@alextray
30I am a multi-certified system administrator and a cybersecurity consultant with over seven years of experience.
steemit.com/@alextrayVOTING POWER100.00%
DOWNVOTE POWER100.00%
RESOURCE CREDITS100.00%
REPUTATION PROGRESS16.24%
Net Worth
0.006USD
STEEM
0.066STEEM
SBD
0.000SBD
Effective Power
3.405SP
├── Own SP
0.049SP
└── Incoming DelegationsDeleg
+3.356SP
Detailed Balance
| STEEM | ||
| balance | 0.066STEEM | STEEM |
| market_balance | 0.000STEEM | STEEM |
| savings_balance | 0.000STEEM | STEEM |
| reward_steem_balance | 0.000STEEM | STEEM |
| STEEM POWER | ||
| Own SP | 0.049SP | SP |
| Delegated Out | 0.000SP | SP |
| Delegation In | 3.356SP | SP |
| Effective Power | 3.405SP | SP |
| Reward SP (pending) | 0.000SP | SP |
| SBD | ||
| sbd_balance | 0.000SBD | SBD |
| sbd_conversions | 0.000SBD | SBD |
| sbd_market_balance | 0.000SBD | SBD |
| savings_sbd_balance | 0.000SBD | SBD |
| reward_sbd_balance | 0.000SBD | SBD |
{
"balance": "0.066 STEEM",
"savings_balance": "0.000 STEEM",
"reward_steem_balance": "0.000 STEEM",
"vesting_shares": "79.137618 VESTS",
"delegated_vesting_shares": "0.000000 VESTS",
"received_vesting_shares": "5465.462359 VESTS",
"sbd_balance": "0.000 SBD",
"savings_sbd_balance": "0.000 SBD",
"reward_sbd_balance": "0.000 SBD",
"conversions": []
}Account Info
| name | alextray |
| id | 1692472 |
| rank | 837,630 |
| reputation | 3746234950 |
| created | 2022-02-15T12:09:27 |
| recovery_account | steem |
| proxy | None |
| post_count | 8 |
| comment_count | 0 |
| lifetime_vote_count | 0 |
| witnesses_voted_for | 0 |
| last_post | 2024-03-22T07:12:06 |
| last_root_post | 2024-03-22T07:12:06 |
| last_vote_time | 1970-01-01T00:00:00 |
| proxied_vsf_votes | 0, 0, 0, 0 |
| can_vote | 1 |
| voting_power | 0 |
| delayed_votes | 0 |
| balance | 0.066 STEEM |
| savings_balance | 0.000 STEEM |
| sbd_balance | 0.000 SBD |
| savings_sbd_balance | 0.000 SBD |
| vesting_shares | 79.137618 VESTS |
| delegated_vesting_shares | 0.000000 VESTS |
| received_vesting_shares | 5465.462359 VESTS |
| reward_vesting_balance | 0.000000 VESTS |
| vesting_balance | 0.000 STEEM |
| vesting_withdraw_rate | 0.000000 VESTS |
| next_vesting_withdrawal | 1969-12-31T23:59:59 |
| withdrawn | 0 |
| to_withdraw | 0 |
| withdraw_routes | 0 |
| savings_withdraw_requests | 0 |
| last_account_recovery | 1970-01-01T00:00:00 |
| reset_account | null |
| last_owner_update | 1970-01-01T00:00:00 |
| last_account_update | 2023-03-17T07:25:42 |
| mined | No |
| sbd_seconds | 0 |
| sbd_last_interest_payment | 1970-01-01T00:00:00 |
| savings_sbd_last_interest_payment | 1970-01-01T00:00:00 |
{
"id": 1692472,
"name": "alextray",
"owner": {
"weight_threshold": 1,
"account_auths": [],
"key_auths": [
[
"STM8gyuqz2HES33Kxb3LBFx1oDGmcbhmyntZzrzA8KYHXyCr56eRX",
1
]
]
},
"active": {
"weight_threshold": 1,
"account_auths": [],
"key_auths": [
[
"STM5m7zkLpHng98gKLrx3AMsYvqwCi3ncVavnctmTBhG3mdf2Njhz",
1
]
]
},
"posting": {
"weight_threshold": 1,
"account_auths": [],
"key_auths": [
[
"STM6qrQ18CcXrftaB2LrE8HxQkust2ABmJsUzbMzjqhefFgKpb6dd",
1
]
]
},
"memo_key": "STM7RF59s2YTB3Sm5cwXvHtSt7nba2JsCTDd9oxBYFRkcnKRtqPBJ",
"json_metadata": "{}",
"posting_json_metadata": "{\"profile\":{\"profile_image\":\"https://cdn.steemitimages.com/DQmVUmHhFnJzqvZRN4DZPkpaqbi4uee96cQqwZakr4NLmiZ/Alex%20Tray.jpeg\",\"name\":\"Alex Tray\",\"about\":\"I am a multi-certified system administrator and a cybersecurity consultant with over seven years of experience.\",\"location\":\"Nevada\",\"website\":\"https://muckrack.com/alex-tray\",\"version\":2}}",
"proxy": "",
"last_owner_update": "1970-01-01T00:00:00",
"last_account_update": "2023-03-17T07:25:42",
"created": "2022-02-15T12:09:27",
"mined": false,
"recovery_account": "steem",
"last_account_recovery": "1970-01-01T00:00:00",
"reset_account": "null",
"comment_count": 0,
"lifetime_vote_count": 0,
"post_count": 8,
"can_vote": true,
"voting_manabar": {
"current_mana": "5544599977",
"last_update_time": 1753611633
},
"downvote_manabar": {
"current_mana": 1386149994,
"last_update_time": 1753611633
},
"voting_power": 0,
"balance": "0.066 STEEM",
"savings_balance": "0.000 STEEM",
"sbd_balance": "0.000 SBD",
"sbd_seconds": "0",
"sbd_seconds_last_update": "2024-03-22T07:19:45",
"sbd_last_interest_payment": "1970-01-01T00:00:00",
"savings_sbd_balance": "0.000 SBD",
"savings_sbd_seconds": "0",
"savings_sbd_seconds_last_update": "1970-01-01T00:00:00",
"savings_sbd_last_interest_payment": "1970-01-01T00:00:00",
"savings_withdraw_requests": 0,
"reward_sbd_balance": "0.000 SBD",
"reward_steem_balance": "0.000 STEEM",
"reward_vesting_balance": "0.000000 VESTS",
"reward_vesting_steem": "0.000 STEEM",
"vesting_shares": "79.137618 VESTS",
"delegated_vesting_shares": "0.000000 VESTS",
"received_vesting_shares": "5465.462359 VESTS",
"vesting_withdraw_rate": "0.000000 VESTS",
"next_vesting_withdrawal": "1969-12-31T23:59:59",
"withdrawn": 0,
"to_withdraw": 0,
"withdraw_routes": 0,
"curation_rewards": 0,
"posting_rewards": 88,
"proxied_vsf_votes": [
0,
0,
0,
0
],
"witnesses_voted_for": 0,
"last_post": "2024-03-22T07:12:06",
"last_root_post": "2024-03-22T07:12:06",
"last_vote_time": "1970-01-01T00:00:00",
"post_bandwidth": 0,
"pending_claimed_accounts": 0,
"vesting_balance": "0.000 STEEM",
"reputation": 3746234950,
"transfer_history": [],
"market_history": [],
"post_history": [],
"vote_history": [],
"other_history": [],
"witness_votes": [],
"tags_usage": [],
"guest_bloggers": [],
"rank": 837630
}Withdraw Routes
| Incoming | Outgoing |
|---|---|
Empty | Empty |
{
"incoming": [],
"outgoing": []
}From Date
To Date
2025/07/27 10:20:33
2025/07/27 10:20:33
| delegator | steem |
| delegatee | alextray |
| vesting shares | 5465.462359 VESTS |
| Transaction Info | Block #97683647/Trx b8f041bf48dc9d9d9c6bdb391da8a1f541f2a98b |
View Raw JSON Data
{
"trx_id": "b8f041bf48dc9d9d9c6bdb391da8a1f541f2a98b",
"block": 97683647,
"trx_in_block": 1,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2025-07-27T10:20:33",
"op": [
"delegate_vesting_shares",
{
"delegator": "steem",
"delegatee": "alextray",
"vesting_shares": "5465.462359 VESTS"
}
]
}2024/06/21 10:18:45
2024/06/21 10:18:45
| delegator | steem |
| delegatee | alextray |
| vesting shares | 5631.829736 VESTS |
| Transaction Info | Block #86170631/Trx de111f09058ac8ccd716ae88524a340ed55d1d83 |
View Raw JSON Data
{
"trx_id": "de111f09058ac8ccd716ae88524a340ed55d1d83",
"block": 86170631,
"trx_in_block": 4,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2024-06-21T10:18:45",
"op": [
"delegate_vesting_shares",
{
"delegator": "steem",
"delegatee": "alextray",
"vesting_shares": "5631.829736 VESTS"
}
]
}alextrayclaimed reward balance: 0.044 STEEM, 0.049 SP2024/03/22 07:19:45
alextrayclaimed reward balance: 0.044 STEEM, 0.049 SP
2024/03/22 07:19:45
| account | alextray |
| reward steem | 0.044 STEEM |
| reward sbd | 0.000 SBD |
| reward vests | 79.137618 VESTS |
| Transaction Info | Block #83560889/Trx 07ed0690e2bd9e8ce1b48180b49348223954e65d |
View Raw JSON Data
{
"trx_id": "07ed0690e2bd9e8ce1b48180b49348223954e65d",
"block": 83560889,
"trx_in_block": 0,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2024-03-22T07:19:45",
"op": [
"claim_reward_balance",
{
"account": "alextray",
"reward_steem": "0.044 STEEM",
"reward_sbd": "0.000 SBD",
"reward_vests": "79.137618 VESTS"
}
]
}bluesnipersent 0.010 STEEM to @alextray- "Hello. Good to see you on Steem. To maximize your rewards, publish your post also on Hive ( hive.blog ) and Blurt ( blurt.blog ) blockchains. Use upvu, jsup or ctime and get instant upvotes"2024/03/22 07:17:51
bluesnipersent 0.010 STEEM to @alextray- "Hello. Good to see you on Steem. To maximize your rewards, publish your post also on Hive ( hive.blog ) and Blurt ( blurt.blog ) blockchains. Use upvu, jsup or ctime and get instant upvotes"
2024/03/22 07:17:51
| from | bluesniper |
| to | alextray |
| amount | 0.010 STEEM |
| memo | Hello. Good to see you on Steem. To maximize your rewards, publish your post also on Hive ( hive.blog ) and Blurt ( blurt.blog ) blockchains. Use upvu, jsup or ctime and get instant upvotes |
| Transaction Info | Block #83560851/Trx c907405560a960b72ad434cb8518425f6d03b619 |
View Raw JSON Data
{
"trx_id": "c907405560a960b72ad434cb8518425f6d03b619",
"block": 83560851,
"trx_in_block": 8,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2024-03-22T07:17:51",
"op": [
"transfer",
{
"from": "bluesniper",
"to": "alextray",
"amount": "0.010 STEEM",
"memo": "Hello. Good to see you on Steem. To maximize your rewards, publish your post also on Hive ( hive.blog ) and Blurt ( blurt.blog ) blockchains. Use upvu, jsup or ctime and get instant upvotes"
}
]
}2024/03/22 07:17:30
2024/03/22 07:17:30
| voter | bluesniper |
| author | alextray |
| permlink | hyper-v-backup-mistakes-to-avoid-lessons-for-secure-virtual-infrastructure |
| weight | 10000 (100.00%) |
| Transaction Info | Block #83560844/Trx 2edf8046314c83c09f43c5f92a242c5390670592 |
View Raw JSON Data
{
"trx_id": "2edf8046314c83c09f43c5f92a242c5390670592",
"block": 83560844,
