{"id":5565,"date":"2014-07-10T17:10:28","date_gmt":"2014-07-10T21:10:28","guid":{"rendered":"http:\/\/www.iri.com\/blog\/?p=5565"},"modified":"2017-11-06T12:35:12","modified_gmt":"2017-11-06T17:35:12","slug":"iri-workbench-pentaho-perform-data-masking","status":"publish","type":"post","link":"https:\/\/www.iri.com\/blog\/data-protection\/iri-workbench-pentaho-perform-data-masking\/","title":{"rendered":"Masking Data in Pentaho"},"content":{"rendered":"<p><em>This article is second in a 3-part series on using IRI products to expand functionality and improve performance in Pentaho systems. We first demonstrate <a title=\"Using CoSort to Speed Up the Sort Process in Pentaho Blog\" href=\"http:\/\/www.iri.com\/blog\/data-transformation2\/cosort-speed-sort-process-pentaho\/\" target=\"_blank\" rel=\"noopener\">how to improve sorting performance<\/a>, and then introduce ways to mask production data, and <a title=\"Creating Test Data for Pentaho Blog\" href=\"%20http:\/\/www.iri.com\/blog\/test-data\/iri-workbench-pentaho-create-test-data\/\" target=\"_blank\" rel=\"noopener\">create test data<\/a>, in the Pentaho Data Integration (PDI) environment.<\/em><\/p>\n<p>Pentaho Data Integration (PDI) can do typical data transformations; however, it does not appear to have a\u00a0native ability to mask or encrypt data flowing through Kettle. The need to protect data at risk, even in data integration scenarios, is expanding amid a plague of data breaches.<\/p>\n<p><a href=\"http:\/\/www.iri.com\/products\/fieldshield\" target=\"_blank\" rel=\"noopener\">IRI FieldShield<\/a> software provides many different data masking options for Pentaho users. You can call FieldShield job scripts from the Shell step in Pentaho to\u00a0protect data at rest (in database and other structured sources).<\/p>\n<p>As you can see by exploring your data source in Pentaho, sample Social Security Numbers are fully displayed.<\/p>\n<p><a href=\"http:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/07\/Pentaho-fs-1-e1405624179469.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-5749\" src=\"http:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/07\/Pentaho-fs-1-e1405624179469.png\" alt=\"Pentaho-fs-1\" width=\"550\" height=\"411\" \/><\/a><\/p>\n<p>Using FieldShield, you can mask\/encrypt\/encode (and others) this data in your needed format. There are some predefined masks that make redacting all or part of\u00a0an SSN extremely easy.<\/p>\n<p><a href=\"http:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/07\/pentaho-fs-2-e1405624226203.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-5750 size-full\" src=\"http:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/07\/pentaho-fs-2-e1405624226203.png\" alt=\"pentaho-fs-2\" width=\"300\" height=\"269\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"http:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/07\/pentaho-fs-3-e1405624276710.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-5751 size-full\" src=\"http:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/07\/pentaho-fs-3-e1405624276710.png\" alt=\"pentaho-fs-3\" width=\"300\" height=\"329\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<p>The script created in the IRI Workbench &#8211; the Eclipse <a href=\"http:\/\/www.iri.com\/products\/workbench\/fieldshield-gui\" target=\"_blank\" rel=\"noopener\">GUI for FieldShield<\/a> and other IRI software &#8212; gets run by Pentaho through the Shell step which executes a batch file. This batch file is not automatically created by the FieldShield wizard; however, this is easily created in the Workbench with four lines of code.<\/p>\n<p><a href=\"http:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/07\/pentaho-fs-4-e1405624438546.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-5752\" src=\"http:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/07\/pentaho-fs-4-e1405624438546.png\" alt=\"pentaho-fs-4\" width=\"500\" height=\"365\" \/><\/a><\/p>\n<p>The only step that is needed to mask your data is a Shell step. Below is a simple job; however, the Shell step can be added to any of your jobs. The Shell step simply references the batch file to run during execution.<\/p>\n<p><a href=\"http:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/07\/pentaho-fs-5-e1405624476329.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-5753\" src=\"http:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/07\/pentaho-fs-5-e1405624476329.png\" alt=\"pentaho-fs-5\" width=\"300\" height=\"280\" \/><\/a><\/p>\n<p><a href=\"http:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/07\/pentaho-fs-6-e1405624503925.