SlideShare a Scribd company logo
1 of 9
5 Pitfalls of Agent-based Solutions
The Problem With Agents 
The use of agents with a backup and recovery 
solution (either a tape or a disk-to-disk (D2D) 
product), has a direct impact on data security, 
recoverability, and costs. IT managers know the 
downsides that accompany agent-based 
solutions.
5 Pitfalls of Agent-based Solutions 
1. Compromised Security 
2. More pieces of software to manage and to fail 
3. Exorbitant licensing fees 
4. Mounting administrative costs 
5. Application disruption
Compromised Security 
A port in the firewall must be opened for every 
agent. Since almost every agent has 
administrative privileges, it effectively creates 
vulnerability in the server architecture. Hackers 
need only to tap into the agent to attack the 
server. With no in-flight encryption, agents put 
data at risk during transmission from the remote 
office to the data center. 
CC Image courtesy of Daniela on Flickr
More pieces of software 
to manage and to fail 
More sites, more data, more applications, more 
users, more systems, more agents—growth 
makes everything harder to manage—agents 
only compound the problem. As infrastructure 
expands in size and complexity, problem 
diagnosis takes longer. 
CC Image courtesy of Wheeler on Flickr
Exorbitant licensing fees 
Traditional software vendors charge for 
software based on the old per-system model. 
This is costly and requires customers to closely 
monitor their complex system and user 
landscapes. For many growing organizations, 
buying a site license is actually a simpler 
solution — albeit even more costly and often 
unnecessary — than trying to keep track of 
backup products installed across hundreds or 
thousands of machines. 
CC Image courtesy of johnr71 on Flickr
Mounting administrative costs 
Each time a data center administrator or service provider 
has to deploy an agent, or intervene to support it at a 
remote site, cost rolls back into the business model 
making it increasingly difficult to remain competitive. 
CC Image courtesy of 401(k) 2012 on Flickr
Application disruption 
Each time a hot fix or new version of the 
software is released, the agents must be 
upgraded too. This upgrade process requires a 
reboot of the server that the agent resides on. 
Unfortunately, this application disruption must 
be repeated for every affected server on the 
network. 
CC Image courtesy of Irma on Flickr
Download the 
white paper today 
416-736-8111 
www.asigra.com 
info@asigra.com 
@asigra

More Related Content

What's hot

Proximity Issues Brief – Software Licence Issues in a Thin-Client or Virtuali...
Proximity Issues Brief – Software Licence Issues in a Thin-Client or Virtuali...Proximity Issues Brief – Software Licence Issues in a Thin-Client or Virtuali...
Proximity Issues Brief – Software Licence Issues in a Thin-Client or Virtuali...
Sean King
 
V mware cdcr-11-q3-en-case-study
V mware cdcr-11-q3-en-case-studyV mware cdcr-11-q3-en-case-study
V mware cdcr-11-q3-en-case-study
joepanora
 
Backup Exec 15 Tuning and Performance Guide
Backup Exec 15 Tuning and Performance GuideBackup Exec 15 Tuning and Performance Guide
Backup Exec 15 Tuning and Performance Guide
Symantec
 
228閉館公告.ppt
228閉館公告.ppt228閉館公告.ppt
228閉館公告.ppt
b4worker
 
Mohammed Al Mulla - Best practices to secure working environments
Mohammed Al Mulla - Best practices to secure working environmentsMohammed Al Mulla - Best practices to secure working environments
Mohammed Al Mulla - Best practices to secure working environments
nooralmousa
 
IT GRC with Symantec
IT GRC with SymantecIT GRC with Symantec
IT GRC with Symantec
Arrow ECS UK
 

What's hot (20)

Proximity Issues Brief – Software Licence Issues in a Thin-Client or Virtuali...
Proximity Issues Brief – Software Licence Issues in a Thin-Client or Virtuali...Proximity Issues Brief – Software Licence Issues in a Thin-Client or Virtuali...
Proximity Issues Brief – Software Licence Issues in a Thin-Client or Virtuali...
 
