Background
The modern data protection environments are very complex and demanding. There are numerous layers involved starting from bare bone hardware, firmware, device management, kernel, operating system, volume management, file system, connectivit...