{"id":112601,"date":"2025-12-02T08:47:40","date_gmt":"2025-12-02T16:47:40","guid":{"rendered":"https:\/\/www.backblaze.com\/blog\/?p=112601"},"modified":"2025-12-03T11:35:29","modified_gmt":"2025-12-03T19:35:29","slug":"your-training-data-is-your-most-valuable-ip","status":"publish","type":"post","link":"https:\/\/www.backblaze.com\/blog\/your-training-data-is-your-most-valuable-ip\/","title":{"rendered":"Your Training Data Is Your Most Valuable IP"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"583\" src=\"https:\/\/backblazeprod.wpenginepowered.com\/wp-content\/uploads\/2025\/12\/Q126-0001-Blog-Header-1440x820-1-1024x583.png\" alt=\"A decorative image showing different generic computer module icons. \" class=\"wp-image-112602\" srcset=\"https:\/\/backblazeprod.wpenginepowered.com\/wp-content\/uploads\/2025\/12\/Q126-0001-Blog-Header-1440x820-1-1024x583.png 1024w, https:\/\/backblazeprod.wpenginepowered.com\/wp-content\/uploads\/2025\/12\/Q126-0001-Blog-Header-1440x820-1-300x171.png 300w, https:\/\/backblazeprod.wpenginepowered.com\/wp-content\/uploads\/2025\/12\/Q126-0001-Blog-Header-1440x820-1-768x437.png 768w, https:\/\/backblazeprod.wpenginepowered.com\/wp-content\/uploads\/2025\/12\/Q126-0001-Blog-Header-1440x820-1.png 1440w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<div style=\"height:15px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>AI training data is now a company&#8217;s most <a href=\"https:\/\/www.backblaze.com\/blog\/building-multimodal-ai-data-infrastructure-with-pixeltable\/\" target=\"_blank\" rel=\"noreferrer noopener\">valuable intellectual property<\/a>\u2014often worth more than the models themselves. Models can be replicated and architectures become public knowledge, but the datasets that capture your domain expertise and years of careful curation are irreplaceable.<\/p>\n\n\n\n<p>Yet as AI workflows become increasingly distributed, that data moves constantly between environments, increasing exposure while reducing visibility. According to <a href=\"https:\/\/www.ibm.com\/think\/insights\/whats-new-2024-cost-of-a-data-breach-report\" target=\"_blank\" rel=\"noreferrer noopener\">IBM<\/a>, \u201cForty percent of breaches involved data stored across multiple environments\u2026 highlighting the challenge of tracking and safeguarding data, including shadow data, and data in AI workloads.\u201d Meanwhile <a href=\"https:\/\/mitsloan.mit.edu\/ideas-made-to-matter\/bringing-transparency-to-data-used-to-train-artificial-intelligence\" target=\"_blank\" rel=\"noreferrer noopener\">MIT Sloan<\/a> researchers have documented that AI training datasets are often inconsistently documented and poorly understood, <a href=\"https:\/\/www.backblaze.com\/blog\/the-truth-about-cloud-security-costs-why-high-costs-dont-always-mean-better-protection\/\" target=\"_blank\" rel=\"noreferrer noopener\">creating exposure<\/a> that extends beyond technical vulnerabilities into operational and compliance failures.<\/p>\n\n\n\n<p>Yet many organizations still treat training datasets as just another storage bucket. But protecting data at rest is both a compliance requirement and a competitive necessity. The integrity of your datasets now determines the integrity of your models.<\/p>\n\n\n\n<div class=\"abstract\" style=\"line-height: 1.8; margin: 24px 12px; padding: 24px 12px 10px 12px;\">\n<h4>Free resource: Understand why object storage is a strategic driver<\/h4>\nDownload our free ebook to learn how object storage supports every stage of the AI pipeline\u2014from data collection to model deployment. \n<br \/>\n<br \/>\n<!--HubSpot Call-to-Action Code --><span class=\"hs-cta-wrapper\" id=\"hs-cta-wrapper-afedc89c-6915-413b-985f-a047c2682f87\"><span class=\"hs-cta-node hs-cta-afedc89c-6915-413b-985f-a047c2682f87\" id=\"hs-cta-afedc89c-6915-413b-985f-a047c2682f87\"><!--[if lte IE 8]><div id=\"hs-cta-ie-element\"><\/div><![endif]--><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/2832298\/afedc89c-6915-413b-985f-a047c2682f87\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"hs-cta-img\" id=\"hs-cta-img-afedc89c-6915-413b-985f-a047c2682f87\" style=\"border-width:0px;\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/2832298\/afedc89c-6915-413b-985f-a047c2682f87.png\"  alt=\"Download the Ebook\"\/><\/a><\/span><script charset=\"utf-8\" src=\"https:\/\/js.hscta.net\/cta\/current.js\"><\/script><script type=\"text\/javascript\"> hbspt.cta.load(2832298, 'afedc89c-6915-413b-985f-a047c2682f87', {\"useNewLoader\":\"true\",\"region\":\"na1\"}); <\/script><\/span><!