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-5754\" src=\"http:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/07\/pentaho-fs-6-e1405624503925.png\" alt=\"pentaho-fs-6\" width=\"300\" height=\"258\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<p>After executing the Pentaho job, the FieldShield job has now masked the data via\u00a0the protection method selected in\u00a0the FieldShield wizard.<\/p>\n<p><a href=\"http:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/07\/pentaho-fs-7-e1405624541872.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-5755\" src=\"http:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/07\/pentaho-fs-7-e1405624541872.png\" alt=\"pentaho-fs-7\" width=\"500\" height=\"380\" \/><\/a><\/p>\n<p>The IRI Workbench has multiple options for data masking at the field level, along with other data life-cycle management activities, including:\u00a0bulk database extraction and load acceleration, data transformations, data quality improvement, data and database migration, data replication, test data generation, data federation,\u00a0and reporting. Any\u00a0of these operations could be run alongside Pentaho\u00a0to improve its efficiency.<\/p>\n<p>Click here if you missed the previous blog on <a title=\"Using CoSort to Speed Up the Sort Process in Pentaho Blog\" href=\"http:\/\/www.iri.com\/blog\/data-transformation2\/cosort-speed-sort-process-pentaho\/\" target=\"_blank\" rel=\"noopener\">improving sort performance in Pentaho<\/a>, or see\u00a0the third article\u00a0on\u00a0<a title=\"Creating Test Data for Pentaho Blog\" href=\"http:\/\/www.iri.com\/blog\/test-data\/iri-workbench-pentaho-create-test-data\/\" target=\"_blank\" rel=\"noopener\">creating test data<\/a> for Pentaho.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This article is second in a 3-part series on using IRI products to expand functionality and improve performance in Pentaho systems. We first demonstrate how to improve sorting performance, and then introduce ways to mask production data, and create test data, in the Pentaho Data Integration (PDI) environment. Pentaho Data Integration (PDI) can do typical<\/p>\n<div><a class=\"btn-filled btn\" href=\"https:\/\/www.iri.com\/blog\/data-protection\/iri-workbench-pentaho-perform-data-masking\/\" title=\"Masking Data in Pentaho\">Read More<\/a><\/div>\n","protected":false},"author":43,"featured_media":5753,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"categories":[8],"tags":[666,14,13,519,658,667,515,665,520,663,517,656,497,655,664,88],"class_list":["post-5565","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-data-protection","tag-data-life-cycle","tag-data-masking","tag-data-protection-2","tag-database","tag-db","tag-encode","tag-encrypt","tag-field-level","tag-iri-fieldshield","tag-kettle","tag-mask","tag-pdi","tag-pentaho","tag-pentaho-data-integration","tag-shell","tag-test-data-2"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v23.4 (Yoast SEO v23.4) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Masking Data in Pentaho - IRI<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.iri.com\/blog\/data-protection\/iri-workbench-pentaho-perform-data-masking\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Masking Data in Pentaho\" \/>\n<meta property=\"og:description\" content=\"This article is second in a 3-part series on using IRI products to expand functionality and improve performance in Pentaho systems. We first demonstrate how to improve sorting performance, and then introduce ways to mask production data, and create test data, in the Pentaho Data Integration (PDI) environment. Pentaho Data Integration (PDI) can do typicalRead More\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.iri.com\/blog\/data-protection\/iri-workbench-pentaho-perform-data-masking\/\" \/>\n<meta property=\"og:site_name\" content=\"IRI\" \/>\n<meta property=\"article:published_time\" content=\"2014-07-10T21:10:28+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-11-06T17:35:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/07\/pentaho-fs-5-e1405624476329.png\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"280\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Claudia Irvine\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Claudia Irvine\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/iri-workbench-pentaho-perform-data-masking\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/iri-workbench-pentaho-perform-data-masking\/\"},\"author\":{\"name\":\"Claudia Irvine\",\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/person\/72af50bbb317610e193e96392081f9b0\"},\"headline\":\"Masking Data in Pentaho\",\"datePublished\":\"2014-07-10T21:10:28+00:00\",\"dateModified\":\"2017-11-06T17:35:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/iri-workbench-pentaho-perform-data-masking\/\"},\"wordCount\":389,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.iri.