{"id":28548,"date":"2022-02-13T10:04:42","date_gmt":"2022-02-13T10:04:42","guid":{"rendered":"https:\/\/dbtut.com\/?p=28548"},"modified":"2022-02-13T10:14:15","modified_gmt":"2022-02-13T10:14:15","slug":"data-guard-protection-modes","status":"publish","type":"post","link":"https:\/\/dbtut.com\/index.php\/2022\/02\/13\/data-guard-protection-modes\/","title":{"rendered":"Data Guard Protection Modes"},"content":{"rendered":"<p>In today&#8217;s article, we will examine Data Guard Protection Modes.<\/p>\n<p>Data Guard Protection Modes are a decision that we can make by looking at how valuable the data is to us or how important the continuity of the primary database is. Therefore, we cannot define Redo Transport mode as a stand-alone data protection mode.<\/p>\n<p>We have 3 types of Protection Modes in Oracle.<\/p>\n<p>Maximum Protection<\/p>\n<p>Maximum Availability<\/p>\n<p>Maximum Performans<\/p>\n<h4><span style=\"font-weight: bold;\">Maximum Protection<\/span><\/h4>\n<p>It guarantees us zero data loss against the problems we may encounter in Primary Database, network or all standby databases.<\/p>\n<p>It does this by closing the Primary Database when it realizes that it cannot write Redo even to at least one standby database that we run synchronously.<\/p>\n<p>Therefore, Redo information in Maximum Protection mode is written to at least one standby database that works synchronously with the local online redo log.<\/p>\n<p>In order to provide this information, at least one standby database must have Standby Redo Logs or the LOG_ARCHIVE_DEST_n parameter must have SYNC and AFFIRM Redo Transport features.<\/p>\n<p>Oracle recommends using Maximum Protection mode in a Data Guard Environment with at least 2 Standby Databases.<\/p>\n<p>Far does not support SYNC Maximum Protection mode because it has SYNC and NOAFFIRM working logic.<\/p>\n<h4><span style=\"font-weight: bold;\">Maximum Availability<\/span><\/h4>\n<p>It guarantees us zero data loss without compromising the availability of the Primary Database.<\/p>\n<p>It does this by not committing the transaction unless the Redo information is both written to the local online redo log file and Stanby is sure that the RFS process running on the side receives the redo information.<\/p>\n<p>Therefore, we cannot expect the disk I\/O to be instantiated and an acknowledge to the Primary. It provides the availability of the primary by not closing the primary database in case of communication problem between the standby and the primary for some reason at that moment.<\/p>\n<p>Asynchronous operation continues until the communication problem is resolved and the GAP is closed. When the GAP is closed, it automatically continues to work synchronously.<\/p>\n<p>In order to provide this information, at least one of our standby database must have Standby Redo Logs and our LOG_ARCHIVE_DEST_n parameter must have SYNC and NOAFFIRM Redo Transport properties.<\/p>\n<h4><strong>Maximum Performance<\/strong><\/h4>\n<p>It is the default Data Protection mode.<\/p>\n<p>It is based on the primary database working with maximum performance.<\/p>\n<p>It does this by committing transactions as soon as our redo information is written to the local online redo log.<\/p>\n<p>Therefore, our redo information is sent to the Standby side asynchronously.<\/p>\n<p>In order to provide this information, at least one standby database must have Standby Redo Logs and the LOG_ARCHIVE_DEST_n parameter must have ASYNC and NOAFFIRM Redo Transport properties.<\/p>\n<p>&nbsp;<\/p>\n<p>If we don&#8217;t have a problem in the network, our system can work like Maximum Availability mode even when using this mode.<\/p>\n<p>If we want to ENABLE Fast-Start Failover, we must use Maximum Availability or Maximum Performance mode.