{"id":43,"date":"2011-11-02T15:41:14","date_gmt":"2011-11-02T19:41:14","guid":{"rendered":"http:\/\/www.iri.com\/blog\/?p=43"},"modified":"2020-05-01T17:31:44","modified_gmt":"2020-05-01T21:31:44","slug":"data-masking-and-data-encryption-are-not-the-same-things","status":"publish","type":"post","link":"https:\/\/www.iri.com\/blog\/data-protection\/data-masking-and-data-encryption-are-not-the-same-things\/","title":{"rendered":"Data Masking and Encryption Are Different [video]"},"content":{"rendered":"<p style=\"text-align: left;\"><span style=\"font-family: arial;\"><a href=\"http:\/\/www.iri.com\/blog\/wp-content\/uploads\/2011\/11\/protection4.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-thumbnail wp-image-73\" title=\"protection4\" src=\"http:\/\/www.iri.com\/blog\/wp-content\/uploads\/2011\/11\/protection4-150x150.jpg\" alt=\"\" width=\"150\" height=\"150\" \/><\/a><\/span><\/p>\n<p><em>It is a common mistake to refer to<strong>\u00a0data masking and data encryption<\/strong> interchangeably to mean the same things. \u00a0While field-level encryption is considered one of many possible &#8220;<a href=\"http:\/\/www.iri.com\/solutions\/data-masking\" target=\"_blank\" rel=\"noopener\">data masking<\/a>&#8221; functions, we define data masking and encryption as\u00a0technically\u00a0distinct processes below.<\/em><\/p>\n<p>Note first however, that <strong>data masking <\/strong>is an IT industry term of art that usually refers in a generic way to any software function\u00a0 applied ito obfuscate, anonymize or otherwise de-identify\u00a0sensitive or personally identifiable information (PII) in electronic data <a href=\"https:\/\/www.iri.com\/products\/workbench\/data-sources\">sources<\/a> like these. These functions can apply to data at rest (static data masking), or to data in-transit (dynamic data masking).<\/p>\n<p>For the purposes of this article and consistency with the definitions still used by some, we&#8217;ll refer to data masking here the subset functionality synonymous with data redaction or obfuscation\u00a0<em>via character replacement.\u00a0<\/em>In this context, masking\u00a0characters are chosen to meet the requirements of a system designed to test or still work with the masked results. Masking ensures that vital parts of the PII string &#8212; like the fist 5 digits of a social security number &#8212; are obscured. And under this definition, the string-masked data is not recoverable.<\/p>\n<p><strong>Data encryption<\/strong> involves converting and transforming data into scrambled, often unreadable, cipher-text using non-readable mathematical calculations and algorithms. Restoring the message requires a corresponding decryption algorithm and the original encryption key. Its goal is therefore to be reversible.<\/p>\n<h2>When would you choose to use data masking vs data encryption?<\/h2>\n<p><a title=\"Data Masking Definition Wiki\" href=\"http:\/\/en.wikipedia.org\/wiki\/Data_masking\" target=\"_blank\" rel=\"noopener\"><em><strong>Data masking<\/strong><\/em><\/a>\u00a0as more narrowly defined above is often performed in the creation of test data, for medical research, and prevent unauthorized recipients from seeing or re-identifying the original content.<\/p>\n<p>Application developers and those prototyping or benchmarking DB\/DW operations commonly request <a href=\"http:\/\/www.iri.com\/solutions\/test-data\" target=\"_blank\" rel=\"noopener\">production data for testing<\/a>. Because that data can be sensitive, and pass through multiple hands, it is at great risk of theft or misuse. Therefore, it is necessary to irreversibly redact (cover or strip) the PII \u00a0elements in the data set; e.g., names, addresses, SSNs, etc.<\/p>\n<p>Common industry terms such as anonymization and de-identification can also refer to processes like these that help sever the identifying information in the data set. They prevent future identification of the original data even by the people conducting the research or testing. For example, one cannot discern or re-identify a social security number that presents with its first 5 digits covered by X&#8217;s.<\/p>\n<p>For information on string masking (redaction) through character replacement, see:\u00a0<a href=\"https:\/\/www.iri.com\/solutions\/data-masking\/static-data-masking\/redact\">www.iri.com\/solutions\/data-masking\/static-data-masking\/redact<\/a><\/p>\n<p><a title=\"Data Encryption Definition Wiki\" href=\"http:\/\/en.wikipedia.org\/wiki\/Data_Encryption_Standard\" target=\"_blank\" rel=\"noopener\"><em><strong>Data encryption<\/strong><\/em><\/a> is often used to protect data that is transferred between computers or networks so that it can be later restored. Data like this &#8211; whether in transit or at rest &#8211; can be vulnerable to a breach. Conversion of data into non-readable gibberish (or even <a href=\"http:\/\/www.iri.com\/solutions\/data-masking\/encryption\/format-preserving-encryption\" target=\"_blank\" rel=\"noopener\">format-preserved<\/a> ciphertext which is still hard to crack) creates highly secure results. The only way to gain access to the data is to unlock it with a key or password which only those authorized can access.