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/iri-workbench-pentaho-perform-data-masking\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/07\/pentaho-fs-5-e1405624476329.png\",\"keywords\":[\"data life cycle\",\"data masking\",\"data protection\",\"database\",\"DB\",\"encode\",\"encrypt\",\"field level\",\"IRI FieldShield\",\"Kettle\",\"mask\",\"PDI\",\"pentaho\",\"Pentaho Data Integration\",\"shell\",\"test data\"],\"articleSection\":[\"Data Masking\/Protection\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.iri.com\/blog\/data-protection\/iri-workbench-pentaho-perform-data-masking\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/iri-workbench-pentaho-perform-data-masking\/\",\"url\":\"https:\/\/www.iri.com\/blog\/data-protection\/iri-workbench-pentaho-perform-data-masking\/\",\"name\":\"Masking Data in Pentaho - IRI\",\"isPartOf\":{\"@id\":\"https:\/\/www.iri.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/iri-workbench-pentaho-perform-data-masking\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/iri-workbench-pentaho-perform-data-masking\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/07\/pentaho-fs-5-e1405624476329.png\",\"datePublished\":\"2014-07-10T21:10:28+00:00\",\"dateModified\":\"2017-11-06T17:35:12+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/iri-workbench-pentaho-perform-data-masking\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.iri.com\/blog\/data-protection\/iri-workbench-pentaho-perform-data-masking\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/iri-workbench-pentaho-perform-data-masking\/#primaryimage\",\"url\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/07\/pentaho-fs-5-e1405624476329.png\",\"contentUrl\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/07\/pentaho-fs-5-e1405624476329.png\",\"width\":300,\"height\":280},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/iri-workbench-pentaho-perform-data-masking\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.iri.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Masking Data in Pentaho\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.iri.com\/blog\/#website\",\"url\":\"https:\/\/www.iri.com\/blog\/\",\"name\":\"IRI\",\"description\":\"Total Data Management Blog\",\"publisher\":{\"@id\":\"https:\/\/www.iri.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.iri.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.iri.com\/blog\/#organization\",\"name\":\"IRI\",\"url\":\"https:\/\/www.iri.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png\",\"contentUrl\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png\",\"width\":750,\"height\":206,\"caption\":\"IRI\"},\"image\":{\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/person\/72af50bbb317610e193e96392081f9b0\",\"name\":\"Claudia Irvine\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/fb33dee44756bd13ac23f1342c2bb7b2?s=96&d=blank&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/fb33dee44756bd13ac23f1342c2bb7b2?s=96&d=blank&r=g\",\"caption\":\"Claudia Irvine\"},\"url\":\"https:\/\/www.iri.com\/blog\/author\/claudiai\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Masking Data in Pentaho - IRI","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.iri.com\/blog\/data-protection\/iri-workbench-pentaho-perform-data-masking\/","og_locale":"en_US","og_type":"article","og_title":"Masking Data in Pentaho","og_description":"This article is second in a 3-part series on using IRI products to expand functionality and improve performance in Pentaho systems. We first demonstrate how to improve sorting performance, and then introduce ways to mask production data, and create test data, in the Pentaho Data Integration (PDI) environment. Pentaho Data Integration (PDI) can do typicalRead More","og_url":"https:\/\/www.iri.com\/blog\/data-protection\/iri-workbench-pentaho-perform-data-masking\/","og_site_name":"IRI","article_published_time":"2014-07-10T21:10:28+00:00","article_modified_time":"2017-11-06T17:35:12+00:00","og_image":[{"width":300,"height":280,"url":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/07\/pentaho-fs-5-e1405624476329.png","type":"image\/png"}],"author":"Claudia Irvine","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Claudia Irvine","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.iri.com\/blog\/data-protection\/iri-workbench-pentaho-perform-data-masking\/#article","isPartOf":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/iri-workbench-pentaho-perform-data-masking\/"},"author":{"name":"Claudia Irvine","@id":"https:\/\/www.iri.com\/blog\/#\/schema\/person\/72af50bbb317610e193e96392081f9b0"},"headline":"Masking Data in Pentaho","datePublished":"2014-07-10T21:10:28+00:00","dateModified":"2017-11-06T17:35:12+00:00","mainEntityOfPage":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/iri-workbench-pentaho-perform-data-masking\/"},"wordCount":389,"commentCount":0,"publisher":{"@id":"https:\/\/www.iri.