{"id":6243,"date":"2014-08-15T08:42:13","date_gmt":"2014-08-15T12:42:13","guid":{"rendered":"http:\/\/www.iri.com\/blog\/?p=6243"},"modified":"2021-02-16T13:53:36","modified_gmt":"2021-02-16T18:53:36","slug":"pseudonymize-sensitive-excel-data-cellshield","status":"publish","type":"post","link":"https:\/\/www.iri.com\/blog\/data-protection\/pseudonymize-sensitive-excel-data-cellshield\/","title":{"rendered":"Pseudonymize Your Sensitive Excel Data with CellShield [video]"},"content":{"rendered":"<p><em>This is the last in a four-part series to introduce <a title=\"CellShield Product Page\" href=\"http:\/\/www.iri.com\/products\/cellshield\" target=\"_blank\" rel=\"noopener\">IRI CellShield<\/a>. An overview is found <a title=\"IRI CellShield Secures Sensitive Data in Excel Blog\" href=\"http:\/\/www.iri.com\/blog\/data-protection\/introducing-iri-cellshield-protect-sensitive-data-excel-spreadsheets\/\" target=\"_blank\" rel=\"noopener\">here<\/a>. The following parts demonstrate how to use the other functions in CellShield: <a title=\"CellShield Masks Sensitive Data in Your Excel Spreadsheets Blog\" href=\"http:\/\/www.iri.com\/blog\/data-protection\/protect-sensitive-data-excel-spreadsheets-cellshield\/\" target=\"_blank\" rel=\"noopener\">data masking<\/a> and <a title=\"Encrypt\/Decrypt Sensitive Data in Excel Spreadsheets Using CellShield Blog\" href=\"http:\/\/www.iri.com\/blog\/data-protection\/encryptdecrypt-sensitive-data-excel-spreadsheets-cellshield\/\" target=\"_blank\" rel=\"noopener\">encryption<\/a>.\u00a0\u00a0If you&#8217;re interested in finding, classifying, or masking PII in databases or flat files, check out <a href=\"https:\/\/www.iri.com\/products\/fieldshield\">IRI FieldShield<\/a>. For semi-structured and unstructured text (log, email, .pdf, etc.) files, see <a href=\"https:\/\/www.iri.com\/products\/darkshield\">IRI DarkShield<\/a>.<\/em><\/p>\n<p>IRI CellShield is a new, seamless security software for masking PII in spreadsheets. CellShield comes as either an inexpensive Excel add-in, or an enterprise edition for LAN-wide PII discovery, remediation, and auditing. Both versions perform\u00a0full or partial\u00a0redaction, encryption (including format-preserving) and decryption, and pseudonymization:<\/p>\n<p style=\"text-align: center;\"><iframe loading=\"lazy\" width=\"533\" height=\"300\" src=\"https:\/\/www.youtube.com\/embed\/gH2kLu3wlIc?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe><\/p>\n<p>Users can select a range of cells to protect, and then click the type of protection needed. CellShield offers an easy-to-use interface, and quickly does the work. For pseudonymization, select the option to create a restore file that can be used to recover the original data at a later date. This allows only specific users with the restoration file to see the protected information, but allows others to work in the same spreadsheet without having access to that same information.<\/p>\n<p>Below you will find a step-by-step example of just ad-hoc\u00a0&#8216;Pseudonymize &amp; Restore&#8217; in CellShield and the different options available.\u00a0(Note: All information used in this example is fictional.) The enterprise edition can perform these functions en-masse across multiple sheets at once.<\/p>\n<p>1. Open the Excel spreadsheet containing the data you want to pseudonymize using CellShield.<\/p>\n<p>2. Select the range of cells to pseudonymize.<\/p>\n<p><a href=\"http:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/08\/beforePseudo.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-7900\" src=\"http:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/08\/beforePseudo.png\" alt=\"beforePseudo\" width=\"481\" height=\"785\" srcset=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/08\/beforePseudo.png 481w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/08\/beforePseudo-184x300.png 184w\" sizes=\"(max-width: 481px) 100vw, 481px\" \/><\/a><\/p>\n<p>3. Click the CellShield tab on the Excel ribbon.<\/p>\n<p>4. Click the &#8216;Pseudonymize &amp; Restore&#8217; button on the CellShield menu; and select &#8216;Pseudonymize&#8217; from the drop-down list.<\/p>\n<p><a href=\"http:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/10\/data_buttons.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-6225\" src=\"http:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/10\/data_buttons.jpg\" alt=\"data_buttons\" width=\"184\" height=\"87\" \/><\/a><br \/>\n5. CellShield gives you the option of saving a <em>Restore.set<\/em> file for future recovery. Select &#8216;Recoverable&#8217; or &#8216;Non-Recoverable&#8217; within the Pseudonymization Menu.