as Microsoft, Google and Salesforce. Office 365\u00a0Mail is proving very popular for businesses who need enterprise class\u00a0email but don&#8217;t want to run the services themselves, and\u00a0Salesforce is probably the most likely\u00a0mission\u00a0critical SaaS application you&#8217;ll find in use in a business.<\/p>\n<p>So it&#8217;s absolutely\u00a0<em>terrifying<\/em> to think that SaaS providers\u00a0don&#8217;t really backup your data.\u00a0They protect their infrastructure from\u00a0<em>physical<\/em> faults, and\u00a0<em>their\u00a0<\/em>faults, but their SLAs around data deletion are pretty straight forward: if you deleted it, they can&#8217;t tell whether it was intentional or an accident. (And if it was an intentional delete they certainly can&#8217;t tell if it was authorised or not.)<\/p>\n<p>Data corruption and data deletion in SaaS applications is far too common an occurrence, and for many businesses sadly it&#8217;s only\u00a0<em>after<\/em> that happens for the first time that people become aware of what those SLAs do and don&#8217;t cover them for.<\/p>\n<p>Enter <a href=\"http:\/\/spanning.com\" target=\"_blank\">Spanning<\/a>. Spanning integrates with the native\u00a0hooks provided in Salesforce, Google\u00a0Apps and Office 365 Mail\/Calendar to protect the data\u00a0your business relies on so heavily for day to day operations. The interface is dead simple, the\u00a0pricing is straight forward,\u00a0but the peace of mind is priceless. 2015 saw the introduction of Spanning for Office 365, which has already proven hugely popular, and you can see a demo of just how simple it is to <a href=\"http:\/\/spanning.com\/resources\/videos\/spanning-backup-for-office-365-demo\/\" target=\"_blank\">use Spanning here<\/a>.<\/p>\n<h3>Avamar 7.2<\/h3>\n<p>Avamar got an upgrade this year, too, jumping to version 7.2.\u00a0Virtualisation got a big boost in Avamar 7.2, with new features including:<\/p>\n<ul>\n<li>Support for vSphere 6<\/li>\n<li>Scaleable up to 5,000 virtual machines and 15+\u00a0vCenters<\/li>\n<li>Dynamic policies for automatic\u00a0discovery\u00a0and protection of virtual machines within subfolders<\/li>\n<li>Automatic proxy\u00a0deployment: This sees Avamar analyse the vCenter environment and recommend\u00a0<em>where<\/em> to place virtual machine backup proxies for optimum efficiency.\u00a0Particularly given the\u00a0updated scaleability in Avamar for\u00a0VMware environments\u00a0taking the hassle\u00a0out of proxy placement\u00a0is going to save\u00a0administrators a lot of time and guess-work. <a href=\"https:\/\/www.youtube.com\/watch?v=3Tip7dzWLc8\" target=\"_blank\">You can see a demo of it here<\/a>.<\/li>\n<li>Orphan snapshot\u00a0discovery and remediation<\/li>\n<li>HTML5\u00a0FLR interface<\/li>\n<\/ul>\n<p>That wasn&#8217;t all though \u2013 Avamar 7.2 also introduced:<\/p>\n<ul>\n<li>Enhancements to the REST API to cover tenant level reporting<\/li>\n<li>Scheduler enhancements \u2013 you can now define the start dates for your annual, monthly and weekly backups<\/li>\n<li>You can browse replicated data from\u00a0the source Avamar server in the replica pair<\/li>\n<li>Support for DDOS 5.6 and higher<\/li>\n<li>Updated platform support including SLES 12, Mac OS X 10.10, Ubuntu 12.04 and 14.04, CentOS 6.5 and 7, Windows 10, VNX2e, Isilon OneFS 7.2, plus\u00a0a 10Gbe NDMP accelerator<\/li>\n<\/ul>\n<h3>Data Domain 9500<\/h3>\n<p>Already\u00a0the market leader\u00a0in data protection storage,\u00a0EMC continued to stride forward with the <a href=\"http:\/\/australia.emc.com\/collateral\/specification-sheet\/h11340-datadomain-ss.pdf\" target=\"_blank\">Data Domain 9500<\/a>, a veritable beast. Some of the quick specs\u00a0of the Data Domain 9500 include:<\/p>\n<ul>\n<li>Up to 58.7 TB per hour (when backing up using\u00a0Boost)<\/li>\n<li>864TB usable capacity for active tier, up to 1.7PB usable when an extended retention tier is added. That&#8217;s the actual amount of storage; so when deduplication is added that can yield actual\u00a0protection\u00a0data storage well into the multiple-PB range. The spec sheet gives some details based on a mixed environment where the data storage might be anywhere from 8.6PB to 86.4PB<\/li>\n<li>Support for traditional ES30 shelves\u00a0<em>and<\/em> the new DS60 shelves.