-- end HubSpot Call-to-Action Code -->\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Why training data is the new target<\/h2>\n\n\n\n<p>The <a href=\"https:\/\/www.backblaze.com\/blog\/ai-101-how-ai-and-ransomware-are-reshaping-cybersecurity\/\" target=\"_blank\" rel=\"noreferrer noopener\">attack surface for AI systems<\/a> has fundamentally shifted. Rather than targeting models in production, sophisticated adversaries now focus on the training pipeline itself.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Data poisoning has emerged as an insidious threat<\/h3>\n\n\n\n<p>Attackers inject subtle changes like biased samples, mislabeled data, or adversarial examples that skew model outcomes or introduce hidden backdoors. <a href=\"https:\/\/finance.yahoo.com\/news\/one-four-organizations-fall-victim-090000892.html\">Recent research<\/a> reveals that 26% of organizations surveyed in the US and UK have been victims of AI data poisoning in the last year. These poisoned models can quietly undermine fraud detection, weaken cyber defenses, and corrupt business-critical decisions.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Intellectual property theft takes on new dimensions <\/h3>\n\n\n\n<p>When adversaries steal training datasets, they&#8217;re stealing the accumulated expertise that gives your models their edge. Your training data represents thousands of hours of curation and annotation that encodes institutional knowledge about your customers and market. A competitor with your datasets can replicate your capabilities in weeks rather than years.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Silent corruption poses an equally serious but less visible threat <\/h3>\n\n\n\n<p>Infrastructure failures, human errors, or gradual drift in data pipelines can corrupt training datasets without triggering alerts. For organizations in regulated industries such as healthcare, financial services, or autonomous systems, this creates a reproducibility crisis. How do you prove your model was trained on authentic, unaltered data when you can&#8217;t verify the data&#8217;s provenance?<\/p>\n\n\n\n<p>The <a href=\"https:\/\/nvlpubs.nist.gov\/nistpubs\/ai\/nist.ai.100-1.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">NIST AI Risk Management Framework<\/a> emphasizes that maintaining the provenance of training data and supporting attribution of AI system decisions to subsets of training data can assist with both transparency and accountability. Regulators and customers increasingly expect verifiable proof of data integrity throughout the training lifecycle.<\/p>\n\n\n\n<p>The takeaway? The trustworthiness of every model begins with the trustworthiness of its data.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The principles of a secure AI data foundation<\/h2>\n\n\n\n<p>A strong protection model rests on three pillars\u2014immutability, encryption, and regional control\u2014each reinforcing long-term integrity.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">1. Immutability: Protect against tampering or deletion<\/h3>\n\n\n\n<p>Immutability means write-once, read-many (WORM) protection that prevents modification or removal. Once data is written, it becomes locked\u2014no one can modify, overwrite, or delete it for a defined retention period, but it remains fully accessible for reading. This technical guarantee prevents data poisoning attacks, stops accidental deletion, and enables verifiable reproducibility.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.cisa.gov\/news-events\/cybersecurity-advisories\/aa24-109a\" target=\"_blank\" rel=\"noreferrer noopener\">CISA advisories<\/a> recommend immutable backups to guard against ransomware, but the benefits extend much further for AI systems. When you lock a dataset snapshot before training begins, you guarantee the ability to reproduce that exact model state, which is critical for debugging, regulatory audits, and forensic investigations when models fail.