Acquisition the great migration
Acquisition  the great migrationAcquisition  the great migration
Acquisition the great migration
 
V mware cdcr-11-q3-en-case-study
V mware cdcr-11-q3-en-case-studyV mware cdcr-11-q3-en-case-study
V mware cdcr-11-q3-en-case-study
 
Backup Exec 15 Tuning and Performance Guide
Backup Exec 15 Tuning and Performance GuideBackup Exec 15 Tuning and Performance Guide
Backup Exec 15 Tuning and Performance Guide
 
Data Center Downtime
Data Center DowntimeData Center Downtime
Data Center Downtime
 
228閉館公告.ppt
228閉館公告.ppt228閉館公告.ppt
228閉館公告.ppt
 
Mohammed Al Mulla - Best practices to secure working environments
Mohammed Al Mulla - Best practices to secure working environmentsMohammed Al Mulla - Best practices to secure working environments
Mohammed Al Mulla - Best practices to secure working environments
 
IT Service & Asset Management Better Together
IT Service & Asset Management Better TogetherIT Service & Asset Management Better Together
IT Service & Asset Management Better Together
 
Cloud resilience, provisioning
Cloud resilience, provisioning Cloud resilience, provisioning
Cloud resilience, provisioning
 
Vazata Federal IaaS
Vazata Federal IaaSVazata Federal IaaS
Vazata Federal IaaS
 
Unifying Windows Client and Microsoft Desktop Virtualization Deployments with...
Unifying Windows Client and Microsoft Desktop Virtualization Deployments with...Unifying Windows Client and Microsoft Desktop Virtualization Deployments with...
Unifying Windows Client and Microsoft Desktop Virtualization Deployments with...
 
Accenture Customer Story_CAST
Accenture Customer Story_CASTAccenture Customer Story_CAST
Accenture Customer Story_CAST
 
Ch14 resilience engineering
Ch14 resilience engineeringCh14 resilience engineering
Ch14 resilience engineering
 
AMB420: Data Center Licensing with License Optimizer
AMB420: Data Center Licensing with License OptimizerAMB420: Data Center Licensing with License Optimizer
AMB420: Data Center Licensing with License Optimizer
 
Managed Desktop Services
Managed Desktop ServicesManaged Desktop Services
Managed Desktop Services
 
IT GRC with Symantec
IT GRC with SymantecIT GRC with Symantec
IT GRC with Symantec
 
Windows 10 Migration Tips, Tricks, and Strategies
Windows 10 Migration Tips, Tricks, and StrategiesWindows 10 Migration Tips, Tricks, and Strategies
Windows 10 Migration Tips, Tricks, and Strategies
 
It Budget Tips
It Budget TipsIt Budget Tips
It Budget Tips
 
What's Really Different About Microservices
What's Really Different About MicroservicesWhat's Really Different About Microservices
What's Really Different About Microservices
 
Unit5
Unit5Unit5
Unit5
 

Viewers also liked (6)

Asigra Cloud-to-Cloud Survey Results
Asigra Cloud-to-Cloud Survey ResultsAsigra Cloud-to-Cloud Survey Results
Asigra Cloud-to-Cloud Survey Results
 
Why Agentless Backup is More Secure
Why Agentless Backup is More SecureWhy Agentless Backup is More Secure
Why Agentless Backup is More Secure
 
Asigra AWS Snapshot Manager
Asigra AWS Snapshot ManagerAsigra AWS Snapshot Manager
Asigra AWS Snapshot Manager
 
7 Reasons Users pick Asigra as Top Enterprise Backup Application
7 Reasons Users pick Asigra as Top Enterprise Backup Application7 Reasons Users pick Asigra as Top Enterprise Backup Application
7 Reasons Users pick Asigra as Top Enterprise Backup Application
 
5 Backup Industry Predictions for 2015
5 Backup Industry Predictions for 20155 Backup Industry Predictions for 2015
5 Backup Industry Predictions for 2015
 
4 Keys of a Robust Data Recovery Strategy
4 Keys of a Robust Data Recovery Strategy 4 Keys of a Robust Data Recovery Strategy
4 Keys of a Robust Data Recovery Strategy
 

Similar to 5 Pitfalls of Agent Based Solutions

INLINE_PATCH_PROXY_FOR_XEN_HYPERVISOR
INLINE_PATCH_PROXY_FOR_XEN_HYPERVISORINLINE_PATCH_PROXY_FOR_XEN_HYPERVISOR
INLINE_PATCH_PROXY_FOR_XEN_HYPERVISOR
Neha Rana
 
Week 7 - Choices in Systems Acquisition and Risks, Security,.docx
Week 7 - Choices in Systems Acquisition and Risks, Security,.docxWeek 7 - Choices in Systems Acquisition and Risks, Security,.docx
Week 7 - Choices in Systems Acquisition and Risks, Security,.docx
helzerpatrina
 