"trx_in_block": 6,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2024-03-22T07:17:30",
"op": [
"vote",
{
"voter": "bluesniper",
"author": "alextray",
"permlink": "hyper-v-backup-mistakes-to-avoid-lessons-for-secure-virtual-infrastructure",
"weight": 10000
}
]
}alextraypublished a new post: hyper-v-backup-mistakes-to-avoid-lessons-for-secure-virtual-infrastructure2024/03/22 07:12:06
alextraypublished a new post: hyper-v-backup-mistakes-to-avoid-lessons-for-secure-virtual-infrastructure
2024/03/22 07:12:06
| parent author | |
| parent permlink | hyper-v |
| author | alextray |
| permlink | hyper-v-backup-mistakes-to-avoid-lessons-for-secure-virtual-infrastructure |
| title | Hyper-V Backup Mistakes to Avoid: Lessons for Secure Virtual Infrastructure |
| body | <html> <p>In the realm of virtualization, Hyper-V has become a cornerstone for many businesses, offering a flexible and efficient platform for running virtual machines (VMs). As with any technology, however, the implementation of Hyper-V requires careful consideration—especially when it comes to backup and disaster recovery strategies. Mistakes in this critical area can lead to data loss, security vulnerabilities, and significant operational disruptions. This article dives into common Hyper-V backup mistakes to avoid, providing key lessons to ensure a secure and resilient virtual infrastructure.</p> <h4>1. Overlooking the Importance of Regular Testing</h4> <p>One of the most glaring mistakes is the failure to regularly test backup systems. Without testing, there's no real assurance that backups are complete, intact, and ready for a swift recovery. Regular testing verifies not only the integrity of backups but also the effectiveness of the recovery process, ensuring minimal downtime in disaster scenarios.</p> <p><strong>Lesson:</strong> Implement a routine schedule for backup testing, including trial restorations, to validate data integrity and recovery procedures.</p> <h4>2. Neglecting Application-Consistent Backup</h4> <p>Relying solely on crash-consistent backups, which capture the state of the VM at a specific point in time, can result in incomplete data recovery for applications not designed to recover from such states. This oversight can lead to data corruption or loss.</p> <p><strong>Lesson:</strong> Ensure application-consistent backups are part of your strategy. These backups invoke application-specific APIs to flush in-memory data and transactions to disk, guaranteeing a complete and clean recovery.</p> <h4>3. Underestimating the Impact of Storage Choices</h4> <p>The choice of storage for Hyper-V backups significantly affects both performance and recovery. Opting for low-cost or inefficient storage solutions can lead to slow backup and recovery times, impacting business operations.</p> <p><strong>Lesson:</strong> Invest in high-quality, scalable storage solutions that meet your backup and recovery time objectives. Consider cloud storage options for added flexibility and scalability.</p> <h4>4. Ignoring the Need for Offsite Backups</h4> <p>Storing all backups in a single location, particularly on-site, poses a significant risk. Natural disasters, fires, or targeted cyber attacks can obliterate onsite backups, leaving no recourse for data recovery.</p> <p><strong>Lesson:</strong> Diversify your backup storage by incorporating offsite or cloud backups into your strategy. This approach enhances data protection and aids in disaster recovery.</p> <h4>5. Disregarding Advanced Security Measures</h4> <p>In today's cybersecurity landscape, backups can become targets for ransomware and other malicious attacks. Failing to secure backup data and infrastructure exposes vulnerabilities that can be exploited.</p> <p><strong>Lesson:</strong> Implement robust security measures, including encryption, access controls, and network security, to protect your backup data. Regularly update and patch backup systems to defend against the latest threats.</p> <h4>6. Failing to Plan for Scalability</h4> <p>As businesses grow, so does their data. A backup solution that isn't scalable can quickly become inadequate, leading to insufficient backup coverage and increased risk.</p> <p><strong>Lesson:</strong> Choose a Hyper-V backup solution that offers scalability to accommodate future growth. Regularly review and adjust your backup capacity to align with current data volumes.</p> <h4>7. Overcomplicating the Backup Process</h4> <p>Complex backup processes are more prone to errors and can be challenging to manage, especially in high-stress recovery situations. Simplicity in backup procedures ensures reliability and efficiency.</p> <p><strong>Lesson:</strong> Streamline your backup processes where possible. Automate repetitive tasks and ensure that backup procedures are well documented and easy to follow.</p> <h4>Conclusion</h4> <p>Avoiding these common mistakes in Hyper-V backup strategies can significantly enhance the security and resilience of your virtual infrastructure. By embracing regular testing, ensuring application-consistent backups, making informed storage choices, incorporating offsite backups, implementing advanced security measures, planning for scalability, and streamlining backup processes, organizations can protect their virtual environments against data loss and downtime. These lessons not only safeguard data but also support business continuity in an increasingly digital world.</p> </html> |
| json metadata | {"tags":["hyper-v","backup","virtual","infrastructure"],"app":"steemit/0.2","format":"html"} |
| Transaction Info | Block #83560737/Trx 17f24fe7e5242c6af7e0ae11f636c7499326ab67 |
View Raw JSON Data
{
"trx_id": "17f24fe7e5242c6af7e0ae11f636c7499326ab67",
"block": 83560737,
"trx_in_block": 1,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2024-03-22T07:12:06",
"op": [
"comment",
{
"parent_author": "",
"parent_permlink": "hyper-v",
"author": "alextray",
"permlink": "hyper-v-backup-mistakes-to-avoid-lessons-for-secure-virtual-infrastructure",
"title": "Hyper-V Backup Mistakes to Avoid: Lessons for Secure Virtual Infrastructure",
"body": "<html>\n<p>In the realm of virtualization, Hyper-V has become a cornerstone for many businesses, offering a flexible and efficient platform for running virtual machines (VMs). As with any technology, however, the implementation of Hyper-V requires careful consideration—especially when it comes to backup and disaster recovery strategies. Mistakes in this critical area can lead to data loss, security vulnerabilities, and significant operational disruptions. This article dives into common Hyper-V backup mistakes to avoid, providing key lessons to ensure a secure and resilient virtual infrastructure.</p>\n<h4>1. Overlooking the Importance of Regular Testing</h4>\n<p>One of the most glaring mistakes is the failure to regularly test backup systems. Without testing, there's no real assurance that backups are complete, intact, and ready for a swift recovery. Regular testing verifies not only the integrity of backups but also the effectiveness of the recovery process, ensuring minimal downtime in disaster scenarios.</p>\n<p><strong>Lesson:</strong> Implement a routine schedule for backup testing, including trial restorations, to validate data integrity and recovery procedures.</p>\n<h4>2. Neglecting Application-Consistent Backup</h4>\n<p>Relying solely on crash-consistent backups, which capture the state of the VM at a specific point in time, can result in incomplete data recovery for applications not designed to recover from such states. This oversight can lead to data corruption or loss.</p>\n<p><strong>Lesson:</strong> Ensure application-consistent backups are part of your strategy. These backups invoke application-specific APIs to flush in-memory data and transactions to disk, guaranteeing a complete and clean recovery.</p>\n<h4>3. Underestimating the Impact of Storage Choices</h4>\n<p>The choice of storage for Hyper-V backups significantly affects both performance and recovery. Opting for low-cost or inefficient storage solutions can lead to slow backup and recovery times, impacting business operations.</p>\n<p><strong>Lesson:</strong> Invest in high-quality, scalable storage solutions that meet your backup and recovery time objectives. Consider cloud storage options for added flexibility and scalability.</p>\n<h4>4. Ignoring the Need for Offsite Backups</h4>\n<p>Storing all backups in a single location, particularly on-site, poses a significant risk. Natural disasters, fires, or targeted cyber attacks can obliterate onsite backups, leaving no recourse for data recovery.</p>\n<p><strong>Lesson:</strong> Diversify your backup storage by incorporating offsite or cloud backups into your strategy. This approach enhances data protection and aids in disaster recovery.</p>\n<h4>5. Disregarding Advanced Security Measures</h4>\n<p>In today's cybersecurity landscape, backups can become targets for ransomware and other malicious attacks. Failing to secure backup data and infrastructure exposes vulnerabilities that can be exploited.