<\/p>\n<p>6. Fill in all required information on the user form that pops up for &#8216;Recoverable'(shown) or &#8216;Non-Recoverable&#8217; pseudonymization. Then you can:<\/p>\n<p>a. use the original data and shuffle it (like a deck of cards);<br \/>\nb. use a single-column flat file containing at least as many rows of data for replacement; or,<br \/>\nc. replace all the values with a number sequence (pictured) by leaving the replace file blank.<\/p>\n<p><a href=\"http:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/10\/to_pseudo.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-6244\" src=\"http:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/10\/to_pseudo.png\" alt=\"to_pseudo\" width=\"482\" height=\"809\" srcset=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/10\/to_pseudo.png 482w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/10\/to_pseudo-178x300.png 178w\" sizes=\"(max-width: 482px) 100vw, 482px\" \/><\/a><br \/>\n7. Click the &#8216;Pseudonymize&#8217; button on the form, and the results will be sent to a new spreadsheet for &#8216;Recoverable&#8217; Pseudonymization, or the selected range will be replaced if &#8216;Non-Recoverable&#8217; was chosen.<\/p>\n<p><a href=\"http:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/08\/afterPseudo.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-7901\" src=\"http:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/08\/afterPseudo.png\" alt=\"afterPseudo\" width=\"449\" height=\"757\" srcset=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/08\/afterPseudo.png 449w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/08\/afterPseudo-178x300.png 178w\" sizes=\"(max-width: 449px) 100vw, 449px\" \/><\/a><\/p>\n<p>UPDATE: CellShield version 2.0 has been released and includes many <a href=\"http:\/\/www.iri.com\/blog\/data-protection\/cellshield-version-2\/\">new<\/a> features and fixes, including UTF-8 support for pseudonymization.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This is the last in a four-part series to introduce IRI CellShield. An overview is found here. The following parts demonstrate how to use the other functions in CellShield: data masking and encryption.\u00a0\u00a0If you&#8217;re interested in finding, classifying, or masking PII in databases or flat files, check out IRI FieldShield. For semi-structured and unstructured text<\/p>\n<div><a class=\"btn-filled btn\" href=\"https:\/\/www.iri.com\/blog\/data-protection\/pseudonymize-sensitive-excel-data-cellshield\/\" title=\"Pseudonymize Your Sensitive Excel Data with CellShield [video]\">Read More<\/a><\/div>\n","protected":false},"author":32,"featured_media":6244,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"categories":[8,1030],"tags":[14,203,645,644,596,22,642,643,152,620],"class_list":["post-6243","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-data-protection","category-vlog","tag-data-masking","tag-encryption","tag-excel-add-in","tag-excel-spreadsheet","tag-iri-cellshield","tag-pseudonymization","tag-pseudonymize","tag-restore","tag-sensitive-data","tag-xls"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v23.4 (Yoast SEO v23.4) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Pseudonymize Your Sensitive Excel Data with CellShield [video] - IRI<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.iri.com\/blog\/data-protection\/pseudonymize-sensitive-excel-data-cellshield\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Pseudonymize Your Sensitive Excel Data with CellShield [video]\" \/>\n<meta property=\"og:description\" content=\"This is the last in a four-part series to introduce IRI CellShield. An overview is found here. The following parts demonstrate how to use the other functions in CellShield: data masking and encryption.\u00a0\u00a0If you&#8217;re interested in finding, classifying, or masking PII in databases or flat files, check out IRI FieldShield. For semi-structured and unstructured textRead More\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.iri.com\/blog\/data-protection\/pseudonymize-sensitive-excel-data-cellshield\/\" \/>\n<meta property=\"og:site_name\" content=\"IRI\" \/>\n<meta property=\"article:published_time\" content=\"2014-08-15T12:42:13+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-02-16T18:53:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/10\/to_pseudo.png\" \/>\n\t<meta property=\"og:image:width\" content=\"482\" \/>\n\t<meta property=\"og:image:height\" content=\"809\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Jackie Sabbagh\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jackie Sabbagh\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/pseudonymize-sensitive-excel-data-cellshield\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/pseudonymize-sensitive-excel-data-cellshield\/\"},\"author\":{\"name\":\"Jackie Sabbagh\",\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/person\/a77b509c111f25f8888fe7bd0c73fa9e\"},\"headline\":\"Pseudonymize Your Sensitive Excel Data with CellShield [video]\",\"datePublished\":\"2014-08-15T12:42:13+00:00\",\"dateModified\":\"2021-02-16T18:53:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/pseudonymize-sensitive-excel-data-cellshield\/\"},\"wordCount\":436,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.iri.