Cloud brings advantages such as flexibility and scalability cloud co.pdf
Cloud brings advantages such as flexibility and scalability cloud co.pdfCloud brings advantages such as flexibility and scalability cloud co.pdf
Cloud brings advantages such as flexibility and scalability cloud co.pdf
anilgoelslg
 
Propalms Centralized Computing Solution Document
Propalms Centralized Computing   Solution DocumentPropalms Centralized Computing   Solution Document
Propalms Centralized Computing Solution Document
Vijender Yadav
 
Safety in the Cloud(s): 'Vaporizing' the Web Application Firewall to Secure C...
Safety in the Cloud(s): 'Vaporizing' the Web Application Firewall to Secure C...Safety in the Cloud(s): 'Vaporizing' the Web Application Firewall to Secure C...
Safety in the Cloud(s): 'Vaporizing' the Web Application Firewall to Secure C...
white paper
 
Application Virtualization
Application VirtualizationApplication Virtualization
Application Virtualization
Amit Gatenyo
 

Similar to 5 Pitfalls of Agent Based Solutions (20)

Icomm agentless-architecture
Icomm agentless-architectureIcomm agentless-architecture
Icomm agentless-architecture
 
Advantages and disadvantages of cloud based manufacturing software
Advantages and disadvantages of cloud based manufacturing softwareAdvantages and disadvantages of cloud based manufacturing software
Advantages and disadvantages of cloud based manufacturing software
 
Whitepaper - Analyzing the Adoption of Cloud Computing For Banking & Finance.pdf
Whitepaper - Analyzing the Adoption of Cloud Computing For Banking & Finance.pdfWhitepaper - Analyzing the Adoption of Cloud Computing For Banking & Finance.pdf
Whitepaper - Analyzing the Adoption of Cloud Computing For Banking & Finance.pdf
 
Esg solution showcase considerations for protecting converged systems and ...
Esg solution showcase  considerations for protecting converged systems   and ...Esg solution showcase  considerations for protecting converged systems   and ...
Esg solution showcase considerations for protecting converged systems and ...
 
INLINE_PATCH_PROXY_FOR_XEN_HYPERVISOR
INLINE_PATCH_PROXY_FOR_XEN_HYPERVISORINLINE_PATCH_PROXY_FOR_XEN_HYPERVISOR
INLINE_PATCH_PROXY_FOR_XEN_HYPERVISOR
 
Week 7 - Choices in Systems Acquisition and Risks, Security,.docx
Week 7 - Choices in Systems Acquisition and Risks, Security,.docxWeek 7 - Choices in Systems Acquisition and Risks, Security,.docx
Week 7 - Choices in Systems Acquisition and Risks, Security,.docx
 
Pros and Cons of Cloud-Based and On-Premise CMMS Software
Pros and Cons of Cloud-Based and On-Premise CMMS SoftwarePros and Cons of Cloud-Based and On-Premise CMMS Software
Pros and Cons of Cloud-Based and On-Premise CMMS Software
 
User_Access_IIA-LA_3-9-2016
User_Access_IIA-LA_3-9-2016User_Access_IIA-LA_3-9-2016
User_Access_IIA-LA_3-9-2016
 
Lastline Case Study
Lastline Case StudyLastline Case Study
Lastline Case Study
 
Is it an internal affair
Is it an internal affairIs it an internal affair
Is it an internal affair
 
Cloud brings advantages such as flexibility and scalability cloud co.pdf
Cloud brings advantages such as flexibility and scalability cloud co.pdfCloud brings advantages such as flexibility and scalability cloud co.pdf
Cloud brings advantages such as flexibility and scalability cloud co.pdf
 
Top 3 Reasons to Deliver Web Apps with Application Virtualization
Top 3 Reasons to Deliver Web Apps with Application VirtualizationTop 3 Reasons to Deliver Web Apps with Application Virtualization
Top 3 Reasons to Deliver Web Apps with Application Virtualization
 
Cloud computing(Basic).pptx
Cloud computing(Basic).pptxCloud computing(Basic).pptx
Cloud computing(Basic).pptx
 
9 Things You Need to Know Before Moving to the Cloud
9 Things You Need to Know Before Moving to the Cloud9 Things You Need to Know Before Moving to the Cloud
9 Things You Need to Know Before Moving to the Cloud
 
2009 Security Mega Trends & Emerging Threats
2009 Security Mega Trends & Emerging Threats2009 Security Mega Trends & Emerging Threats
2009 Security Mega Trends & Emerging Threats
 
Propalms Centralized Computing Solution Document
Propalms Centralized Computing   Solution DocumentPropalms Centralized Computing   Solution Document
Propalms Centralized Computing Solution Document
 
Virtualization 2011 v1
Virtualization 2011 v1Virtualization 2011 v1
Virtualization 2011 v1
 
Symantec Disaster Recovery Orchestrator: One Click Disaster Recovery to the C...
Symantec Disaster Recovery Orchestrator: One Click Disaster Recovery to the C...Symantec Disaster Recovery Orchestrator: One Click Disaster Recovery to the C...
Symantec Disaster Recovery Orchestrator: One Click Disaster Recovery to the C...
 