</p>\n<p><strong>Lesson:</strong> Implement robust security measures, including encryption, access controls, and network security, to protect your backup data. Regularly update and patch backup systems to defend against the latest threats.</p>\n<h4>6. Failing to Plan for Scalability</h4>\n<p>As businesses grow, so does their data. A backup solution that isn't scalable can quickly become inadequate, leading to insufficient backup coverage and increased risk.</p>\n<p><strong>Lesson:</strong> Choose a Hyper-V backup solution that offers scalability to accommodate future growth. Regularly review and adjust your backup capacity to align with current data volumes.</p>\n<h4>7. Overcomplicating the Backup Process</h4>\n<p>Complex backup processes are more prone to errors and can be challenging to manage, especially in high-stress recovery situations. Simplicity in backup procedures ensures reliability and efficiency.</p>\n<p><strong>Lesson:</strong> Streamline your backup processes where possible. Automate repetitive tasks and ensure that backup procedures are well documented and easy to follow.</p>\n<h4>Conclusion</h4>\n<p>Avoiding these common mistakes in Hyper-V backup strategies can significantly enhance the security and resilience of your virtual infrastructure. By embracing regular testing, ensuring application-consistent backups, making informed storage choices, incorporating offsite backups, implementing advanced security measures, planning for scalability, and streamlining backup processes, organizations can protect their virtual environments against data loss and downtime. These lessons not only safeguard data but also support business continuity in an increasingly digital world.</p>\n</html>",
"json_metadata": "{\"tags\":[\"hyper-v\",\"backup\",\"virtual\",\"infrastructure\"],\"app\":\"steemit/0.2\",\"format\":\"html\"}"
}
]
}bluesnipersent 0.010 STEEM to @alextray- "Hello. Good to see you on Steem. To maximize your rewards, publish your post also on Hive ( hive.blog ) and Blurt ( blurt.blog ) blockchains. Use upvu, jsup or ctime and get instant upvotes"2024/03/15 12:47:30
bluesnipersent 0.010 STEEM to @alextray- "Hello. Good to see you on Steem. To maximize your rewards, publish your post also on Hive ( hive.blog ) and Blurt ( blurt.blog ) blockchains. Use upvu, jsup or ctime and get instant upvotes"
2024/03/15 12:47:30
| from | bluesniper |
| to | alextray |
| amount | 0.010 STEEM |
| memo | Hello. Good to see you on Steem. To maximize your rewards, publish your post also on Hive ( hive.blog ) and Blurt ( blurt.blog ) blockchains. Use upvu, jsup or ctime and get instant upvotes |
| Transaction Info | Block #83366488/Trx 3f9cef315a61b7b37b6af5abfdfb6e8a16dc14c4 |
View Raw JSON Data
{
"trx_id": "3f9cef315a61b7b37b6af5abfdfb6e8a16dc14c4",
"block": 83366488,
"trx_in_block": 0,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2024-03-15T12:47:30",
"op": [
"transfer",
{
"from": "bluesniper",
"to": "alextray",
"amount": "0.010 STEEM",
"memo": "Hello. Good to see you on Steem. To maximize your rewards, publish your post also on Hive ( hive.blog ) and Blurt ( blurt.blog ) blockchains. Use upvu, jsup or ctime and get instant upvotes"
}
]
}bluesniperupvoted (100.00%) @alextray / implementing-disaster-recovery-with-aws-ec2-backup2024/03/15 12:47:06
bluesniperupvoted (100.00%) @alextray / implementing-disaster-recovery-with-aws-ec2-backup
2024/03/15 12:47:06
| voter | bluesniper |
| author | alextray |
| permlink | implementing-disaster-recovery-with-aws-ec2-backup |
| weight | 10000 (100.00%) |
| Transaction Info | Block #83366480/Trx bbb3d89649cfc9723819710b498d830a792bc5b5 |
View Raw JSON Data
{
"trx_id": "bbb3d89649cfc9723819710b498d830a792bc5b5",
"block": 83366480,
"trx_in_block": 2,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2024-03-15T12:47:06",
"op": [
"vote",
{
"voter": "bluesniper",
"author": "alextray",
"permlink": "implementing-disaster-recovery-with-aws-ec2-backup",
"weight": 10000
}
]
}alextraypublished a new post: implementing-disaster-recovery-with-aws-ec2-backup2024/03/15 12:41:39
alextraypublished a new post: implementing-disaster-recovery-with-aws-ec2-backup
2024/03/15 12:41:39
| parent author | |
| parent permlink | aws |
| author | alextray |
| permlink | implementing-disaster-recovery-with-aws-ec2-backup |
| title | Implementing Disaster Recovery with AWS EC2 Backup |
| body | <html> <p><strong>In an era where data is king, ensuring the continuity and resilience of digital infrastructure against disasters is paramount for businesses. Disruptions can stem from natural calamities, cybersecurity incidents, or even accidental deletions—each capable of derailing operations and incurring significant losses. Amazon Web Services (AWS) Elastic Compute Cloud (EC2) stands out as a versatile tool in fortifying disaster recovery (DR) strategies, offering robust solutions for data backup and system restoration. This article delves into harnessing AWS EC2 for disaster recovery, guiding IT professionals through planning, implementation, and maintenance of effective DR plans.</strong></p> <h2><strong>Understanding Disaster Recovery (DR)</strong></h2> <p><strong>Disaster recovery encompasses the policies, tools, and procedures designed to restore vital technological infrastructure following a disaster. Distinct from broader business continuity plans, DR zeroes in on IT and technological systems critical to business functions.</strong></p> <p><strong>AWS revolutionizes traditional DR approaches by providing scalable, flexible, and cost-efficient platforms for backup, storage, and recovery. Its global infrastructure diminishes the need for physical hardware, simplifying the creation of a resilient IT backbone and offering a gamut of services to support varied DR requirements.</strong></p> <h2><strong>Overview of AWS EC2</strong></h2> <p><strong>AWS EC2 offers scalable computing capacity, enabling users to launch virtual servers, manage storage, and adjust computing resources with ease. It supports diverse workloads with a variety of instance types, each tailored for specific needs, whether it be high memory usage or intensive processing tasks. For disaster recovery, EC2's pivotal features include Amazon Machine Images (AMIs) for server snapshot creation, Elastic Block Store (EBS) for persistent block storage, and the ability to rapidly scale resources, ensuring minimal downtime during disaster recovery.</strong></p> <h2><strong>Planning Your EC2 Disaster Recovery Strategy</strong></h2> <p><strong>A sound DR strategy begins with a comprehensive assessment of disaster recovery needs, evaluating the criticality of systems and data to prioritize recovery efforts. Key metrics, Recovery Point Objective (RPO) and Recovery Time Objective (RTO), define acceptable data loss and target times for system restoration, respectively.</strong></p> <p><strong>AWS EC2 supports various backup and recovery options, such as:</strong></p> <ul><li><p><strong>Snapshots for incremental backups of EBS volumes, crucial for data-dense applications.</strong></p></li><li><p><strong>AMIs to capture entire server states, facilitating swift instance replacement.</strong></p></li><li><p><strong>EBS Volumes for creating durable, attachable storage options, enhancing recovery speed.</strong></p></li></ul> <p><strong>Aligning these tools with your organization’s RPO and RTO is essential for a balanced, cost-effective DR strategy.</strong></p> <h2><strong>Implementing AWS EC2 Backup</strong></h2> <p><strong>The implementation of EC2 backups is pivotal for DR preparedness, entailing:</strong></p> <ul><li><p><strong>EBS Volume Snapshots: Through the AWS Management Console, users can easily create and manage snapshots, providing point-in-time backups for rapid data restoration.</strong></p></li><li><p><strong>AWS Backup Automation: AWS Backup centralizes backup management across services, automating the creation of backups based on predefined rules, thereby reducing manual overhead and enhancing reliability.</strong></p></li><li><p><strong>AMI Creation: For comprehensive instance backups, creating AMIs captures the complete server setup, streamlining the launch of replacement instances in disaster scenarios.</strong></p></li></ul> <p><strong>Secure and efficient backup practices include encrypting data, regularly testing backup integrity, and optimizing backup schedules based on data criticality and change rates.</strong></p> <h2><strong>Disaster Recovery Scenarios and Solutions</strong></h2> <p><strong>DR planning with AWS EC2 must consider various scenarios, from data loss to regional outages. AWS’s flexibility supports tailored solutions, such as:</strong></p> <ul><li><p><strong>Data Loss Recovery: Utilizing snapshots and AMIs for rapid data and instance recovery.</strong></p></li><li><p><strong>Server Failure Mitigation: Employing AMIs and Auto Scaling to maintain service availability.