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.backblaze.com\/docs\/cloud-storage-object-lock\" target=\"_blank\" rel=\"noreferrer noopener\">Object Lock<\/a> capabilities enforce immutability at the storage layer for set retention periods. Each dataset version becomes permanently immutable, creating an unalterable record of your training history that no administrator or attacker can modify.<\/p>\n\n\n\n<p class=\"has-background\" style=\"background-color:#e6e3ff\"><strong>Implementation tip:<\/strong> Enable Object Lock at the bucket level and integrate it with your data-ingestion scripts to automatically lock datasets as they&#8217;re created.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">2. Encryption: Safeguard confidential data<\/h3>\n\n\n\n<p>Training datasets contain extraordinary value\u2014customer information, proprietary annotations, competitive intelligence embedded in data selection. <a href=\"https:\/\/www.backblaze.com\/docs\/cloud-storage-server-side-encryption\" target=\"_blank\" rel=\"noreferrer noopener\">Server-side encryption<\/a> protects this data both in transit and at rest, defending against unauthorized access even if other security layers fail. <a href=\"https:\/\/www.enisa.europa.eu\/sites\/default\/files\/2025-06\/ENISA_Technical_implementation_guidance_on_cybersecurity_risk_management_measures_version_1.0.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">The EU&#8217;s recent NIS2 technical guidance<\/a> explicitly prescribes cryptography as a required control measure for compliance.<\/p>\n\n\n\n<p>The key to practical encryption is simplicity. Solutions should integrate seamlessly into existing workflows without requiring separate key-management infrastructure or introducing performance overhead that disrupts training pipelines.<\/p>\n\n\n\n<p class=\"has-background\" style=\"background-color:#e6e3ff\"><strong>Implementation tip:<\/strong> Look for server-side encryption options (like SSE-B2 or SSE-C) that remain transparent to your applications while providing the protection regulators require.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">3. Regional control: Ensure data sovereignty and availability<\/h3>\n\n\n\n<p>Where your data physically resides matters for compliance, latency, and operational resilience. <a href=\"https:\/\/commission.europa.eu\/law\/law-topic\/data-protection\/rules-business-and-organisations\/obligations\/what-rules-apply-if-my-organisation-transfers-data-outside-eu_en\" target=\"_blank\" rel=\"noreferrer noopener\">GDPR<\/a> and similar regulations often require that sensitive data remain within specific jurisdictions. Beyond compliance, regional placement affects training performance\u2014positioning data near compute resources or using high-performance delivery mechanisms can reduce transfer delays when moving large datasets.<\/p>\n\n\n\n<p>The critical factor is transparency. You need explicit control over region selection and assurance that data won&#8217;t be replicated to secondary regions without your knowledge. Ambiguous &#8220;regional&#8221; configurations that might span continents create compliance risk.&nbsp;<\/p>\n\n\n\n<p>Consider a U.S. biomedical AI startup working with patient-derived data. They need datasets stored exclusively in U.S. regions to satisfy HIPAA requirements, Object Lock enabled to prove data integrity for regulatory submissions, and encryption applied to protect sensitive patient information\u2014all while maintaining the competitive advantage their proprietary data provides. Regional control with clear guarantees makes this achievable.<\/p>\n\n\n\n<p class=\"has-background\" style=\"background-color:#e6e3ff\"><strong>Implementation tip:<\/strong> Choose storage providers that let you explicitly <a href=\"https:\/\/www.backblaze.com\/docs\/cloud-storage-data-regions\" target=\"_blank\" rel=\"noreferrer noopener\">select regions<\/a> during bucket creation with clear guarantees about where data resides, including replication destinations.