<\/li>\n<\/ul>\n<p>Actually it wasn&#8217;t just the Data Domain 9500 that was released this year from a DD perspective. We also saw the release of the Data\u00a0Domain 2200 \u2013 the replacement for the SMB\/ROBO DD160 appliance. The DD2200\u00a0supports more streams and more capacity than\u00a0the previous entry-level DD160, being able to scale from\u00a0a 4TB entry point to 24TB raw when expanded to 12 x 2TB drives. In short: it doesn&#8217;t matter whether you&#8217;re a small business or a huge enterprise: there&#8217;s a Data Domain model to suit your requirements.<\/p>\n<h3>Data\u00a0Domain Dense Shelves<\/h3>\n<p>The traditional ES30 Data\u00a0Domain shelves have 15 drives.\u00a02015 also saw the introduction of the DS60 \u2013\u00a0<em>dense<\/em> shelves capable of holding\u00a0<em>sixty<\/em> disks. With support for 4 TB drives, that means a single 5RU data Domain DS60 shelf can hold as much as 240TB in drives.<\/p>\n<p>The benefits of high density shelves include:<\/p>\n<ul>\n<li>Better utilisation of rack space (60 drives in one 5RU shelf vs 60 drives in 4 x 3RU shelves &#8211; 12 RU total)<\/li>\n<li>More efficient for cooling and power<\/li>\n<li>Scale as required \u2013 each DS60 takes 4 x 15 drive packs, allowing you to start with just one or two packs and build your way up as your storage requirements expand<\/li>\n<\/ul>\n<h3>DDOS 5.7<\/h3>\n<p>Data Domain OS 5.7 was also released this year, and includes features such as:<\/p>\n<ul>\n<li>Support for DS60 shelves<\/li>\n<li>Support for 4TB drives<\/li>\n<li>Support for ES30 shelves with 4TB drives (DD4500+)<\/li>\n<li>Storage migration support \u2013 migrate those older ES20 style shelves to newer storage while\u00a0the Data Domain stays online and in use<\/li>\n<li>DDBoost over fibre-channel for Solaris<\/li>\n<li>NPIV for FC, allowing up to 8 virtual FC ports per physical FC port<\/li>\n<li>Active\/Active or Active\/Passive port failover modes for fibre-channel<\/li>\n<li>Dynamic interface groups\u00a0are now supported for managed file replication and NAT<\/li>\n<li>More Secure Multi-Tenancy (SMT) support, including:\n<ul>\n<li>Tenant-units can be grouped together for a tenant<\/li>\n<li>Replication integration:\n<ul>\n<li>Strict\u00a0enforcing of replication\u00a0to ensure source and destination\u00a0tenant are the same<\/li>\n<li>Capacity quota options for destination tenant in a replica context<\/li>\n<li>Stream usage controls for replication on a per-tenant basis<\/li>\n<\/ul>\n<\/li>\n<li>Configuration wizards support SMT for<\/li>\n<li>Hard limits for stream counts per\u00a0Mtree<\/li>\n<li>Physical\u00a0Capacity Measurement (PCM) providing\u00a0space utilisation reports for:\n<ul>\n<li>Files<\/li>\n<li>Directories<\/li>\n<li>Mtrees<\/li>\n<li>Tenants<\/li>\n<li>Tenant-units<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li>Increased concurrent Mtree counts:\n<ul>\n<li>256 Mtrees for Data Domain 9500<\/li>\n<li>128 Mtrees for each of the DD990, DD4200, DD4500 and DD7200<\/li>\n<\/ul>\n<\/li>\n<li>Stream count increases \u2013 DD9500 can now scale to 1,885 simultaneous incoming streams<\/li>\n<li>Enhanced CIFS support<\/li>\n<li>Open file replication \u2013 great for\u00a0backups of large databases, etc. This allows the backup to start replicating before it&#8217;s even finished.<\/li>\n<li>ProtectPoint for XtremIO<\/li>\n<\/ul>\n<h3>Data Protection Suite (DPS) for\u00a0VMware<\/h3>\n<p><a href=\"http:\/\/australia.emc.com\/data-protection\/protection-vmware.htm\" target=\"_blank\">DPS for VMware<\/a> is a new socket-based licensing model for mid-market businesses that are highly virtualized and want\u00a0an\u00a0effective enterprise-grade data protection solution.\u00a0Providing Avamar,\u00a0Data Protection Advisor\u00a0and RecoverPoint for Virtual Machines, DPS for VMware is priced based on\u00a0the number of CPU sockets (<em>not<\/em> cores)\u00a0in the environment.<\/p>\n<p>DPS for\u00a0VMware is ideally suited for organisations that are either 100% virtualised or just have a few remaining machines that are physical. You get the full range of Avamar backup and recovery\u00a0options, Data Protection Advisor to monitor and report on\u00a0data\u00a0protection status,\u00a0capacity and trends within the\u00a0environment,\u00a0<em>and<\/em>\u00a0RecoverPoint for a highly efficient\u00a0journaled replication of critical\u00a0virtual machines.