</strong></p></li><li><p><strong>Regional Outage Preparedness: Implementing multi-region architectures with services like Route 53 and CloudFront for seamless traffic redirection.</strong></p></li></ul> <p><strong>Strategies like the pilot light, warm standby, and multi-site setups can be matched to specific scenarios, balancing cost with RTO and RPO requirements.</strong></p> <h2><strong>Testing and Maintaining Your DR Plan</strong></h2> <p><strong>The effectiveness of a DR plan lies in its regular testing and upkeep. Simulating various disaster scenarios helps uncover weaknesses, ensuring readiness. Automating tests, involving all stakeholders, and updating the DR plan to reflect infrastructural or operational changes are critical for maintaining relevance and efficacy.</strong></p> <h2><strong>Conclusion</strong></h2> <p><strong>Leveraging AWS EC2 for disaster recovery equips businesses with the tools necessary to protect against IT disruptions, ensuring data integrity and system availability. Through strategic planning, execution of EC2’s robust backup features, and diligent plan maintenance, organizations can establish a resilient defense against unforeseen disasters. However, complementing AWS services with third-party solutions like</strong><a href="https://www.nakivo.com/aws-ec2-instance-backup/"><strong> NAKIVO backup</strong></a><strong> can further enhance your disaster recovery capabilities.</strong></p> </html> |
| json metadata | {"tags":["aws","ec2","backup","data"],"links":["https://www.nakivo.com/aws-ec2-instance-backup/"],"app":"steemit/0.2","format":"html"} |
| Transaction Info | Block #83366372/Trx 3d23d14723e60ef3c4486dfe8bca44b20fd0908c |
View Raw JSON Data
{
"trx_id": "3d23d14723e60ef3c4486dfe8bca44b20fd0908c",
"block": 83366372,
"trx_in_block": 2,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2024-03-15T12:41:39",
"op": [
"comment",
{
"parent_author": "",
"parent_permlink": "aws",
"author": "alextray",
"permlink": "implementing-disaster-recovery-with-aws-ec2-backup",
"title": "Implementing Disaster Recovery with AWS EC2 Backup",
"body": "<html>\n<p><strong>In an era where data is king, ensuring the continuity and resilience of digital infrastructure against disasters is paramount for businesses. Disruptions can stem from natural calamities, cybersecurity incidents, or even accidental deletions—each capable of derailing operations and incurring significant losses. Amazon Web Services (AWS) Elastic Compute Cloud (EC2) stands out as a versatile tool in fortifying disaster recovery (DR) strategies, offering robust solutions for data backup and system restoration. This article delves into harnessing AWS EC2 for disaster recovery, guiding IT professionals through planning, implementation, and maintenance of effective DR plans.</strong></p>\n<h2><strong>Understanding Disaster Recovery (DR)</strong></h2>\n<p><strong>Disaster recovery encompasses the policies, tools, and procedures designed to restore vital technological infrastructure following a disaster. Distinct from broader business continuity plans, DR zeroes in on IT and technological systems critical to business functions.</strong></p>\n<p><strong>AWS revolutionizes traditional DR approaches by providing scalable, flexible, and cost-efficient platforms for backup, storage, and recovery. Its global infrastructure diminishes the need for physical hardware, simplifying the creation of a resilient IT backbone and offering a gamut of services to support varied DR requirements.</strong></p>\n<h2><strong>Overview of AWS EC2</strong></h2>\n<p><strong>AWS EC2 offers scalable computing capacity, enabling users to launch virtual servers, manage storage, and adjust computing resources with ease. It supports diverse workloads with a variety of instance types, each tailored for specific needs, whether it be high memory usage or intensive processing tasks. For disaster recovery, EC2's pivotal features include Amazon Machine Images (AMIs) for server snapshot creation, Elastic Block Store (EBS) for persistent block storage, and the ability to rapidly scale resources, ensuring minimal downtime during disaster recovery.</strong></p>\n<h2><strong>Planning Your EC2 Disaster Recovery Strategy</strong></h2>\n<p><strong>A sound DR strategy begins with a comprehensive assessment of disaster recovery needs, evaluating the criticality of systems and data to prioritize recovery efforts. Key metrics, Recovery Point Objective (RPO) and Recovery Time Objective (RTO), define acceptable data loss and target times for system restoration, respectively.</strong></p>\n<p><strong>AWS EC2 supports various backup and recovery options, such as:</strong></p>\n<ul><li><p><strong>Snapshots for incremental backups of EBS volumes, crucial for data-dense applications.</strong></p></li><li><p><strong>AMIs to capture entire server states, facilitating swift instance replacement.</strong></p></li><li><p><strong>EBS Volumes for creating durable, attachable storage options, enhancing recovery speed.</strong></p></li></ul>\n<p><strong>Aligning these tools with your organization’s RPO and RTO is essential for a balanced, cost-effective DR strategy.</strong></p>\n<h2><strong>Implementing AWS EC2 Backup</strong></h2>\n<p><strong>The implementation of EC2 backups is pivotal for DR preparedness, entailing:</strong></p>\n<ul><li><p><strong>EBS Volume Snapshots: Through the AWS Management Console, users can easily create and manage snapshots, providing point-in-time backups for rapid data restoration.</strong></p></li><li><p><strong>AWS Backup Automation: AWS Backup centralizes backup management across services, automating the creation of backups based on predefined rules, thereby reducing manual overhead and enhancing reliability.</strong></p></li><li><p><strong>AMI Creation: For comprehensive instance backups, creating AMIs captures the complete server setup, streamlining the launch of replacement instances in disaster scenarios.</strong></p></li></ul>\n<p><strong>Secure and efficient backup practices include encrypting data, regularly testing backup integrity, and optimizing backup schedules based on data criticality and change rates.</strong></p>\n<h2><strong>Disaster Recovery Scenarios and Solutions</strong></h2>\n<p><strong>DR planning with AWS EC2 must consider various scenarios, from data loss to regional outages. AWS’s flexibility supports tailored solutions, such as:</strong></p>\n<ul><li><p><strong>Data Loss Recovery: Utilizing snapshots and AMIs for rapid data and instance recovery.</strong></p></li><li><p><strong>Server Failure Mitigation: Employing AMIs and Auto Scaling to maintain service availability.</strong></p></li><li><p><strong>Regional Outage Preparedness: Implementing multi-region architectures with services like Route 53 and CloudFront for seamless traffic redirection.</strong></p></li></ul>\n<p><strong>Strategies like the pilot light, warm standby, and multi-site setups can be matched to specific scenarios, balancing cost with RTO and RPO requirements.</strong></p>\n<h2><strong>Testing and Maintaining Your DR Plan</strong></h2>\n<p><strong>The effectiveness of a DR plan lies in its regular testing and upkeep. Simulating various disaster scenarios helps uncover weaknesses, ensuring readiness. Automating tests, involving all stakeholders, and updating the DR plan to reflect infrastructural or operational changes are critical for maintaining relevance and efficacy.</strong></p>\n<h2><strong>Conclusion</strong></h2>\n<p><strong>Leveraging AWS EC2 for disaster recovery equips businesses with the tools necessary to protect against IT disruptions, ensuring data integrity and system availability. Through strategic planning, execution of EC2’s robust backup features, and diligent plan maintenance, organizations can establish a resilient defense against unforeseen disasters. However, complementing AWS services with third-party solutions like</strong><a href=\"https://www.nakivo.com/aws-ec2-instance-backup/\"><strong> NAKIVO backup</strong></a><strong> can further enhance your disaster recovery capabilities.</strong></p>\n</html>",
"json_metadata": "{\"tags\":[\"aws\",\"ec2\",\"backup\",\"data\"],\"links\":[\"https://www.nakivo.com/aws-ec2-instance-backup/\"],\"app\":\"steemit/0.2\",\"format\":\"html\"}"
}
]
}2023/11/13 10:40:33
2023/11/13 10:40:33
| delegator | steem |
| delegatee | alextray |
| vesting shares | 5806.348949 VESTS |
| Transaction Info | Block #79842667/Trx 0e8045d91f9163d86a19135b3fa2f7664e38595a |
View Raw JSON Data
{
"trx_id": "0e8045d91f9163d86a19135b3fa2f7664e38595a",
"block": 79842667,
"trx_in_block": 0,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2023-11-13T10:40:33",
"op": [
"delegate_vesting_shares",
{
"delegator": "steem",
"delegatee": "alextray",
"vesting_shares": "5806.348949 VESTS"
}
]
}2023/09/27 16:55:36
2023/09/27 16:55:36
| delegator | steem |
| delegatee | alextray |
| vesting shares | 8739.693693 VESTS |
| Transaction Info | Block #78514105/Trx d6b95eb650f04fdb0d533fb04291233ae13d0ebd |
View Raw JSON Data
{