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Beyond security: Enabling trust and traceability<\/h2>\n\n\n\n<p>Immutable, encrypted, regionally contained object storage enables AI governance at a level traditional storage infrastructure cannot.<\/p>\n\n\n\n<p>Each dataset snapshot becomes a verifiable record of model history. When a model behaves unexpectedly in production, you can trace back to the exact training data used to create it. This capability accelerates debugging and provides the evidence needed to explain model decisions to regulators, customers, or internal stakeholders.<\/p>\n\n\n\n<p>Storage infrastructure with built-in immutability and access logging provides the verifiable evidence that auditors require. Instead of reconstructing data lineage from logs and documentation, you can demonstrate exactly what happened with cryptographic proof.<\/p>\n\n\n\n<p>These capabilities transform storage from a passive repository into an active component of your AI governance framework.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Implementation snapshot: Putting it all together<\/h2>\n\n\n\n<p>Establishing these protections with Backblaze B2 follows a straightforward path:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Create buckets in regions that match your compliance and latency requirements.<\/li>\n\n\n\n<li>Enable Object Lock and configure retention policies aligned with your model development lifecycle.<\/li>\n\n\n\n<li>Apply server-side encryption (SSE-B2 or SSE-C) to all training data buckets.<\/li>\n\n\n\n<li>Activate versioning to maintain a complete history of dataset evolution.<\/li>\n\n\n\n<li>Configure logging to track access patterns and enable lineage verification.<\/li>\n\n\n\n<li>Integrate with compute using standard S3 compatible tools.<\/li>\n<\/ol>\n\n\n\n<p>For organizations running intensive training workloads, <a href=\"https:\/\/www.backblaze.com\/cloud-storage\/b2-overdrive\" target=\"_blank\" rel=\"noreferrer noopener\">Backblaze B2 Overdrive<\/a> provides high-throughput object storage with up to 1Tbps throughput speeds and unlimited free egress. This allows enterprises to perform large quantities of concurrent data operations without performance degradation, keeping compute resources\u2014including expensive GPUs\u2014from sitting idle while waiting for data transfers. B2 Overdrive maintains the same security and compliance capabilities as standard Backblaze B2 while enabling faster iteration on model development.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The bottom line: Trust begins with proven data<\/h2>\n\n\n\n<p>The datasets you&#8217;ve built represent years of institutional knowledge\u2014far more difficult to replace than the models trained on them. Protecting that intellectual property requires more than access controls and perimeter security. You need to prove the integrity of your data to regulators who demand accountability, to customers who expect trustworthy AI, and to your own teams who need confidence in model reproducibility.<\/p>\n\n\n\n<p>Immutability and encryption make that proof simple and reliable. With Backblaze B2, you gain a clear, verifiable foundation for protecting your training data with the same rigor you apply to your most critical assets. <a href=\"https:\/\/www.backblaze.com\/blog\/architecting-your-ai-data-pipeline-using-b2-overdrive\/\" target=\"_blank\" rel=\"noreferrer noopener\">Learn more about where Backblaze B2 sits in the AI data pipeline<\/a>, or <a href=\"https:\/\/www.backblaze.com\/contact-sales\/cloud-storage\" target=\"_blank\" rel=\"noreferrer noopener\">talk to our cloud storage experts<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Protect your most valuable AI intellectual property\u2014your training data\u2014from poisoning and theft with a secure data foundation.<\/p>\n","protected":false},"author":224,"featured_media":112602,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","footnotes":""},"categories":[7,438],"tags":[489,468],"class_list":["post-112601","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cloud-storage","category-featured-cloud-storage","tag-ai-ml","tag-b2cloud","entry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Your Training Data Is Your Most Valuable IP<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.backblaze.com\/blog\/your-training-data-is-your-most-valuable-ip\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Your Training Data Is Your Most Valuable IP\" \/>\n<meta property=\"og:description\" content=\"Protect your most valuable AI intellectual property\u2014your training data\u2014from poisoning and theft with a secure data foundation.