<\/p>\n<h4><strong>Comparison of Our Data Protection Modes<\/strong><\/h4>\n<p id=\"zfxXftT\"><img loading=\"lazy\" decoding=\"async\" width=\"1120\" height=\"596\" class=\"alignnone size-full wp-image-28559 \" src=\"https:\/\/dbtut.com\/wp-content\/uploads\/2022\/02\/img_61fa57cd8f3e7.png\" alt=\"\" \/><\/p>\n<div class=\"pvc_clear\"><\/div>\n<p id=\"pvc_stats_28548\" class=\"pvc_stats all  \" data-element-id=\"28548\" style=\"\"><i class=\"pvc-stats-icon medium\" aria-hidden=\"true\"><svg aria-hidden=\"true\" focusable=\"false\" data-prefix=\"far\" data-icon=\"chart-bar\" role=\"img\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\" class=\"svg-inline--fa fa-chart-bar fa-w-16 fa-2x\"><path fill=\"currentColor\" d=\"M396.8 352h22.4c6.4 0 12.8-6.4 12.8-12.8V108.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v230.4c0 6.4 6.4 12.8 12.8 12.8zm-192 0h22.4c6.4 0 12.8-6.4 12.8-12.8V140.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v198.4c0 6.4 6.4 12.8 12.8 12.8zm96 0h22.4c6.4 0 12.8-6.4 12.8-12.8V204.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v134.4c0 6.4 6.4 12.8 12.8 12.8zM496 400H48V80c0-8.84-7.16-16-16-16H16C7.16 64 0 71.16 0 80v336c0 17.67 14.33 32 32 32h464c8.84 0 16-7.16 16-16v-16c0-8.84-7.16-16-16-16zm-387.2-48h22.4c6.4 0 12.8-6.4 12.8-12.8v-70.4c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v70.4c0 6.4 6.4 12.8 12.8 12.8z\" class=\"\"><\/path><\/svg><\/i> <img loading=\"lazy\" decoding=\"async\" width=\"16\" height=\"16\" alt=\"Loading\" src=\"https:\/\/dbtut.com\/wp-content\/plugins\/page-views-count\/ajax-loader-2x.gif\" border=0 \/><\/p>\n<div class=\"pvc_clear\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>In today&#8217;s article, we will examine Data Guard Protection Modes. Data Guard Protection Modes are a decision that we can make by looking at how valuable the data is to us or how important the continuity of the primary database is. Therefore, we cannot define Redo Transport mode as a stand-alone data protection mode. We &hellip;<\/p>\n<div class=\"pvc_clear\"><\/div>\n<p id=\"pvc_stats_28548\" class=\"pvc_stats all  \" data-element-id=\"28548\" style=\"\"><i class=\"pvc-stats-icon medium\" aria-hidden=\"true\"><svg aria-hidden=\"true\" focusable=\"false\" data-prefix=\"far\" data-icon=\"chart-bar\" role=\"img\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\" class=\"svg-inline--fa fa-chart-bar fa-w-16 fa-2x\"><path fill=\"currentColor\" d=\"M396.8 352h22.4c6.4 0 12.8-6.4 12.8-12.8V108.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v230.4c0 6.4 6.4 12.8 12.8 12.8zm-192 0h22.4c6.4 0 12.8-6.4 12.8-12.8V140.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v198.4c0 6.4 6.4 12.8 12.8 12.8zm96 0h22.4c6.4 0 12.8-6.4 12.8-12.8V204.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v134.4c0 6.4 6.4 12.8 12.8 12.8zM496 400H48V80c0-8.84-7.16-16-16-16H16C7.16 64 0 71.16 0 80v336c0 17.67 14.33 32 32 32h464c8.84 0 16-7.16 16-16v-16c0-8.84-7.16-16-16-16zm-387.2-48h22.4c6.4 0 12.8-6.4 12.8-12.8v-70.4c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v70.4c0 6.4 6.4 12.8 12.8 12.8z\" class=\"\"><\/path><\/svg><\/i> <img loading=\"lazy\" decoding=\"async\" width=\"16\" height=\"16\" alt=\"Loading\" src=\"https:\/\/dbtut.com\/wp-content\/plugins\/page-views-count\/ajax-loader-2x.gif\" border=0 \/><\/p>\n<div class=\"pvc_clear\"><\/div>\n","protected":false},"author":484,"featured_media":28562,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[4],"tags":[],"class_list":["post-28548","post","type-post","status-publish","format-standard","has-post-thumbnail","","category-oracle"],"aioseo_notices":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Data Guard Protection Modes - Database Tutorials<\/title>\n<meta name=\"description\" content=\"In today&#039;s article, we will examine Data Guard Protection Modes. Data