"trx_id": "d6b95eb650f04fdb0d533fb04291233ae13d0ebd",
"block": 78514105,
"trx_in_block": 1,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2023-09-27T16:55:36",
"op": [
"delegate_vesting_shares",
{
"delegator": "steem",
"delegatee": "alextray",
"vesting_shares": "8739.693693 VESTS"
}
]
}alextraypublished a new post: microsoft-365-data-loss-prevention-features-and-limitations2023/03/17 07:49:33
alextraypublished a new post: microsoft-365-data-loss-prevention-features-and-limitations
2023/03/17 07:49:33
| parent author | |
| parent permlink | microsoft365 |
| author | alextray |
| permlink | microsoft-365-data-loss-prevention-features-and-limitations |
| title | Microsoft 365 Data Loss Prevention: Features and Limitations |
| body | <html> <p>Most organizations collect, store, manage and use different forms of sensitive data including financial information, health records and customer data. This type of confidential data is a prime target for ransomware and malware attacks and can be leaked through human error or malicious behavior.</p> <p>Losing or exposing private data can have a detrimental impact on your business. Luckily, you can implement Microsoft 365 Data Loss Prevention (DLP) to protect classified information against threats, data loss and misuse.</p> <p><a href="https://wire19.com/microsoft-365-data-loss-prevention-capabilities-and-limitations/">This post</a> details the capabilities of Microsoft DLP that allow you to prevent unauthorized access and sharing of privileged data. Read on to understand the different limitations of DLP and how you can overcome them.</p> </html> |
| json metadata | {"tags":["microsoft365","datalossprevention","dlp","dataprotection","datasecurity","dlpreportingtools","dlplimitations","datamanagement"],"links":["https://wire19.com/microsoft-365-data-loss-prevention-capabilities-and-limitations/"],"app":"steemit/0.2","format":"html"} |
| Transaction Info | Block #72946627/Trx 102fdd34b5791ac4f5163efb7ff7df7260ba0353 |
View Raw JSON Data
{
"trx_id": "102fdd34b5791ac4f5163efb7ff7df7260ba0353",
"block": 72946627,
"trx_in_block": 2,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2023-03-17T07:49:33",
"op": [
"comment",
{
"parent_author": "",
"parent_permlink": "microsoft365",
"author": "alextray",
"permlink": "microsoft-365-data-loss-prevention-features-and-limitations",
"title": "Microsoft 365 Data Loss Prevention: Features and Limitations",
"body": "<html>\n<p>Most organizations collect, store, manage and use different forms of sensitive data including financial information, health records and customer data. This type of confidential data is a prime target for ransomware and malware attacks and can be leaked through human error or malicious behavior.</p>\n<p>Losing or exposing private data can have a detrimental impact on your business. Luckily, you can implement Microsoft 365 Data Loss Prevention (DLP) to protect classified information against threats, data loss and misuse.</p>\n<p><a href=\"https://wire19.com/microsoft-365-data-loss-prevention-capabilities-and-limitations/\">This post</a> details the capabilities of Microsoft DLP that allow you to prevent unauthorized access and sharing of privileged data. Read on to understand the different limitations of DLP and how you can overcome them.</p>\n</html>",
"json_metadata": "{\"tags\":[\"microsoft365\",\"datalossprevention\",\"dlp\",\"dataprotection\",\"datasecurity\",\"dlpreportingtools\",\"dlplimitations\",\"datamanagement\"],\"links\":[\"https://wire19.com/microsoft-365-data-loss-prevention-capabilities-and-limitations/\"],\"app\":\"steemit/0.2\",\"format\":\"html\"}"
}
]
}alextraypublished a new post: how-to-secure-a-vm-in-a-cloud-computing-environment2023/03/17 07:36:57
alextraypublished a new post: how-to-secure-a-vm-in-a-cloud-computing-environment
2023/03/17 07:36:57
| parent author | |
| parent permlink | vmsecurity |
| author | alextray |
| permlink | how-to-secure-a-vm-in-a-cloud-computing-environment |
| title | How to Secure a VM in a Cloud Computing Environment |
| body | <html> <p>Organizations worldwide store 60% of their data in the cloud. The popularity of cloud computing is undisputed in 2023 and is predicted to grow in future years. The main benefits of using cloud storage and computing services to run corporate virtual machines (VMs) include data availability and the cost-efficiency of such infrastructures.</p> <p>However, focusing on cloud computing as your organization’s main data storage has downsides. The main concern here is data and cloud VM security; the nature of cloud infrastructure makes providing the appropriate level of data protection challenging. In this post, we explain:</p> <p>● What challenges to expect on the way to reliable cloud data protection<br/>● How to secure your cloud virtual machine</p> <p>See the original article here: <a href="https://securityboulevard.com/2023/03/how-to-secure-a-vm-in-a-cloud-computing-environment/">https://securityboulevard.com/2023/03/how-to-secure-a-vm-in-a-cloud-computing-environment/</a> </p> </html> |
| json metadata | {"tags":["vmsecurity","cloudcomputing","virtualcloudsecurity","virtualizationsecurity","kubernetes","opensourcesecurity","ransomware"],"links":["https://securityboulevard.com/2023/03/how-to-secure-a-vm-in-a-cloud-computing-environment/"],"app":"steemit/0.2","format":"html"} |
| Transaction Info | Block #72946376/Trx 53f04ab638e122edf113aacec9ed26f094d75f3e |
View Raw JSON Data
{
"trx_id": "53f04ab638e122edf113aacec9ed26f094d75f3e",
"block": 72946376,
"trx_in_block": 0,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2023-03-17T07:36:57",
"op": [
"comment",
{
"parent_author": "",
"parent_permlink": "vmsecurity",
"author": "alextray",
"permlink": "how-to-secure-a-vm-in-a-cloud-computing-environment",
"title": "How to Secure a VM in a Cloud Computing Environment",
"body": "<html>\n<p>Organizations worldwide store 60% of their data in the cloud. The popularity of cloud computing is undisputed in 2023 and is predicted to grow in future years. The main benefits of using cloud storage and computing services to run corporate virtual machines (VMs) include data availability and the cost-efficiency of such infrastructures.</p>\n<p>However, focusing on cloud computing as your organization’s main data storage has downsides. The main concern here is data and cloud VM security; the nature of cloud infrastructure makes providing the appropriate level of data protection challenging. In this post, we explain:</p>\n<p>● What challenges to expect on the way to reliable cloud data protection<br/>● How to secure your cloud virtual machine</p>\n<p>See the original article here: <a href=\"https://securityboulevard.com/2023/03/how-to-secure-a-vm-in-a-cloud-computing-environment/\">https://securityboulevard.com/2023/03/how-to-secure-a-vm-in-a-cloud-computing-environment/</a> </p>\n</html>",
"json_metadata": "{\"tags\":[\"vmsecurity\",\"cloudcomputing\",\"virtualcloudsecurity\",\"virtualizationsecurity\",\"kubernetes\",\"opensourcesecurity\",\"ransomware\"],\"links\":[\"https://securityboulevard.com/2023/03/how-to-secure-a-vm-in-a-cloud-computing-environment/\"],\"app\":\"steemit/0.2\",\"format\":\"html\"}"
}
]
}alextrayupdated their account properties2023/03/17 07:25:42
alextrayupdated their account properties
2023/03/17 07:25:42
| account | alextray |
| json metadata | |
| posting json metadata | {"profile":{"profile_image":"https://cdn.steemitimages.com/DQmVUmHhFnJzqvZRN4DZPkpaqbi4uee96cQqwZakr4NLmiZ/Alex%20Tray.jpeg","name":"Alex Tray","about":"I am a multi-certified system administrator and a cybersecurity consultant with over seven years of experience.","location":"Nevada","website":"https://muckrack.com/alex-tray","version":2}} |
| extensions | [] |
| Transaction Info | Block #72946151/Trx 65384601e81e12ff7b1bf27b3e0518c0d0cbf918 |
View Raw JSON Data
{
"trx_id": "65384601e81e12ff7b1bf27b3e0518c0d0cbf918",
"block": 72946151,
"trx_in_block": 0,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2023-03-17T07:25:42",
"op": [
"account_update2",
{
"account": "alextray",
"json_metadata": "",
"posting_json_metadata": "{\"profile\":{\"profile_image\":\"https://cdn.steemitimages.com/DQmVUmHhFnJzqvZRN4DZPkpaqbi4uee96cQqwZakr4NLmiZ/Alex%20Tray.jpeg\",\"name\":\"Alex Tray\",\"about\":\"I am a multi-certified system administrator and a cybersecurity consultant with over seven years of experience.\",\"location\":\"Nevada\",\"website\":\"https://muckrack.com/alex-tray\",\"version\":2}}",
"extensions": []
}
]
}alexmove.witnesssent 0.001 STEEM to @alextray- "Please support me @alexmove.witness as witness on site https://steemitwallet.com/~witnesses. I send daily Witness vote STEEM reward and voted for some posts of those who voted. Your vote is very impor..."2023/03/17 07:20:06
alexmove.witnesssent 0.001 STEEM to @alextray- "Please support me @alexmove.witness as witness on site https://steemitwallet.com/~witnesses. I send daily Witness vote STEEM reward and voted for some posts of those who voted. Your vote is very impor..."