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/pseudonymize-sensitive-excel-data-cellshield\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/10\/to_pseudo.png\",\"keywords\":[\"data masking\",\"encryption\",\"Excel add-in\",\"Excel spreadsheet\",\"IRI CellShield\",\"pseudonymization\",\"pseudonymize\",\"restore\",\"sensitive data\",\"xls\"],\"articleSection\":[\"Data Masking\/Protection\",\"VLOG\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.iri.com\/blog\/data-protection\/pseudonymize-sensitive-excel-data-cellshield\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/pseudonymize-sensitive-excel-data-cellshield\/\",\"url\":\"https:\/\/www.iri.com\/blog\/data-protection\/pseudonymize-sensitive-excel-data-cellshield\/\",\"name\":\"Pseudonymize Your Sensitive Excel Data with CellShield [video] - IRI\",\"isPartOf\":{\"@id\":\"https:\/\/www.iri.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/pseudonymize-sensitive-excel-data-cellshield\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/pseudonymize-sensitive-excel-data-cellshield\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/10\/to_pseudo.png\",\"datePublished\":\"2014-08-15T12:42:13+00:00\",\"dateModified\":\"2021-02-16T18:53:36+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/pseudonymize-sensitive-excel-data-cellshield\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.iri.com\/blog\/data-protection\/pseudonymize-sensitive-excel-data-cellshield\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/pseudonymize-sensitive-excel-data-cellshield\/#primaryimage\",\"url\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/10\/to_pseudo.png\",\"contentUrl\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/10\/to_pseudo.png\",\"width\":482,\"height\":809},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/pseudonymize-sensitive-excel-data-cellshield\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.iri.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Pseudonymize Your Sensitive Excel Data with CellShield [video]\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.iri.com\/blog\/#website\",\"url\":\"https:\/\/www.iri.com\/blog\/\",\"name\":\"IRI\",\"description\":\"Total Data Management Blog\",\"publisher\":{\"@id\":\"https:\/\/www.iri.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.iri.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.iri.com\/blog\/#organization\",\"name\":\"IRI\",\"url\":\"https:\/\/www.iri.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png\",\"contentUrl\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png\",\"width\":750,\"height\":206,\"caption\":\"IRI\"},\"image\":{\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/person\/a77b509c111f25f8888fe7bd0c73fa9e\",\"name\":\"Jackie Sabbagh\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e8797c735e92e5e8a11c74ddeb2c919b?s=96&d=blank&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e8797c735e92e5e8a11c74ddeb2c919b?s=96&d=blank&r=g\",\"caption\":\"Jackie Sabbagh\"},\"url\":\"https:\/\/www.iri.com\/blog\/author\/jackies\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Pseudonymize Your Sensitive Excel Data with CellShield [video] - IRI","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.iri.com\/blog\/data-protection\/pseudonymize-sensitive-excel-data-cellshield\/","og_locale":"en_US","og_type":"article","og_title":"Pseudonymize Your Sensitive Excel Data with CellShield [video]","og_description":"This is the last in a four-part series to introduce IRI CellShield. An overview is found here. The following parts demonstrate how to use the other functions in CellShield: data masking and encryption.\u00a0\u00a0If you&#8217;re interested in finding, classifying, or masking PII in databases or flat files, check out IRI FieldShield. For semi-structured and unstructured textRead More","og_url":"https:\/\/www.iri.com\/blog\/data-protection\/pseudonymize-sensitive-excel-data-cellshield\/","og_site_name":"IRI","article_published_time":"2014-08-15T12:42:13+00:00","article_modified_time":"2021-02-16T18:53:36+00:00","og_image":[{"width":482,"height":809,"url":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/10\/to_pseudo.png","type":"image\/png"}],"author":"Jackie Sabbagh","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Jackie Sabbagh","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.iri.com\/blog\/data-protection\/pseudonymize-sensitive-excel-data-cellshield\/#article","isPartOf":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/pseudonymize-sensitive-excel-data-cellshield\/"},"author":{"name":"Jackie Sabbagh","@id":"https:\/\/www.iri.com\/blog\/#\/schema\/person\/a77b509c111f25f8888fe7bd0c73fa9e"},"headline":"Pseudonymize Your Sensitive Excel Data with CellShield [video]","datePublished":"2014-08-15T12:42:13+00:00","dateModified":"2021-02-16T18:53:36+00:00","mainEntityOfPage":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/pseudonymize-sensitive-excel-data-cellshield\/"},"wordCount":436,"commentCount":0,"publisher":{"@id":"https:\/\/www.iri.