<\/p>\n<p>For more information on column (field) encryption, see:\u00a0<a href=\"http:\/\/www.iri.com\/solutions\/data-masking\/static-data-masking\/encryption\" target=\"_blank\" rel=\"noopener\">www.iri.com\/solutions\/data-masking\/static-data-masking\/encryption<\/a><\/p>\n<p>Thus it may be easy to think of data masking and data encryption as the same things, since they are both data-centric means of protecting sensitive data. However, it is their inherent procedures and purposes that differentiate them.<\/p>\n<p>Data masking software from IRI protects PII in with a wide array of protection functions, including <em>encryption<\/em>, <em>redaction\u00a0<\/em>with masking characters, <em>hashing<\/em>, <em>pseudonymization<\/em>, <em>randomization, toenization, random noise, etc.<\/em>. FieldShield for databases and structured files, CellShield for Excel, and DarkShield for unstructured text and documents, are the three static data masking products in the <a href=\"http:\/\/www.iri.com\/products\/iri-data-protector\">IRI Data Protector<\/a> suite.<\/p>\n<p>These three &#8216;shield&#8217; products are also included in the <a href=\"http:\/\/www.iri.com\/products\/voracity\">IRI Voracity<\/a>\u00a0data management platform for data discovery, integration, migration, governance, and analytics. Dynamic data masking is also available via the FieldShield SDK.<\/p>\n<div style=\"text-align: center;\"><iframe loading=\"lazy\" width=\"1140\" height=\"641\" src=\"https:\/\/www.youtube.com\/embed\/LuO7bi9uRh4?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe><\/div>\n<div style=\"margin: 4% 0;\">\n<p><a href=\"http:\/\/www.iri.com\/solutions\/data-masking\" target=\"_blank\" rel=\"noopener\"> This section<\/a> of the IRI web site, and <a href=\"http:\/\/www.iri.com\/blog\/category\/data-protection\/\" target=\"_blank\" rel=\"noopener\">this section<\/a> of the IRI blog site contain more information on data masking and encryption. For example, see the article <a href=\"https:\/\/www.iri.com\/blog\/data-protection\/data-masking-function-use\/\"><em>Which Data Masking Function Should I Use?<\/em><\/a><\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>It is a common mistake to refer to\u00a0data masking and data encryption interchangeably to mean the same things. \u00a0While field-level encryption is considered one of many possible &#8220;data masking&#8221; functions, we define data masking and encryption as\u00a0technically\u00a0distinct processes below. Note first however, that data masking is an IT industry term of art that usually refers<\/p>\n<div><a class=\"btn-filled btn\" href=\"https:\/\/www.iri.com\/blog\/data-protection\/data-masking-and-data-encryption-are-not-the-same-things\/\" title=\"Data Masking and Encryption Are Different [video]\">Read More<\/a><\/div>\n","protected":false},"author":6,"featured_media":11746,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"categories":[8,34,29,1030],"tags":[20,10,11,14,19,18,13,17,21,15,12,16,203,9,296,291],"class_list":["post-43","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-data-protection","category-business","category-test-data","category-vlog","tag-data-anonymization","tag-data-encryption","tag-data-filtering","tag-data-masking","tag-data-obfuscation","tag-data-privacy","tag-data-protection-2","tag-data-protection-tool","tag-data-pseudonymization","tag-data-security","tag-de-identification","tag-de-identify-data","tag-encryption","tag-fieldshield","tag-masking","tag-vs"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v23.4 (Yoast SEO v23.4) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Data Masking and Encryption Are Different [video] - IRI<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.iri.com\/blog\/data-protection\/data-masking-and-data-encryption-are-not-the-same-things\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Data Masking and Encryption Are Different [video]\" \/>\n<meta property=\"og:description\" content=\"It is a common mistake to refer to\u00a0data masking and data encryption interchangeably to mean the same things. \u00a0While field-level encryption is considered one of many possible &#8220;data masking&#8221; functions, we define data masking and encryption as\u00a0technically\u00a0distinct processes below. Note first however, that data masking is an IT industry term of art that usually refersRead More\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.iri.com\/blog\/data-protection\/data-masking-and-data-encryption-are-not-the-same-things\/\" \/>\n<meta property=\"og:site_name\" content=\"IRI\" \/>\n<meta property=\"article:published_time\" content=\"2011-11-02T19:41:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-01T21:31:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2011\/11\/data-hacker.