2023/03/17 07:20:06
| from | alexmove.witness |
| to | alextray |
| amount | 0.001 STEEM |
| memo | Please support me @alexmove.witness as witness on site https://steemitwallet.com/~witnesses. I send daily Witness vote STEEM reward and voted for some posts of those who voted. Your vote is very important to me, alextray! Good luck! 20230317 |
| Transaction Info | Block #72946039/Trx 3c71142f64a86511ceb1eeeef609d89ad2b7b90a |
View Raw JSON Data
{
"trx_id": "3c71142f64a86511ceb1eeeef609d89ad2b7b90a",
"block": 72946039,
"trx_in_block": 4,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2023-03-17T07:20:06",
"op": [
"transfer",
{
"from": "alexmove.witness",
"to": "alextray",
"amount": "0.001 STEEM",
"memo": "Please support me @alexmove.witness as witness on site https://steemitwallet.com/~witnesses. I send daily Witness vote STEEM reward and voted for some posts of those who voted. Your vote is very important to me, alextray! Good luck! 20230317"
}
]
}alextraypublished a new post: expert-blog-5-nas-backup-strategies-pros-and-cons-explained2023/03/17 07:17:57
alextraypublished a new post: expert-blog-5-nas-backup-strategies-pros-and-cons-explained
2023/03/17 07:17:57
| parent author | |
| parent permlink | nasbackup |
| author | alextray |
| permlink | expert-blog-5-nas-backup-strategies-pros-and-cons-explained |
| title | Expert Blog: 5 NAS Backup Strategies – Pros and Cons Explained |
| body | <html> <p>A modern data-driven world makes organizations of different scale and size use NAS devices as their data storage extensively. The nature and use of that data may vary, but in most cases, organizations cannot afford losing their NAS data assets under any circumstances. To keep control over data even after major disasters, an organization should implement a thorough NAS backup strategy.</p> <p>In this article, we explain the NAS backup definition, reasons to have a data protection strategy, and five main strategies to back up NAS devices. You’ll be able to evaluate the pros and cons of every strategy yourself and pick the most suitable one for your infrastructure.</p> <p>See the original article <a href="https://hostingjournalist.com/expert-blog-5-nas-backup-strategies-pros-and-cons-explained/">here</a></p> </html> |
| json metadata | {"tags":["nasbackup","databackupstrategies","usbdiskbackup","ndmpbackup","cloudbackup","blocklevelreplication","datastorage","datamanagement"],"links":["https://hostingjournalist.com/expert-blog-5-nas-backup-strategies-pros-and-cons-explained/"],"app":"steemit/0.2","format":"html"} |
| Transaction Info | Block #72945996/Trx 738f30d12a8555fb00c5c55e77c23d8245e8a4db |
View Raw JSON Data
{
"trx_id": "738f30d12a8555fb00c5c55e77c23d8245e8a4db",
"block": 72945996,
"trx_in_block": 2,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2023-03-17T07:17:57",
"op": [
"comment",
{
"parent_author": "",
"parent_permlink": "nasbackup",
"author": "alextray",
"permlink": "expert-blog-5-nas-backup-strategies-pros-and-cons-explained",
"title": "Expert Blog: 5 NAS Backup Strategies – Pros and Cons Explained",
"body": "<html>\n<p>A modern data-driven world makes organizations of different scale and size use NAS devices as their data storage extensively. The nature and use of that data may vary, but in most cases, organizations cannot afford losing their NAS data assets under any circumstances. To keep control over data even after major disasters, an organization should implement a thorough NAS backup strategy.</p>\n<p>In this article, we explain the NAS backup definition, reasons to have a data protection strategy, and five main strategies to back up NAS devices. You’ll be able to evaluate the pros and cons of every strategy yourself and pick the most suitable one for your infrastructure.</p>\n<p>See the original article <a href=\"https://hostingjournalist.com/expert-blog-5-nas-backup-strategies-pros-and-cons-explained/\">here</a></p>\n</html>",
"json_metadata": "{\"tags\":[\"nasbackup\",\"databackupstrategies\",\"usbdiskbackup\",\"ndmpbackup\",\"cloudbackup\",\"blocklevelreplication\",\"datastorage\",\"datamanagement\"],\"links\":[\"https://hostingjournalist.com/expert-blog-5-nas-backup-strategies-pros-and-cons-explained/\"],\"app\":\"steemit/0.2\",\"format\":\"html\"}"
}
]
}2023/03/17 07:12:33
2023/03/17 07:12:33
| parent author | alextray |
| parent permlink | backup-to-azure-storage-as-a-cloud-backup-destination |
| author | alextray |
| permlink | rrnlcy |
| title | |
| body | Here are more articles https://muckrack.com/alex-tray |
| json metadata | {"links":["https://muckrack.com/alex-tray"],"app":"steemit/0.2"} |
| Transaction Info | Block #72945888/Trx 22e5a239dd8ea527ae68172f33c8a388fcda4e3d |
View Raw JSON Data
{
"trx_id": "22e5a239dd8ea527ae68172f33c8a388fcda4e3d",
"block": 72945888,
"trx_in_block": 4,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2023-03-17T07:12:33",
"op": [
"comment",
{
"parent_author": "alextray",
"parent_permlink": "backup-to-azure-storage-as-a-cloud-backup-destination",
"author": "alextray",
"permlink": "rrnlcy",
"title": "",
"body": "Here are more articles https://muckrack.com/alex-tray",
"json_metadata": "{\"links\":[\"https://muckrack.com/alex-tray\"],\"app\":\"steemit/0.2\"}"
}
]
}alextraypublished a new post: backup-to-azure-storage-as-a-cloud-backup-destination2023/03/17 07:11:27
alextraypublished a new post: backup-to-azure-storage-as-a-cloud-backup-destination
2023/03/17 07:11:27
| parent author | |
| parent permlink | azurestorage |
| author | alextray |
| permlink | backup-to-azure-storage-as-a-cloud-backup-destination |
| title | Backup to Azure Storage as a Cloud Backup Destination |
| body | <html> <p>Any organization, whether an SMB or enterprise company, has production processes heavily dependent on data. Thus, regular backups are critical to ensure business continuity and data availability for compliance, analytics, sales and other purposes.</p> <p>Cloud backups can be considered a reliable option because cloud providers ensure high availability of their storage for customers. Azure Blob storage is one of the clouds you can use as a backup destination. In this post, we explain:</p> <ul><li>Why use Azure Blob to store backups</li><li>How to ensure backup data security in Azure</li><li>Cost of Azure Blob storage</li><li>How to send backups to Azure efficiently</li></ul> <p>Check full article here <a href="https://www.mytechmag.com/backup-to-azure-storage-as-a-cloud-backup-destination/">https://www.mytechmag.com/backup-to-azure-storage-as-a-cloud-backup-destination/</a></p> </html> |
| json metadata | {"tags":["azurestorage","cloudbackup","backupdestination","datasecurity","storagecosts","azureblobstorage","cloudcomputing","datamanagement"],"links":["https://www.mytechmag.com/backup-to-azure-storage-as-a-cloud-backup-destination/"],"app":"steemit/0.2","format":"html"} |
| Transaction Info | Block #72945866/Trx 3a32ee6cd3b5f08e9499b12f6c3c47f2c053b8be |
View Raw JSON Data
{
"trx_id": "3a32ee6cd3b5f08e9499b12f6c3c47f2c053b8be",
"block": 72945866,
"trx_in_block": 3,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2023-03-17T07:11:27",
"op": [
"comment",
{
"parent_author": "",
"parent_permlink": "azurestorage",
"author": "alextray",
"permlink": "backup-to-azure-storage-as-a-cloud-backup-destination",
"title": "Backup to Azure Storage as a Cloud Backup Destination",
"body": "<html>\n<p>Any organization, whether an SMB or enterprise company, has production processes heavily dependent on data. Thus, regular backups are critical to ensure business continuity and data availability for compliance, analytics, sales and other purposes.</p>\n<p>Cloud backups can be considered a reliable option because cloud providers ensure high availability of their storage for customers. Azure Blob storage is one of the clouds you can use as a backup destination. In this post, we explain:</p>\n<ul><li>Why use Azure Blob to store backups</li><li>How to ensure backup data security in Azure</li><li>Cost of Azure Blob storage</li><li>How to send backups to Azure efficiently</li></ul>\n<p>Check full article here <a href=\"https://www.mytechmag.com/backup-to-azure-storage-as-a-cloud-backup-destination/\">https://www.mytechmag.com/backup-to-azure-storage-as-a-cloud-backup-destination/</a></p>\n</html>",
"json_metadata": "{\"tags\":[\"azurestorage\",\"cloudbackup\",\"backupdestination\",\"datasecurity\",\"storagecosts\",\"azureblobstorage\",\"cloudcomputing\",\"datamanagement\"],\"links\":[\"https://www.mytechmag.com/backup-to-azure-storage-as-a-cloud-backup-destination/\"],\"app\":\"steemit/0.2\",\"format\":\"html\"}"
}
]
}alextraycustom json: notify2023/03/16 15:25:18
alextraycustom json: notify
2023/03/16 15:25:18
| required auths | [] |
| required posting auths | ["alextray"] |
| id | notify |
| json | ["setLastRead",{"date":"2023-03-16T15:25:18"}] |
| Transaction Info | Block #72927034/Trx 204873bec586fcd62278f4837c976b52d778a7b4 |
View Raw JSON Data
{
"trx_id": "204873bec586fcd62278f4837c976b52d778a7b4",
"block": 72927034,
"trx_in_block": 4,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2023-03-16T15:25:18",
"op": [
"custom_json",
{
"required_auths": [],
"required_posting_auths": [
"alextray"
],
"id": "notify",
"json": "[\"setLastRead\",{\"date\":\"2023-03-16T15:25:18\"}]"
}
]
}2023/01/13 10:41:33
2023/01/13 10:41:33
| delegator | steem |
| delegatee | alextray |
| vesting shares | 8914.509393 VESTS |
| Transaction Info | Block #71144676/Trx 08b27b6ebe7eaac742655a503d40621da0f6fa00 |
View Raw JSON Data
{
"trx_id": "08b27b6ebe7eaac742655a503d40621da0f6fa00",
"block": 71144676,
"trx_in_block": 0,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2023-01-13T10:41:33",
"op": [
"delegate_vesting_shares",
{
"delegator": "steem",
"delegatee": "alextray",
"vesting_shares": "8914.509393 VESTS"
}
]
}alextrayreceived 0.044 STEEM, 0.049 SP author reward for @alextray / hidden-costs-of-data-backup-top-7-tips-to-avoid-them2022/09/28 11:57:30
alextrayreceived 0.044 STEEM, 0.049 SP author reward for @alextray / hidden-costs-of-data-backup-top-7-tips-to-avoid-them
2022/09/28 11:57:30
| author | alextray |
| permlink | hidden-costs-of-data-backup-top-7-tips-to-avoid-them |
| sbd payout | 0.000 SBD |
| steem payout | 0.044 STEEM |
| vesting payout | 79.137618 VESTS |
| Transaction Info | Block #68081740/Virtual Operation #4 |
View Raw JSON Data
{
"trx_id": "0000000000000000000000000000000000000000",
"block": 68081740,
"trx_in_block": 4294967295,
"op_in_trx": 0,
"virtual_op": 4,
"timestamp": "2022-09-28T11:57:30",
"op": [
"author_reward",
{
"author": "alextray",
"permlink": "hidden-costs-of-data-backup-top-7-tips-to-avoid-them",
"sbd_payout": "0.000 SBD",
"steem_payout": "0.044 STEEM",
"vesting_payout": "79.137618 VESTS"
}
]
}factikoflagged (-100.00%) @alextray / hidden-costs-of-data-backup-top-7-tips-to-avoid-them2022/09/22 09:11:03
factikoflagged (-100.00%) @alextray / hidden-costs-of-data-backup-top-7-tips-to-avoid-them
2022/09/22 09:11:03