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.backblaze.com\/blog\/your-training-data-is-your-most-valuable-ip\/\" \/>\n<meta property=\"og:site_name\" content=\"Backblaze Blog | Cloud Storage &amp; Cloud Backup\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/backblaze\" \/>\n<meta property=\"article:published_time\" content=\"2025-12-02T16:47:40+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-03T19:35:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/backblazeprod.wpenginepowered.com\/wp-content\/uploads\/2025\/12\/Q126-0001-Blog-Header-1440x820-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1440\" \/>\n\t<meta property=\"og:image:height\" content=\"820\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Maddie Presland\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@backblaze\" \/>\n<meta name=\"twitter:site\" content=\"@backblaze\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Maddie Presland\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Your Training Data Is Your Most Valuable IP","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.backblaze.com\/blog\/your-training-data-is-your-most-valuable-ip\/","og_locale":"en_US","og_type":"article","og_title":"Your Training Data Is Your Most Valuable IP","og_description":"Protect your most valuable AI intellectual property\u2014your training data\u2014from poisoning and theft with a secure data foundation.","og_url":"https:\/\/www.backblaze.com\/blog\/your-training-data-is-your-most-valuable-ip\/","og_site_name":"Backblaze Blog | Cloud Storage &amp; Cloud Backup","article_publisher":"https:\/\/www.facebook.com\/backblaze","article_published_time":"2025-12-02T16:47:40+00:00","article_modified_time":"2025-12-03T19:35:29+00:00","og_image":[{"width":1440,"height":820,"url":"https:\/\/backblazeprod.wpenginepowered.com\/wp-content\/uploads\/2025\/12\/Q126-0001-Blog-Header-1440x820-1.png","type":"image\/png"}],"author":"Maddie Presland","twitter_card":"summary_large_image","twitter_creator":"@backblaze","twitter_site":"@backblaze","twitter_misc":{"Written by":"Maddie Presland","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.backblaze.com\/blog\/your-training-data-is-your-most-valuable-ip\/#article","isPartOf":{"@id":"https:\/\/www.backblaze.com\/blog\/your-training-data-is-your-most-valuable-ip\/"},"author":{"name":"Maddie Presland","@id":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/#\/schema\/person\/5a95887c8e781ea9cf10472e47175ce0"},"headline":"Your Training Data Is Your Most Valuable IP","datePublished":"2025-12-02T16:47:40+00:00","dateModified":"2025-12-03T19:35:29+00:00","mainEntityOfPage":{"@id":"https:\/\/www.backblaze.com\/blog\/your-training-data-is-your-most-valuable-ip\/"},"wordCount":1351,"commentCount":0,"publisher":{"@id":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.backblaze.com\/blog\/your-training-data-is-your-most-valuable-ip\/#primaryimage"},"thumbnailUrl":"https:\/\/backblazeprod.wpenginepowered.com\/wp-content\/uploads\/2025\/12\/Q126-0001-Blog-Header-1440x820-1.png","keywords":["AI\/ML","B2Cloud"],"articleSection":["Cloud Storage","Featured-Cloud Storage"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.backblaze.com\/blog\/your-training-data-is-your-most-valuable-ip\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.backblaze.com\/blog\/your-training-data-is-your-most-valuable-ip\/","url":"https:\/\/www.backblaze.com\/blog\/your-training-data-is-your-most-valuable-ip\/","name":"Your Training Data Is Your Most Valuable