Guard Protection Modes are a decision that we can make\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/dbtut.com\/index.php\/2022\/02\/13\/data-guard-protection-modes\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Data Guard Protection Modes - Database Tutorials\" \/>\n<meta property=\"og:description\" content=\"In today&#039;s article, we will examine Data Guard Protection Modes. Data Guard Protection Modes are a decision that we can make\" \/>\n<meta property=\"og:url\" content=\"https:\/\/dbtut.com\/index.php\/2022\/02\/13\/data-guard-protection-modes\/\" \/>\n<meta property=\"og:site_name\" content=\"Database Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2022-02-13T10:04:42+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-02-13T10:14:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/dbtut.com\/wp-content\/uploads\/2022\/02\/Ekran-Alintisi.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"873\" \/>\n\t<meta property=\"og:image:height\" content=\"269\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Onur ARDAHANLI\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Onur ARDAHANLI\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/dbtut.com\/index.php\/2022\/02\/13\/data-guard-protection-modes\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/dbtut.com\/index.php\/2022\/02\/13\/data-guard-protection-modes\/\"},\"author\":{\"name\":\"Onur ARDAHANLI\",\"@id\":\"https:\/\/dbtut.com\/#\/schema\/person\/7fcd466cd0d347ec64aaa48f18f780c6\"},\"headline\":\"Data Guard Protection Modes\",\"datePublished\":\"2022-02-13T10:04:42+00:00\",\"dateModified\":\"2022-02-13T10:14:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/dbtut.com\/index.php\/2022\/02\/13\/data-guard-protection-modes\/\"},\"wordCount\":494,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/dbtut.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/dbtut.com\/index.php\/2022\/02\/13\/data-guard-protection-modes\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/dbtut.com\/wp-content\/uploads\/2022\/02\/Ekran-Alintisi.jpg\",\"articleSection\":[\"ORACLE\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/dbtut.com\/index.php\/2022\/02\/13\/data-guard-protection-modes\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/dbtut.com\/index.php\/2022\/02\/13\/data-guard-protection-modes\/\",\"url\":\"https:\/\/dbtut.com\/index.php\/2022\/02\/13\/data-guard-protection-modes\/\",\"name\":\"Data Guard Protection Modes - Database Tutorials\",\"isPartOf\":{\"@id\":\"https:\/\/dbtut.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/dbtut.com\/index.php\/2022\/02\/13\/data-guard-protection-modes\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/dbtut.com\/index.php\/2022\/02\/13\/data-guard-protection-modes\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/dbtut.com\/wp-content\/uploads\/2022\/02\/Ekran-Alintisi.jpg\",\"datePublished\":\"2022-02-13T10:04:42+00:00\",\"dateModified\":\"2022-02-13T10:14:15+00:00\",\"description\":\"In today's article, we will examine Data Guard Protection Modes. Data Guard Protection Modes are a decision that we can make\",\"breadcrumb\":{\"@id\":\"https:\/\/dbtut.com\/index.php\/2022\/02\/13\/data-guard-protection-modes\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/dbtut.com\/index.php\/2022\/02\/13\/data-guard-protection-modes\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/dbtut.com\/index.php\/2022\/02\/13\/data-guard-protection-modes\/#primaryimage\",\"url\":\"https:\/\/dbtut.com\/wp-content\/uploads\/2022\/02\/Ekran-Alintisi.jpg\",\"contentUrl\":\"https:\/\/dbtut.com\/wp-content\/uploads\/2022\/02\/Ekran-Alintisi.jpg\",\"width\":873,\"height\":269},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/dbtut.com\/index.php\/2022\/02\/13\/data-guard-protection-modes\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/dbtut.