| voter | factiko |
| author | alextray |
| permlink | hidden-costs-of-data-backup-top-7-tips-to-avoid-them |
| weight | -10000 (-100.00%) |
| Transaction Info | Block #67906707/Trx 7e4b48590a930e39dfb66c87c338f63295aa38b1 |
View Raw JSON Data
{
"trx_id": "7e4b48590a930e39dfb66c87c338f63295aa38b1",
"block": 67906707,
"trx_in_block": 1,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2022-09-22T09:11:03",
"op": [
"vote",
{
"voter": "factiko",
"author": "alextray",
"permlink": "hidden-costs-of-data-backup-top-7-tips-to-avoid-them",
"weight": -10000
}
]
}inertiaupvoted (100.00%) @alextray / hidden-costs-of-data-backup-top-7-tips-to-avoid-them2022/09/21 12:07:30
inertiaupvoted (100.00%) @alextray / hidden-costs-of-data-backup-top-7-tips-to-avoid-them
2022/09/21 12:07:30
| voter | inertia |
| author | alextray |
| permlink | hidden-costs-of-data-backup-top-7-tips-to-avoid-them |
| weight | 10000 (100.00%) |
| Transaction Info | Block #67881614/Trx 767e7379c4312afed3231d092003f729fc63796d |
View Raw JSON Data
{
"trx_id": "767e7379c4312afed3231d092003f729fc63796d",
"block": 67881614,
"trx_in_block": 6,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2022-09-21T12:07:30",
"op": [
"vote",
{
"voter": "inertia",
"author": "alextray",
"permlink": "hidden-costs-of-data-backup-top-7-tips-to-avoid-them",
"weight": 10000
}
]
}steem.historyupvoted (5.00%) @alextray / hidden-costs-of-data-backup-top-7-tips-to-avoid-them2022/09/21 11:57:39
steem.historyupvoted (5.00%) @alextray / hidden-costs-of-data-backup-top-7-tips-to-avoid-them
2022/09/21 11:57:39
| voter | steem.history |
| author | alextray |
| permlink | hidden-costs-of-data-backup-top-7-tips-to-avoid-them |
| weight | 500 (5.00%) |
| Transaction Info | Block #67881418/Trx b4e4e327c91e2573002103fc4fbe31dec29b46ac |
View Raw JSON Data
{
"trx_id": "b4e4e327c91e2573002103fc4fbe31dec29b46ac",
"block": 67881418,
"trx_in_block": 5,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2022-09-21T11:57:39",
"op": [
"vote",
{
"voter": "steem.history",
"author": "alextray",
"permlink": "hidden-costs-of-data-backup-top-7-tips-to-avoid-them",
"weight": 500
}
]
}2022/09/21 11:57:36
2022/09/21 11:57:36
| parent author | alextray |
| parent permlink | hidden-costs-of-data-backup-top-7-tips-to-avoid-them |
| author | steem.history |
| permlink | re-alextray-hidden-costs-of-data-backup-top-7-tips-to-avoid-them-20220921t115736549z |
| title | |
| body | Hello welcome to Steemit world! I'm @steem.history, who is steem witness. This is a recommended post for you.[Newcomers Guide](https://steemitdev.com/guide/@steemitblog/steemit-a-guide-for-newcomers) and [The Complete Steemit Etiquette Guide (Revision 2.0)](https://steemit.com/steem/@steem.history/the-complete-steemit-etiquette-guide-revision-20-homage-1598425779) and, recommended community [Newcomers Community](https://steemit.com/trending/hive-172186) I wish you luck to your steemit activities.<center> https://cdn.steemitimages.com/DQmXHwdcNs5VPcBft1iSosPdHLpBNBfjuG84g3ffWhMw5JQ/image.png <sub>(The bots avatar has been created using https://robohash.org/)</sub> @steem.history ### My witness activity - [My aspiration for STEEM witness](https://steemit.com/hive-185836/@steem.history/my-aspiration-for-steem-witness-1601280729) - Provides information on Steem. [Reference](https://steemit.com/trending/hive-130095) - Supporting the Steem project. [SPUD4STEEM project](https://steemit.com/trending/spud4steem) - Supporting the community. [Newcomers Community](https://steemit.com/trending/hive-172186),[Steem Sri Lanka](https://steemit.com/trending/hive-133716) ,[WORLD OF XPILAR](https://steemit.com/trending/hive-185836), [GLOBAL STEEM](https://steemit.com/trending/hive-145160), [Scouts](https://steemit.com/trending/hive-181136), [Latino Community](https://steemit.com/trending/hive-188619) ### My featured posts - [The Complete Steemit Etiquette Guide (Revision 2.0) -Homage](https://steemit.com/steem/@steem.history/the-complete-steemit-etiquette-guide-revision-20-homage-1598425779) [](https://steemlogin.com/sign/account-witness-vote?witness=steem.history&approve=1) <sub>please click it!</sub>  <sub>(Go to https://steemit.com/~witnesses and type fbslo at the bottom of the page)</sub> </center> |
| json metadata | {"tsgs":["hello"]} |
| Transaction Info | Block #67881417/Trx 8f9f5f01a5c6c30a30c64a86586088df8833c415 |
View Raw JSON Data
{
"trx_id": "8f9f5f01a5c6c30a30c64a86586088df8833c415",
"block": 67881417,
"trx_in_block": 6,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2022-09-21T11:57:36",
"op": [
"comment",
{
"parent_author": "alextray",
"parent_permlink": "hidden-costs-of-data-backup-top-7-tips-to-avoid-them",
"author": "steem.history",
"permlink": "re-alextray-hidden-costs-of-data-backup-top-7-tips-to-avoid-them-20220921t115736549z",
"title": "",
"body": "Hello welcome to Steemit world! \n I'm @steem.history, who is steem witness. \n This is a recommended post for you.[Newcomers Guide](https://steemitdev.com/guide/@steemitblog/steemit-a-guide-for-newcomers) and [The Complete Steemit Etiquette Guide (Revision 2.0)](https://steemit.com/steem/@steem.history/the-complete-steemit-etiquette-guide-revision-20-homage-1598425779) and, recommended community [Newcomers Community](https://steemit.com/trending/hive-172186) \n I wish you luck to your steemit activities.<center> \n \n \n https://cdn.steemitimages.com/DQmXHwdcNs5VPcBft1iSosPdHLpBNBfjuG84g3ffWhMw5JQ/image.png \n <sub>(The bots avatar has been created using https://robohash.org/)</sub> \n @steem.history \n \n ### My witness activity \n - [My aspiration for STEEM witness](https://steemit.com/hive-185836/@steem.history/my-aspiration-for-steem-witness-1601280729) \n - Provides information on Steem. \n [Reference](https://steemit.com/trending/hive-130095) \n - Supporting the Steem project. \n [SPUD4STEEM project](https://steemit.com/trending/spud4steem) \n - Supporting the community. \n [Newcomers Community](https://steemit.com/trending/hive-172186),[Steem Sri Lanka](https://steemit.com/trending/hive-133716) ,[WORLD OF XPILAR](https://steemit.com/trending/hive-185836), [GLOBAL STEEM](https://steemit.com/trending/hive-145160), [Scouts](https://steemit.com/trending/hive-181136), [Latino Community](https://steemit.com/trending/hive-188619) \n \n ### My featured posts \n - [The Complete Steemit Etiquette Guide (Revision 2.0) -Homage](https://steemit.com/steem/@steem.history/the-complete-steemit-etiquette-guide-revision-20-homage-1598425779) \n \n [](https://steemlogin.com/sign/account-witness-vote?witness=steem.history&approve=1) \n <sub>please click it!</sub> \n \n  \n <sub>(Go to https://steemit.com/~witnesses and type fbslo at the bottom of the page)</sub> \n \n </center>",
"json_metadata": "{\"tsgs\":[\"hello\"]}"
}
]
}alextraypublished a new post: hidden-costs-of-data-backup-top-7-tips-to-avoid-them2022/09/21 11:57:30
alextraypublished a new post: hidden-costs-of-data-backup-top-7-tips-to-avoid-them
2022/09/21 11:57:30
| parent author | |
| parent permlink | data |
| author | alextray |
| permlink | hidden-costs-of-data-backup-top-7-tips-to-avoid-them |
| title | Hidden Costs Of Data Backup: Top 7 Tips To Avoid Them |
| body | <html> <p>Data backup is one endeavor that costs companies time, money, and effort. However, saving on costs is a noble goal every smart and responsible business should pursue. On the other hand, you must look for ways to avoid hidden and unnecessary data backup costs.</p> <p>Check full article: https://www.hostreview.com/blog/220809-hidden-costs-of-data-backup-top-7-tips-to-avoid-them</p> </html> |
| json metadata | {"tags":["data"],"links":["https://www.hostreview.com/blog/220809-hidden-costs-of-data-backup-top-7-tips-to-avoid-them"],"app":"steemit/0.2","format":"html"} |
| Transaction Info | Block #67881415/Trx 1ce8043b59d375265288eb87c719d1ee6ca7f16e |
View Raw JSON Data
{
"trx_id": "1ce8043b59d375265288eb87c719d1ee6ca7f16e",
"block": 67881415,
"trx_in_block": 0,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2022-09-21T11:57:30",
"op": [
"comment",
{
"parent_author": "",
"parent_permlink": "data",
"author": "alextray",
"permlink": "hidden-costs-of-data-backup-top-7-tips-to-avoid-them",
"title": "Hidden Costs Of Data Backup: Top 7 Tips To Avoid Them",
"body": "<html>\n<p>Data backup is one endeavor that costs companies time, money, and effort. However, saving on costs is a noble goal every smart and responsible business should pursue. On the other hand, you must look for ways to avoid hidden and unnecessary data backup costs.</p>\n<p>Check full article: https://www.hostreview.com/blog/220809-hidden-costs-of-data-backup-top-7-tips-to-avoid-them</p>\n</html>",
"json_metadata": "{\"tags\":[\"data\"],\"links\":[\"https://www.hostreview.com/blog/220809-hidden-costs-of-data-backup-top-7-tips-to-avoid-them\"],\"app\":\"steemit/0.2\",\"format\":\"html\"}"
}
]
}2022/05/17 13:33:06
2022/05/17 13:33:06
| delegator | steem |
| delegatee | alextray |
| vesting shares | 9092.843172 VESTS |
| Transaction Info | Block #64248937/Trx 3f0eba810eba35ddd99144a0195fc34df987aa06 |
View Raw JSON Data
{
"trx_id": "3f0eba810eba35ddd99144a0195fc34df987aa06",
"block": 64248937,
"trx_in_block": 2,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2022-05-17T13:33:06",
"op": [
"delegate_vesting_shares",
{
"delegator": "steem",
"delegatee": "alextray",
"vesting_shares": "9092.843172 VESTS"
}
]
}2022/05/05 23:35:24
2022/05/05 23:35:24
| delegator | steem |
| delegatee | alextray |
| vesting shares | 27304.765854 VESTS |
| Transaction Info | Block #63916567/Trx 9c18729f665487069b9e00cc2c7777c60c47683e |
View Raw JSON Data
{
"trx_id": "9c18729f665487069b9e00cc2c7777c60c47683e",
"block": 63916567,
"trx_in_block": 1,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2022-05-05T23:35:24",
"op": [
"delegate_vesting_shares",
{
"delegator": "steem",
"delegatee": "alextray",
"vesting_shares": "27304.765854 VESTS"
}
]
}2022/02/15 12:50:57
2022/02/15 12:50:57
| delegator | steem |
| delegatee | alextray |
| vesting shares | 27486.814877 VESTS |
| Transaction Info | Block #61642357/Trx 417d949f9889588cf9c877fc64b94580a4b488e5 |
View Raw JSON Data
{
"trx_id": "417d949f9889588cf9c877fc64b94580a4b488e5",
"block": 61642357,
"trx_in_block": 6,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2022-02-15T12:50:57",
"op": [
"delegate_vesting_shares",
{
"delegator": "steem",
"delegatee": "alextray",
"vesting_shares": "27486.814877 VESTS"
}
]
}executive-boardsent 0.001 STEEM to @alextray- "❗ Hello alextray, welcome to the STEEM ecosystem. The Executive Board is publishing insider infos at https://discord.gg/KyBbmhh on how you will be earning the most coins. It's easy, just follow the in..."2022/02/15 12:11:03
executive-boardsent 0.001 STEEM to @alextray- "❗ Hello alextray, welcome to the STEEM ecosystem. The Executive Board is publishing insider infos at https://discord.gg/KyBbmhh on how you will be earning the most coins. It's easy, just follow the in..."