Safety in the Cloud(s): 'Vaporizing' the Web Application Firewall to Secure C...
Safety in the Cloud(s): 'Vaporizing' the Web Application Firewall to Secure C...Safety in the Cloud(s): 'Vaporizing' the Web Application Firewall to Secure C...
Safety in the Cloud(s): 'Vaporizing' the Web Application Firewall to Secure C...
 
Application Virtualization
Application VirtualizationApplication Virtualization
Application Virtualization
 

More from Asigra (6)

7 Benefits of Agentless Backup
7 Benefits of Agentless Backup 7 Benefits of Agentless Backup
7 Benefits of Agentless Backup
 
9 Reasons to Choose Asigra
9 Reasons to Choose Asigra9 Reasons to Choose Asigra
9 Reasons to Choose Asigra
 
8 Reasons for Data Loss
8 Reasons for Data Loss8 Reasons for Data Loss
8 Reasons for Data Loss
 
Asigra Backup Modernization Survey Results
Asigra Backup Modernization Survey ResultsAsigra Backup Modernization Survey Results
Asigra Backup Modernization Survey Results
 
What is cloud backup?
What is cloud backup?What is cloud backup?
What is cloud backup?
 
3 ways to stretch your backup budget
3 ways to stretch your backup budget3 ways to stretch your backup budget
3 ways to stretch your backup budget
 

Recently uploaded

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 

Recently uploaded (20)

Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 

5 Pitfalls of Agent Based Solutions

  • 1. 5 Pitfalls of Agent-based Solutions
  • 2. The Problem With Agents The use of agents with a backup and recovery solution (either a tape or a disk-to-disk (D2D) product), has a direct impact on data security, recoverability, and costs. IT managers know the downsides that accompany agent-based solutions.
  • 3. 5 Pitfalls of Agent-based Solutions 1. Compromised Security 2. More pieces of software to manage and to fail 3. Exorbitant licensing fees 4. Mounting administrative costs 5. Application disruption
  • 4. Compromised Security A port in the firewall must be opened for every agent. Since almost every agent has administrative privileges, it effectively creates vulnerability in the server architecture. Hackers need only to tap into the agent to attack the server. With no in-flight encryption, agents put data at risk during transmission from the remote office to the data center. CC Image courtesy of Daniela on Flickr
  • 5. More pieces of software to manage and to fail More sites, more data, more applications, more users, more systems, more agents—growth makes everything harder to manage—agents only compound the problem. As infrastructure expands in size and complexity, problem diagnosis takes longer. CC Image courtesy of Wheeler on Flickr
  • 6. Exorbitant licensing fees Traditional software vendors charge for software based on the old per-system model. This is costly and requires customers to closely monitor their complex system and user landscapes. For many growing organizations, buying a site license is actually a simpler solution — albeit even more costly and often unnecessary — than trying to keep track of backup products installed across hundreds or thousands of machines. CC Image courtesy of johnr71 on Flickr
  • 7. Mounting administrative costs Each time a data center administrator or service provider has to deploy an agent, or intervene to support it at a remote site, cost rolls back into the business model making it increasingly difficult to remain competitive. CC Image courtesy of 401(k) 2012 on Flickr
  • 8. Application disruption Each time a hot fix or new version of the software is released, the agents must be upgraded too. This upgrade process requires a reboot of the server that the agent resides on. Unfortunately, this application disruption must be repeated for every affected server on the network. CC Image courtesy of Irma on Flickr
  • 9. Download the white paper today 416-736-8111 www.asigra.com info@asigra.com @asigra