IP","isPartOf":{"@id":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.backblaze.com\/blog\/your-training-data-is-your-most-valuable-ip\/#primaryimage"},"image":{"@id":"https:\/\/www.backblaze.com\/blog\/your-training-data-is-your-most-valuable-ip\/#primaryimage"},"thumbnailUrl":"https:\/\/backblazeprod.wpenginepowered.com\/wp-content\/uploads\/2025\/12\/Q126-0001-Blog-Header-1440x820-1.png","datePublished":"2025-12-02T16:47:40+00:00","dateModified":"2025-12-03T19:35:29+00:00","breadcrumb":{"@id":"https:\/\/www.backblaze.com\/blog\/your-training-data-is-your-most-valuable-ip\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.backblaze.com\/blog\/your-training-data-is-your-most-valuable-ip\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.backblaze.com\/blog\/your-training-data-is-your-most-valuable-ip\/#primaryimage","url":"https:\/\/backblazeprod.wpenginepowered.com\/wp-content\/uploads\/2025\/12\/Q126-0001-Blog-Header-1440x820-1.png","contentUrl":"https:\/\/backblazeprod.wpenginepowered.com\/wp-content\/uploads\/2025\/12\/Q126-0001-Blog-Header-1440x820-1.png","width":1440,"height":820,"caption":"A decorative image showing different generic computer module icons."},{"@type":"BreadcrumbList","@id":"https:\/\/www.backblaze.com\/blog\/your-training-data-is-your-most-valuable-ip\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Your Training Data Is Your Most Valuable IP"}]},{"@type":"WebSite","@id":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/#website","url":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/","name":"Backblaze Cloud Solutions Blog","description":"Cloud Storage &amp; Cloud Backup","publisher":{"@id":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/#organization","name":"Backblaze","url":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/www.backblaze.com\/blog\/wp-content\/uploads\/2017\/12\/backblaze_icon_transparent.png?fit=512%2C512&ssl=1","contentUrl":"https:\/\/i0.wp.com\/www.backblaze.com\/blog\/wp-content\/uploads\/2017\/12\/backblaze_icon_transparent.png?fit=512%2C512&ssl=1","width":512,"height":512,"caption":"Backblaze"},"image":{"@id":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/backblaze","https:\/\/x.com\/backblaze","https:\/\/www.youtube.com\/user\/Backblaze","https:\/\/en.wikipedia.org\/wiki\/Backblaze"]},{"@type":"Person","@id":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/#\/schema\/person\/5a95887c8e781ea9cf10472e47175ce0","name":"Maddie Presland","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/backblazeprod.wpenginepowered.com\/wp-content\/uploads\/2025\/10\/Backblaze_Author-Maddie-Presland_Square-150x150.jpg","url":"https:\/\/backblazeprod.wpenginepowered.com\/wp-content\/uploads\/2025\/10\/Backblaze_Author-Maddie-Presland_Square-150x150.jpg","contentUrl":"https:\/\/backblazeprod.wpenginepowered.com\/wp-content\/uploads\/2025\/10\/Backblaze_Author-Maddie-Presland_Square-150x150.jpg","caption":"Maddie Presland"},"description":"Maddie Presland is a Product Marketing Manager at Backblaze specializing in app storage use cases for multi-cloud architectures and AI. Maddie has more than five years of experience as a product marketer focusing on cloud infrastructure and developing technical marketing content for developers. With a background in journalism, she combines storytelling with her technical curiosity and ability to crash course just about anything. Connect with her on LinkedIn.","url":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/author\/maddiepresland\/"}]}},"jetpack_featured_media_url":"https:\/\/backblazeprod.wpenginepowered.com\/wp-content\/uploads\/2025\/12\/Q126-0001-Blog-Header-1440x820-1.png","_links":{"self":[{"href":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/wp-json\/wp\/v2\/posts\/112601","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/wp-json\/wp\/v2\/users\/224"}],"replies":[{"embeddable":true,"href":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/wp-json\/wp\/v2\/comments?post=112601"}],"version-history":[{"count":0,"href":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/wp-json\/wp\/v2\/posts\/112601\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/wp-json\/wp\/v2\/media\/112602"}],"wp:attachment":[{"href":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/wp-json\/wp\/v2\/media?parent=112601"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/wp-json\/wp\/v2\/categories?post=112601"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/wp-json\/wp\/v2\/tags?post=112601"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}