<\/p>\n<h3>&#8230;And one minor thing<\/h3>\n<p>There was at least one other bit of data protection news this year, and that was me finally joining EMC. I know in the grand scheme of things it&#8217;s a pretty minor point, but after years of wanting to work for EMC it felt\u00a0like I was coming home. I had worked in the system integrator space for almost 15 years and have a great appreciation for the contribution integrators bring to the market. That being said, getting to work from\u00a0<em>within<\/em> a company that is so focused on bringing excellent data protection products to the market is an amazing feeling.\u00a0It&#8217;s easy from the outside to think everything\u00a0is done for profit or\u00a0shareholder value, but EMC\u00a0and its employees have a\u00a0real passion for their products and the change they bring to IT, business and the community as a whole. So you might say that <strong>personally<\/strong>, me joining EMC was the biggest data protection news for the year.<\/p>\n<h3>In Summary<\/h3>\n<p>I&#8217;m willing to bet I forgot something in the list above. It&#8217;s been a\u00a0<em>big<\/em> year for Data Protection at\u00a0EMC. Every time I&#8217;ve turned around there&#8217;s\u00a0been new releases or updates, new features or functions, and new options to ensure that no matter\u00a0<em>where<\/em> the data is or how critical the data is to the\u00a0organisation, EMC has an\u00a0effective data protection strategy for it. I&#8217;m almost feeling a little bit exhausted having come up with the list above!<\/p>\n<p>So I&#8217;ll end on a slightly different note (literally).\u00a0If after a long year working with or thinking about Data Protection you want to chill for five minutes, listen to Kate Miller-Heidke&#8217;s cover of &#8220;Love is a Stranger&#8221;. She&#8217;s\u00a0one of the best artists to emerge from Australia in the last decade. <a href=\"https:\/\/www.youtube.com\/watch?v=GlXVZfTxexs\" target=\"_blank\">It&#8217;s hard to believe she did this cover over two years ago now, but it&#8217;s still great listening<\/a>.<\/p>\n<p>I&#8217;ll see you all in 2016! <a href=\"https:\/\/nsrd.info\/blog\/2015\/12\/01\/networker-usage-survey-for-2015\/\" target=\"_blank\"><strong>Oh, and don&#8217;t forget the survey<\/strong><\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As we approach\u00a0the end of 2015 I wanted to spend a bit of time reflecting on some of the data\u00a0protection&hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[1154,1133,1229,1181,9,356,12,13,16,19,1213],"tags":[1285,1282,134,1271,1272,175,1230,275,1283,1281,1287,1288,1291,1292,1289,1290,1249,1278,1280,1279,1286,1284,1277,916],"class_list":["post-5766","post","type-post","status-publish","format-standard","hentry","category-avamar-2","category-best-practice","category-cloud","category-data-domain-2","category-databases","category-emc","category-general-technology","category-general-thoughts","category-networker","category-recovery","category-vba","tag-1285","tag-application-agent","tag-avamar","tag-bbb","tag-block-based-backup","tag-boost","tag-cloudboost","tag-data-domain","tag-data-domain-boost","tag-database-agent","tag-dd9500","tag-ddos","tag-dps","tag-dps-for-vmware","tag-ds60","tag-es30","tag-networker","tag-nmda","tag-nmm","tag-nsm","tag-o365","tag-office-365","tag-protectpoint","tag-spanning"],"aioseo_notices":[],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/pKpIN-1v0","jetpack_sharing_enabled":true,"jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/posts\/5766","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/comments?post=5766"}],"version-history":[{"count":14,"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/posts\/5766\/revisions"}],"predecessor-version":[{"id":5806,"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/posts\/5766\/revisions\/5806"}],"wp:attachment":[{"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/media?parent=5766"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/categories?post=5766"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/tags?post=5766"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}