{"version":"1.0","provider_name":"irgNET","provider_url":"https:\/\/irg-net.com","author_name":"H. Cemre G\u00fcnay","author_url":"https:\/\/irg-net.com\/index.php\/author\/t3n9r1\/","title":"vSphere Replication 8.6. Best Practices - irgNET","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"0mnjmy7WAs\"><a href=\"https:\/\/irg-net.com\/index.php\/vsphere-replication-8-6-best-practices\/\">vSphere Replication 8.6. Best Practices<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/irg-net.com\/index.php\/vsphere-replication-8-6-best-practices\/embed\/#?secret=0mnjmy7WAs\" width=\"600\" height=\"338\" title=\"&#8220;vSphere Replication 8.6. Best Practices&#8221; &#8212; irgNET\" data-secret=\"0mnjmy7WAs\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/irg-net.com\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","description":"vSphere Replication 8.6. Best Practices vSphere Replication 8.6. Best Practices Virtual machine replication or VM replication remains one of the best data protection techniques for short recovery times and system availability during failures or outages from any source. [Original content in Turkish] VMware Social Media Advocacy","thumbnail_url":"https:\/\/d3utlhu53nfcwz.cloudfront.net\/171901\/cdnImage\/article\/6486cdeb-e0c2-4986-9c41-2f8aae56ff48\/?size=Box320"}