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"700\" \/>\n\t<meta property=\"og:image:height\" content=\"700\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jeff Simpson\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jeff Simpson\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/data-masking-and-data-encryption-are-not-the-same-things\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/data-masking-and-data-encryption-are-not-the-same-things\/\"},\"author\":{\"name\":\"Jeff Simpson\",\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/person\/9c7e21f2a369c971287d5030b7c408e6\"},\"headline\":\"Data Masking and Encryption Are Different [video]\",\"datePublished\":\"2011-11-02T19:41:14+00:00\",\"dateModified\":\"2020-05-01T21:31:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/data-masking-and-data-encryption-are-not-the-same-things\/\"},\"wordCount\":689,\"commentCount\":5,\"publisher\":{\"@id\":\"https:\/\/www.iri.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/data-masking-and-data-encryption-are-not-the-same-things\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2011\/11\/data-hacker.jpg\",\"keywords\":[\"data anonymization\",\"data encryption\",\"data filtering\",\"data masking\",\"data obfuscation\",\"data privacy\",\"data protection\",\"data protection tool\",\"data pseudonymization\",\"data security\",\"de-identification\",\"de-identify data\",\"encryption\",\"FieldShield\",\"masking\",\"vs\"],\"articleSection\":[\"Data Masking\/Protection\",\"IRI Business\",\"Test Data\",\"VLOG\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.iri.com\/blog\/data-protection\/data-masking-and-data-encryption-are-not-the-same-things\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/data-masking-and-data-encryption-are-not-the-same-things\/\",\"url\":\"https:\/\/www.iri.com\/blog\/data-protection\/data-masking-and-data-encryption-are-not-the-same-things\/\",\"name\":\"Data Masking and Encryption Are Different [video] - IRI\",\"isPartOf\":{\"@id\":\"https:\/\/www.iri.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/data-masking-and-data-encryption-are-not-the-same-things\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/data-masking-and-data-encryption-are-not-the-same-things\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2011\/11\/data-hacker.jpg\",\"datePublished\":\"2011-11-02T19:41:14+00:00\",\"dateModified\":\"2020-05-01T21:31:44+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/data-masking-and-data-encryption-are-not-the-same-things\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.iri.com\/blog\/data-protection\/data-masking-and-data-encryption-are-not-the-same-things\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/data-masking-and-data-encryption-are-not-the-same-things\/#primaryimage\",\"url\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2011\/11\/data-hacker.jpg\",\"contentUrl\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2011\/11\/data-hacker.jpg\",\"width\":700,\"height\":700},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/data-masking-and-data-encryption-are-not-the-same-things\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.iri.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Data Masking and Encryption Are Different [video]\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.iri.com\/blog\/#website\",\"url\":\"https:\/\/www.iri.com\/blog\/\",\"name\":\"IRI\",\"description\":\"Total Data Management Blog\",\"publisher\":{\"@id\":\"https:\/\/www.iri.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.iri.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.iri.com\/blog\/#organization\",\"name\":\"IRI\",\"url\":\"https:\/\/www.iri.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png\",\"contentUrl\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png\",\"width\":750,\"height\":206,\"caption\":\"IRI\"},\"image\":{\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/person\/9c7e21f2a369c971287d5030b7c408e6\",\"name\":\"Jeff Simpson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c636dae166fc9fecf2b62e88fe135187?s=96&d=blank&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c636dae166fc9fecf2b62e88fe135187?s=96&d=blank&r=g\",\"caption\":\"Jeff Simpson\"},\"url\":\"https:\/\/www.iri.com\/blog\/author\/jeffs\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Data Masking and Encryption Are Different [video] - IRI","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.iri.com\/blog\/data-protection\/data-masking-and-data-encryption-are-not-the-same-things\/","og_locale":"en_US","og_type":"article","og_title":"Data Masking and Encryption Are Different [video]","og_description":"It is a common mistake to refer to\u00a0data masking and data encryption interchangeably to mean the same things. \u00a0While field-level encryption is considered one of many possible &#8220;data masking&#8221; functions, we define data masking and encryption as\u00a0technically\u00a0distinct processes below. Note first however, that data masking is an IT industry term of art that usually refersRead More","og_url":"https:\/\/www.iri.com\/blog\/data-protection\/data-masking-and-data-encryption-are-not-the-same-things\/","og_site_name":"IRI","article_published_time":"2011-11-02T19:41:14+00:00","article_modified_time":"2020-05-01T21:31:44+00:00","og_image":[{"width":700,"height":700,"url":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2011\/11\/data-hacker.jpg","type":"image\/jpeg"}],"author":"Jeff Simpson","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Jeff Simpson","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.iri.com\/blog\/data-protection\/data-masking-and-data-encryption-are-not-the-same-things\/#article","isPartOf":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/data-masking-and-data-encryption-are-not-the-same-things\/"},"author":{"name":"Jeff Simpson","@id":"https:\/\/www.iri.com\/blog\/#\/schema\/person\/9c7e21f2a369c971287d5030b7c408e6"},"headline":"Data Masking and Encryption Are Different [video]","datePublished":"2011-11-02T19:41:14+00:00","dateModified":"2020-05-01T21:31:44+00:00","mainEntityOfPage":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/data-masking-and-data-encryption-are-not-the-same-things\/"},"wordCount":689,"commentCount":5,"publisher":{"@id":"https:\/\/www.iri.