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Data Guard Protection Modes\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/dbtut.com\/#website\",\"url\":\"https:\/\/dbtut.com\/\",\"name\":\"Database Tutorials\",\"description\":\"MSSQL, Oracle, PostgreSQL, MySQL, MariaDB, DB2, Sybase, Teradata, Big Data, NOSQL, MongoDB, Couchbase, Cassandra, Windows, Linux\",\"publisher\":{\"@id\":\"https:\/\/dbtut.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/dbtut.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/dbtut.com\/#organization\",\"name\":\"dbtut\",\"url\":\"https:\/\/dbtut.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/dbtut.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/dbtut.com\/wp-content\/uploads\/2021\/02\/dbtutlogo.jpg\",\"contentUrl\":\"https:\/\/dbtut.com\/wp-content\/uploads\/2021\/02\/dbtutlogo.jpg\",\"width\":223,\"height\":36,\"caption\":\"dbtut\"},\"image\":{\"@id\":\"https:\/\/dbtut.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/dbtut.com\/#\/schema\/person\/7fcd466cd0d347ec64aaa48f18f780c6\",\"name\":\"Onur ARDAHANLI\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/dbtut.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/ecd20c3e1374ced4e1aefc82101cce4cd437be8fd957d1be3d106668b8a1b990?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/ecd20c3e1374ced4e1aefc82101cce4cd437be8fd957d1be3d106668b8a1b990?s=96&d=mm&r=g\",\"caption\":\"Onur ARDAHANLI\"},\"url\":\"https:\/\/dbtut.com\/index.php\/author\/onurardahanli\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Data Guard Protection Modes - Database Tutorials","description":"In today's article, we will examine Data Guard Protection Modes. Data Guard Protection Modes are a decision that we can make","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/dbtut.com\/index.php\/2022\/02\/13\/data-guard-protection-modes\/","og_locale":"en_US","og_type":"article","og_title":"Data Guard Protection Modes - Database Tutorials","og_description":"In today's article, we will examine Data Guard Protection Modes. Data Guard Protection Modes are a decision that we can make","og_url":"https:\/\/dbtut.com\/index.php\/2022\/02\/13\/data-guard-protection-modes\/","og_site_name":"Database Tutorials","article_published_time":"2022-02-13T10:04:42+00:00","article_modified_time":"2022-02-13T10:14:15+00:00","og_image":[{"width":873,"height":269,"url":"https:\/\/dbtut.com\/wp-content\/uploads\/2022\/02\/Ekran-Alintisi.jpg","type":"image\/jpeg"}],"author":"Onur ARDAHANLI","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Onur ARDAHANLI","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/dbtut.com\/index.php\/2022\/02\/13\/data-guard-protection-modes\/#article","isPartOf":{"@id":"https:\/\/dbtut.com\/index.php\/2022\/02\/13\/data-guard-protection-modes\/"},"author":{"name":"Onur ARDAHANLI","@id":"https:\/\/dbtut.com\/#\/schema\/person\/7fcd466cd0d347ec64aaa48f18f780c6"},"headline":"Data Guard Protection Modes","datePublished":"2022-02-13T10:04:42+00:00","dateModified":"2022-02-13T10:14:15+00:00","mainEntityOfPage":{"@id":"https:\/\/dbtut.com\/index.php\/2022\/02\/13\/data-guard-protection-modes\/"},"wordCount":494,"commentCount":0,"publisher":{"@id":"https:\/\/dbtut.com\/#organization"},"image":{"@id":"https:\/\/dbtut.com\/index.php\/2022\/02\/13\/data-guard-protection-modes\/#primaryimage"},"thumbnailUrl":"https:\/\/dbtut.com\/wp-content\/uploads\/2022\/02\/Ekran-Alintisi.jpg","articleSection":["ORACLE"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/dbtut.com\/index.php\/2022\/02\/13\/data-guard-protection-modes\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/dbtut.com\/index.php\/2022\/02\/13\/data-guard-protection-modes\/","url":"https:\/\/dbtut.com\/index.php\/2022\/02\/13\/data-guard-protection-modes\/","name":"Data Guard Protection Modes - Database Tutorials","isPartOf":{"@id":"https:\/\/dbtut.