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/iri-workbench-pentaho-perform-data-masking\/#primaryimage"},"thumbnailUrl":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/07\/pentaho-fs-5-e1405624476329.png","keywords":["data life cycle","data masking","data protection","database","DB","encode","encrypt","field level","IRI FieldShield","Kettle","mask","PDI","pentaho","Pentaho Data Integration","shell","test data"],"articleSection":["Data Masking\/Protection"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.iri.com\/blog\/data-protection\/iri-workbench-pentaho-perform-data-masking\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.iri.com\/blog\/data-protection\/iri-workbench-pentaho-perform-data-masking\/","url":"https:\/\/www.iri.com\/blog\/data-protection\/iri-workbench-pentaho-perform-data-masking\/","name":"Masking Data in Pentaho - IRI","isPartOf":{"@id":"https:\/\/www.iri.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/iri-workbench-pentaho-perform-data-masking\/#primaryimage"},"image":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/iri-workbench-pentaho-perform-data-masking\/#primaryimage"},"thumbnailUrl":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/07\/pentaho-fs-5-e1405624476329.png","datePublished":"2014-07-10T21:10:28+00:00","dateModified":"2017-11-06T17:35:12+00:00","breadcrumb":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/iri-workbench-pentaho-perform-data-masking\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.iri.com\/blog\/data-protection\/iri-workbench-pentaho-perform-data-masking\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.iri.com\/blog\/data-protection\/iri-workbench-pentaho-perform-data-masking\/#primaryimage","url":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/07\/pentaho-fs-5-e1405624476329.png","contentUrl":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/07\/pentaho-fs-5-e1405624476329.png","width":300,"height":280},{"@type":"BreadcrumbList","@id":"https:\/\/www.iri.com\/blog\/data-protection\/iri-workbench-pentaho-perform-data-masking\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.iri.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Masking Data in Pentaho"}]},{"@type":"WebSite","@id":"https:\/\/www.iri.com\/blog\/#website","url":"https:\/\/www.iri.com\/blog\/","name":"IRI","description":"Total Data Management Blog","publisher":{"@id":"https:\/\/www.iri.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.iri.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.iri.com\/blog\/#organization","name":"IRI","url":"https:\/\/www.iri.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.iri.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png","contentUrl":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png","width":750,"height":206,"caption":"IRI"},"image":{"@id":"https:\/\/www.iri.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.iri.com\/blog\/#\/schema\/person\/72af50bbb317610e193e96392081f9b0","name":"Claudia Irvine","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.iri.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/fb33dee44756bd13ac23f1342c2bb7b2?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fb33dee44756bd13ac23f1342c2bb7b2?s=96&d=blank&r=g","caption":"Claudia Irvine"},"url":"https:\/\/www.iri.com\/blog\/author\/claudiai\/"}]}},"jetpack_featured_media_url":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/07\/pentaho-fs-5-e1405624476329.png","_links":{"self":[{"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/posts\/5565"}],"collection":[{"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/users\/43"}],"replies":[{"embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/comments?post=5565"}],"version-history":[{"count":14,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/posts\/5565\/revisions"}],"predecessor-version":[{"id":11263,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/posts\/5565\/revisions\/11263"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/media\/5753"}],"wp:attachment":[{"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/media?parent=5565"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/categories?post=5565"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/tags?post=5565"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}