2022/02/15 12:11:03
| from | executive-board |
| to | alextray |
| amount | 0.001 STEEM |
| memo | ❗ Hello alextray, welcome to the STEEM ecosystem. The Executive Board is publishing insider infos at https://discord.gg/KyBbmhh on how you will be earning the most coins. It's easy, just follow the instructions. THE 1000X BOOSTER KEY is already waiting for you over there too. 😉 Warm regards, The Executive Board. |
| Transaction Info | Block #61641563/Trx 5f54b0c2c9684fb556c19bd0427efd90af876bb6 |
View Raw JSON Data
{
"trx_id": "5f54b0c2c9684fb556c19bd0427efd90af876bb6",
"block": 61641563,
"trx_in_block": 6,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2022-02-15T12:11:03",
"op": [
"transfer",
{
"from": "executive-board",
"to": "alextray",
"amount": "0.001 STEEM",
"memo": "❗ Hello alextray, welcome to the STEEM ecosystem. The Executive Board is publishing insider infos at https://discord.gg/KyBbmhh on how you will be earning the most coins. It's easy, just follow the instructions. THE 1000X BOOSTER KEY is already waiting for you over there too. 😉 Warm regards, The Executive Board."
}
]
}2022/02/15 12:09:27
2022/02/15 12:09:27
| delegator | steem |
| delegatee | alextray |
| vesting shares | 30300.000000 VESTS |
| Transaction Info | Block #61641532/Trx 2d3d2e025b8939cc4fb8ddf0f1f0ee247bed9726 |
View Raw JSON Data
{
"trx_id": "2d3d2e025b8939cc4fb8ddf0f1f0ee247bed9726",
"block": 61641532,
"trx_in_block": 4,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2022-02-15T12:09:27",
"op": [
"delegate_vesting_shares",
{
"delegator": "steem",
"delegatee": "alextray",
"vesting_shares": "30300.000000 VESTS"
}
]
}2022/02/15 12:09:27
2022/02/15 12:09:27
| creator | steem |
| new account name | alextray |
| owner | {"weight_threshold":1,"account_auths":[],"key_auths":[["STM8gyuqz2HES33Kxb3LBFx1oDGmcbhmyntZzrzA8KYHXyCr56eRX",1]]} |
| active | {"weight_threshold":1,"account_auths":[],"key_auths":[["STM5m7zkLpHng98gKLrx3AMsYvqwCi3ncVavnctmTBhG3mdf2Njhz",1]]} |
| posting | {"weight_threshold":1,"account_auths":[],"key_auths":[["STM6qrQ18CcXrftaB2LrE8HxQkust2ABmJsUzbMzjqhefFgKpb6dd",1]]} |
| memo key | STM7RF59s2YTB3Sm5cwXvHtSt7nba2JsCTDd9oxBYFRkcnKRtqPBJ |
| json metadata | {} |
| extensions | [] |
| Transaction Info | Block #61641532/Trx 2d3d2e025b8939cc4fb8ddf0f1f0ee247bed9726 |
View Raw JSON Data
{
"trx_id": "2d3d2e025b8939cc4fb8ddf0f1f0ee247bed9726",
"block": 61641532,
"trx_in_block": 4,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2022-02-15T12:09:27",
"op": [
"create_claimed_account",
{
"creator": "steem",
"new_account_name": "alextray",
"owner": {
"weight_threshold": 1,
"account_auths": [],
"key_auths": [
[
"STM8gyuqz2HES33Kxb3LBFx1oDGmcbhmyntZzrzA8KYHXyCr56eRX",
1
]
]
},
"active": {
"weight_threshold": 1,
"account_auths": [],
"key_auths": [
[
"STM5m7zkLpHng98gKLrx3AMsYvqwCi3ncVavnctmTBhG3mdf2Njhz",
1
]
]
},
"posting": {
"weight_threshold": 1,
"account_auths": [],
"key_auths": [
[
"STM6qrQ18CcXrftaB2LrE8HxQkust2ABmJsUzbMzjqhefFgKpb6dd",
1
]
]
},
"memo_key": "STM7RF59s2YTB3Sm5cwXvHtSt7nba2JsCTDd9oxBYFRkcnKRtqPBJ",
"json_metadata": "{}",
"extensions": []
}
]
}Manabar
Voting Power100.00%
Downvote Power100.00%
Resource Credits100.00%
Reputation Progress16.24%
{
"voting_manabar": {
"current_mana": "5544599977",
"last_update_time": 1753611633
},
"downvote_manabar": {
"current_mana": 1386149994,
"last_update_time": 1753611633
},
"rc_account": {
"account": "alextray",
"rc_manabar": {
"current_mana": "11208343918",
"last_update_time": 1753611633
},
"max_rc_creation_adjustment": {
"amount": "5497376564",
"precision": 6,
"nai": "@@000000037"
},
"max_rc": "11041976541"
}
}Account Metadata
| POSTING JSON METADATA | |
| profile | {"profile_image":"https://cdn.steemitimages.com/DQmVUmHhFnJzqvZRN4DZPkpaqbi4uee96cQqwZakr4NLmiZ/Alex%20Tray.jpeg","name":"Alex Tray","about":"I am a multi-certified system administrator and a cybersecurity consultant with over seven years of experience.","location":"Nevada","website":"https://muckrack.com/alex-tray","version":2} |
| JSON METADATA | |
| None | |
{
"posting_json_metadata": {
"profile": {
"profile_image": "https://cdn.steemitimages.com/DQmVUmHhFnJzqvZRN4DZPkpaqbi4uee96cQqwZakr4NLmiZ/Alex%20Tray.jpeg",
"name": "Alex Tray",
"about": "I am a multi-certified system administrator and a cybersecurity consultant with over seven years of experience.",
"location": "Nevada",
"website": "https://muckrack.com/alex-tray",
"version": 2
}
},
"json_metadata": {}
}Auth Keys
Owner
Single Signature
Public Keys
STM8gyuqz2HES33Kxb3LBFx1oDGmcbhmyntZzrzA8KYHXyCr56eRX1/1
Active
Single Signature
Public Keys
STM5m7zkLpHng98gKLrx3AMsYvqwCi3ncVavnctmTBhG3mdf2Njhz1/1
Posting
Single Signature
Public Keys
STM6qrQ18CcXrftaB2LrE8HxQkust2ABmJsUzbMzjqhefFgKpb6dd1/1
Memo
STM7RF59s2YTB3Sm5cwXvHtSt7nba2JsCTDd9oxBYFRkcnKRtqPBJ
{
"owner": {
"weight_threshold": 1,
"account_auths": [],
"key_auths": [
[
"STM8gyuqz2HES33Kxb3LBFx1oDGmcbhmyntZzrzA8KYHXyCr56eRX",
1
]
]
},
"active": {
"weight_threshold": 1,
"account_auths": [],
"key_auths": [
[
"STM5m7zkLpHng98gKLrx3AMsYvqwCi3ncVavnctmTBhG3mdf2Njhz",
1
]
]
},
"posting": {
"weight_threshold": 1,
"account_auths": [],
"key_auths": [
[
"STM6qrQ18CcXrftaB2LrE8HxQkust2ABmJsUzbMzjqhefFgKpb6dd",
1
]
]
},
"memo": "STM7RF59s2YTB3Sm5cwXvHtSt7nba2JsCTDd9oxBYFRkcnKRtqPBJ"
}Witness Votes
0 / 30
No active witness votes.
[]