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/data-masking-and-data-encryption-are-not-the-same-things\/#primaryimage"},"thumbnailUrl":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2011\/11\/data-hacker.jpg","keywords":["data anonymization","data encryption","data filtering","data masking","data obfuscation","data privacy","data protection","data protection tool","data pseudonymization","data security","de-identification","de-identify data","encryption","FieldShield","masking","vs"],"articleSection":["Data Masking\/Protection","IRI Business","Test Data","VLOG"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.iri.com\/blog\/data-protection\/data-masking-and-data-encryption-are-not-the-same-things\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.iri.com\/blog\/data-protection\/data-masking-and-data-encryption-are-not-the-same-things\/","url":"https:\/\/www.iri.com\/blog\/data-protection\/data-masking-and-data-encryption-are-not-the-same-things\/","name":"Data Masking and Encryption Are Different [video] - IRI","isPartOf":{"@id":"https:\/\/www.iri.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/data-masking-and-data-encryption-are-not-the-same-things\/#primaryimage"},"image":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/data-masking-and-data-encryption-are-not-the-same-things\/#primaryimage"},"thumbnailUrl":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2011\/11\/data-hacker.jpg","datePublished":"2011-11-02T19:41:14+00:00","dateModified":"2020-05-01T21:31:44+00:00","breadcrumb":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/data-masking-and-data-encryption-are-not-the-same-things\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.iri.com\/blog\/data-protection\/data-masking-and-data-encryption-are-not-the-same-things\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.iri.com\/blog\/data-protection\/data-masking-and-data-encryption-are-not-the-same-things\/#primaryimage","url":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2011\/11\/data-hacker.jpg","contentUrl":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2011\/11\/data-hacker.jpg","width":700,"height":700},{"@type":"BreadcrumbList","@id":"https:\/\/www.iri.com\/blog\/data-protection\/data-masking-and-data-encryption-are-not-the-same-things\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.iri.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Data Masking and Encryption Are Different [video]"}]},{"@type":"WebSite","@id":"https:\/\/www.iri.com\/blog\/#website","url":"https:\/\/www.iri.com\/blog\/","name":"IRI","description":"Total Data Management Blog","publisher":{"@id":"https:\/\/www.iri.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.iri.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.iri.com\/blog\/#organization","name":"IRI","url":"https:\/\/www.iri.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.iri.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png","contentUrl":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png","width":750,"height":206,"caption":"IRI"},"image":{"@id":"https:\/\/www.iri.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.iri.com\/blog\/#\/schema\/person\/9c7e21f2a369c971287d5030b7c408e6","name":"Jeff Simpson","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.iri.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/c636dae166fc9fecf2b62e88fe135187?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c636dae166fc9fecf2b62e88fe135187?s=96&d=blank&r=g","caption":"Jeff Simpson"},"url":"https:\/\/www.iri.com\/blog\/author\/jeffs\/"}]}},"jetpack_featured_media_url":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2011\/11\/data-hacker.jpg","_links":{"self":[{"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/posts\/43"}],"collection":[{"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/comments?post=43"}],"version-history":[{"count":118,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/posts\/43\/revisions"}],"predecessor-version":[{"id":13643,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/posts\/43\/revisions\/13643"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/media\/11746"}],"wp:attachment":[{"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/media?parent=43"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/categories?post=43"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/tags?post=43"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}