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/dbtut.com\/index.php\/2022\/02\/13\/data-guard-protection-modes\/#primaryimage"},"image":{"@id":"https:\/\/dbtut.com\/index.php\/2022\/02\/13\/data-guard-protection-modes\/#primaryimage"},"thumbnailUrl":"https:\/\/dbtut.com\/wp-content\/uploads\/2022\/02\/Ekran-Alintisi.jpg","datePublished":"2022-02-13T10:04:42+00:00","dateModified":"2022-02-13T10:14:15+00:00","description":"In today's article, we will examine Data Guard Protection Modes. Data Guard Protection Modes are a decision that we can make","breadcrumb":{"@id":"https:\/\/dbtut.com\/index.php\/2022\/02\/13\/data-guard-protection-modes\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/dbtut.com\/index.php\/2022\/02\/13\/data-guard-protection-modes\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/dbtut.com\/index.php\/2022\/02\/13\/data-guard-protection-modes\/#primaryimage","url":"https:\/\/dbtut.com\/wp-content\/uploads\/2022\/02\/Ekran-Alintisi.jpg","contentUrl":"https:\/\/dbtut.com\/wp-content\/uploads\/2022\/02\/Ekran-Alintisi.jpg","width":873,"height":269},{"@type":"BreadcrumbList","@id":"https:\/\/dbtut.com\/index.php\/2022\/02\/13\/data-guard-protection-modes\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/dbtut.com\/"},{"@type":"ListItem","position":2,"name":"Data Guard Protection Modes"}]},{"@type":"WebSite","@id":"https:\/\/dbtut.com\/#website","url":"https:\/\/dbtut.com\/","name":"Database Tutorials","description":"MSSQL, Oracle, PostgreSQL, MySQL, MariaDB, DB2, Sybase, Teradata, Big Data, NOSQL, MongoDB, Couchbase, Cassandra, Windows, Linux","publisher":{"@id":"https:\/\/dbtut.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/dbtut.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/dbtut.com\/#organization","name":"dbtut","url":"https:\/\/dbtut.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/dbtut.com\/#\/schema\/logo\/image\/","url":"https:\/\/dbtut.com\/wp-content\/uploads\/2021\/02\/dbtutlogo.jpg","contentUrl":"https:\/\/dbtut.com\/wp-content\/uploads\/2021\/02\/dbtutlogo.jpg","width":223,"height":36,"caption":"dbtut"},"image":{"@id":"https:\/\/dbtut.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/dbtut.com\/#\/schema\/person\/7fcd466cd0d347ec64aaa48f18f780c6","name":"Onur ARDAHANLI","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/dbtut.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/ecd20c3e1374ced4e1aefc82101cce4cd437be8fd957d1be3d106668b8a1b990?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ecd20c3e1374ced4e1aefc82101cce4cd437be8fd957d1be3d106668b8a1b990?s=96&d=mm&r=g","caption":"Onur ARDAHANLI"},"url":"https:\/\/dbtut.com\/index.php\/author\/onurardahanli\/"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/dbtut.com\/index.php\/wp-json\/wp\/v2\/posts\/28548","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dbtut.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dbtut.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dbtut.com\/index.php\/wp-json\/wp\/v2\/users\/484"}],"replies":[{"embeddable":true,"href":"https:\/\/dbtut.com\/index.php\/wp-json\/wp\/v2\/comments?post=28548"}],"version-history":[{"count":0,"href":"https:\/\/dbtut.com\/index.php\/wp-json\/wp\/v2\/posts\/28548\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/dbtut.com\/index.php\/wp-json\/wp\/v2\/media\/28562"}],"wp:attachment":[{"href":"https:\/\/dbtut.com\/index.php\/wp-json\/wp\/v2\/media?parent=28548"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dbtut.com\/index.php\/wp-json\/wp\/v2\/categories?post=28548"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dbtut.com\/index.php\/wp-json\/wp\/v2\/tags?post=28548"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}