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/pseudonymize-sensitive-excel-data-cellshield\/#primaryimage"},"thumbnailUrl":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/10\/to_pseudo.png","keywords":["data masking","encryption","Excel add-in","Excel spreadsheet","IRI CellShield","pseudonymization","pseudonymize","restore","sensitive data","xls"],"articleSection":["Data Masking\/Protection","VLOG"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.iri.com\/blog\/data-protection\/pseudonymize-sensitive-excel-data-cellshield\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.iri.com\/blog\/data-protection\/pseudonymize-sensitive-excel-data-cellshield\/","url":"https:\/\/www.iri.com\/blog\/data-protection\/pseudonymize-sensitive-excel-data-cellshield\/","name":"Pseudonymize Your Sensitive Excel Data with CellShield [video] - IRI","isPartOf":{"@id":"https:\/\/www.iri.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/pseudonymize-sensitive-excel-data-cellshield\/#primaryimage"},"image":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/pseudonymize-sensitive-excel-data-cellshield\/#primaryimage"},"thumbnailUrl":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/10\/to_pseudo.png","datePublished":"2014-08-15T12:42:13+00:00","dateModified":"2021-02-16T18:53:36+00:00","breadcrumb":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/pseudonymize-sensitive-excel-data-cellshield\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.iri.com\/blog\/data-protection\/pseudonymize-sensitive-excel-data-cellshield\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.iri.com\/blog\/data-protection\/pseudonymize-sensitive-excel-data-cellshield\/#primaryimage","url":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/10\/to_pseudo.png","contentUrl":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/10\/to_pseudo.png","width":482,"height":809},{"@type":"BreadcrumbList","@id":"https:\/\/www.iri.com\/blog\/data-protection\/pseudonymize-sensitive-excel-data-cellshield\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.iri.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Pseudonymize Your Sensitive Excel Data with CellShield [video]"}]},{"@type":"WebSite","@id":"https:\/\/www.iri.com\/blog\/#website","url":"https:\/\/www.iri.com\/blog\/","name":"IRI","description":"Total Data Management Blog","publisher":{"@id":"https:\/\/www.iri.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.iri.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.iri.com\/blog\/#organization","name":"IRI","url":"https:\/\/www.iri.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.iri.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png","contentUrl":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png","width":750,"height":206,"caption":"IRI"},"image":{"@id":"https:\/\/www.iri.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.iri.com\/blog\/#\/schema\/person\/a77b509c111f25f8888fe7bd0c73fa9e","name":"Jackie Sabbagh","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.iri.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e8797c735e92e5e8a11c74ddeb2c919b?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e8797c735e92e5e8a11c74ddeb2c919b?s=96&d=blank&r=g","caption":"Jackie Sabbagh"},"url":"https:\/\/www.iri.com\/blog\/author\/jackies\/"}]}},"jetpack_featured_media_url":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/10\/to_pseudo.png","_links":{"self":[{"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/posts\/6243"}],"collection":[{"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/comments?post=6243"}],"version-history":[{"count":28,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/posts\/6243\/revisions"}],"predecessor-version":[{"id":14351,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/posts\/6243\/revisions\/14351"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/media\/6244"}],"wp:attachment":[{"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/media?parent=6243"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/categories?post=6243"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/tags?post=6243"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}