Editor's Notes

  1. Flickr source:Daniela https://www.flickr.com/photos/_cinnamongirl_/4719955116/in/photolist-8c61du-8QidM5-8QhWjA-mCjpG1-6xiTW-9vhGNg-687b9t-8Lbbjn-4LgcRj-8P3so9-dmhTZV-66MoHs-4ukLnr-4tZwf3--aesK6B-7tFe45-nbGoYn-hEQkkp-5Yt3g9-8K3BwY-7yePHw-4qhPDN-ch8n3w-hnYDLw-ibRxGP-k4LALk-mKR78F-hEQkR4-as19Xy-hjG67k-bDtM2Q-9bH4ur-3dFgrb-6z4nLX-hsNMkM-6ud1af-nvXbCg-ntijbW-5W4jir-7T4B4H-7VjKCe-5xiEh1-hi8XRv-83pfyE-83pfow-83m9V2-83mapB-83pfSs-83m9Ne
  2. Flickr: Nick Wheeler https://www.flickr.com/photos/nickwheeleroz/2475011402/in/photolist-5QsoS4-68BdF7-nY5ghH-Byei-6xHg4D-4Yz9pX-bxTkFi-G3A6H-9uvLiX-6saNDt-2pJwNU-7vHV37-huVdVU-LtANW-4LH5Eo-7YfJEU-6iqkif-4kPZSy-n677G1-6fG3cA-otMiN-nGxoRF-Dbr24-dimsLA-bkn527-iqzsx-aDNoX3-4YujuD-5wHKde-bkrPGZ-6Cpndm-5mXZMK-aub54u-6mmvnf-9r1bkN-bgqRne-daE3nQ-niJXd9-4o3833-5PZ1uJ-9iAnWd-5hpS1J-fDbcL8-dNokoD-5r4pYU-dd9wDe-8FSgP7-7FVyM6-jDK8dZ-b8vXKp
  3. Flickr: johnr71 https://www.flickr.com/photos/werdinsel/3970430829/in/photolist-73RuKX-axpAZ3-dxd4X-bZvUDS-2Bvzr6-bta3kH-9wUujx-nmBKXo-dxuWAA-6RtATg-97a2EQ-a9JfVU-4PFxfL-6S5a4M-abWteX-58mdYr-QxcaH-7HKuTk-dAZ56a-4Z9qi7-7keDu6-5tzfK2-4kzsX8-gDEKZ-h3Hnof-brd1K2-7xzWSa-6G1cSn-5dTR5Y-4jADaG-fWMmdW-dTUAhR-k4eBP2-aRWoXr-2nn3Gn-4CW5zn-9tUy9S-3ijh8-MZLQA-onmVA-5p8w8o-5rzm-aosgi9-bq61RF-d9bVR-648c5A-dj5e9J-mbGHps-9um7iM-ddi5Gd
  4. Flickr source: 401(K) 2012 https://www.flickr.com/photos/68751915@N05/6551534889/in/photolist-aYWk56-aFAQEv-buW1s2-7M4MWJ-PNrwk-6u2TxZ-84wJAM-4mafw3-5k7qL3-4K9ZCw-buhrpp-6MMVrB-7jq9Cn-Qt2VW-5G4WCi-6uXAjv-cDWLKs-62QVKf-dm3GF5-8CCxH-29ocTv-a2i22S-egE3Qz-apUnh-7m9Y8g-3q1C3-buV6x-5tnxsi-82zjvr-73RuKX-axpAZ3-dxd4X-bZvUDS-2Bvzr6-bta3kH-9wUujx-nmBKXo-dxuWAA-6RtATg-97a2EQ-a9JfVU-4PFxfL-6S5a4M-abWteX-58mdYr-QxcaH-7HKuTk-dAZ56a-9um7iM-4Z9qi7
  5. Flickr: Irma https://www.flickr.com/photos/perikita/141716937/in/photolist-dwkvt-7aT28E-7kmzDZ-nkuXt6-9iGi4C-BmfPn-9b2saC-cKR3jL-nFiJcU-9S3veK-9aGSGd-bkDpUQ-9aJz2D-7ExN7B-9b4rDh-ho4LN7-au68o6-5ZWPmi-BXg8j-9aX6R8-8R1GmL-jk7D9A-bk5L6u-5FWC5z-apK4yb-3fyDpe-6pebQj-7vVqpm-6GNfF8-c9bp2w-6Fy4Nt-5ybW9F-jxSdAL-b83ZER-9zGAFj-9aWRr3-9nQ3fq-9xgr1i-BfTqt-4q7MvF-7JGFfF-7JZbmd-amHjyn-e6EzaH-7HdVGo-4Bip5j-eD1xS-99i2k-avQmmh-mCPdAL