{"id":408,"date":"2018-01-26T11:11:14","date_gmt":"2018-01-26T16:11:14","guid":{"rendered":"https:\/\/treehousetechgroup.com\/?p=408"},"modified":"2021-05-20T11:35:41","modified_gmt":"2021-05-20T15:35:41","slug":"data-strategy-offense-defense","status":"publish","type":"post","link":"https:\/\/treehousetechgroup.com\/data-strategy-offense-defense\/","title":{"rendered":"Is Your Data Strategy on the Offense or Defense?"},"content":{"rendered":"\n

Consider this: in 1992, <\/span>global internet networks<\/span><\/a> carried roughly 100 GB of traffic per day. Ten years later, global internet traffic amounted to 100 Gigabytes per <\/span>second<\/span><\/i> (GBps). In 2016, global internet traffic reached more than 20,00 GBps \u2013 and surpassed one zettabyte for the first time \u2013 the equivalent, as <\/span>this article<\/span><\/a> reports, of 152 <\/span>million<\/span><\/i> years of high-definition video.<\/span><\/p>\n\n\n\n

That\u2019s a lot of data. But even with such exponential growth \u2013 and continued <\/span>predictions<\/span><\/a> of increased volume \u2013 many companies are still behind the curve when it comes to developing a robust data strategy and implementing a data management plan.<\/span><\/p>\n\n\n\n

As an <\/span>article<\/span><\/a> in <\/span>Harvard Business Review<\/span><\/i> reports, \u201cless than half of an organization\u2019s structured data is actively used in making decisions \u2013 and less than 1% of its unstructured data is analyzed or used at all.\u201d Furthermore, \u201cmore than 70% of employees have access to data they should not, and 80% of analysts\u2019 time is spent simply discovering and preparing data.\u201d<\/span><\/p>\n\n\n\n

While developing a data strategy can seem overwhelming and time consuming, a good place for companies to start is in understanding the difference between a \u201cdefensive\u201d and \u201coffensive\u201d data strategy \u2013 a framework developed by Leandro DalleMule and Thomas H. Davenport outlined in the aforementioned HBR article.<\/span><\/p>\n\n\n\n

What is a defensive data strategy?<\/b><\/span><\/p>\n\n\n\n

Simply put, data defense is all about minimizing risk. This includes \u201censuring compliance with regulations (such as rules governing data privacy and the integrity of financial reports), using analytics to detect and limit fraud, and building systems to prevent theft.\u201d<\/span><\/p>\n\n\n\n

A defensive data strategy also \u201censures the integrity of data flowing through a company\u2019s internal systems by identifying, standardizing, and governing authoritative data sources, such as fundamental customer and supplier information or sales data.\u201d<\/span><\/p>\n\n\n\n

Industries that operate in highly regulated environments, such as financial services, insurance and healthcare, are likely to gravitate toward a defensive data strategy.<\/span><\/p>\n\n\n\n

What about data offense?<\/b><\/span><\/p>\n\n\n\n

Data offense, however, focuses on \u201csupporting business objectives such as increasing revenue, profitability, and customer satisfaction.\u201d This includes \u201cactivities that generate customer insights (data analysis and modeling, for example) or integrate disparate customer and market data to support managerial decision-making through\u2026interactive borgata sportsbook reviewdashboards.\u201d In other words, an offensive data strategy involves strategic initiatives designed to position a company for scalability, growth and increased revenue generation. <\/span><\/p>\n\n\n\n

Because retailers operate in a less-regulated environment than other industries, they are more likely to pursue an offensive strategy.<\/span><\/p>\n\n\n\n

So which one is better?<\/b><\/span><\/p>\n\n\n\n

The goal isn\u2019t to choose one over the other, but rather to strike the appropriate balance between being on the offense and going on the defense. There are numerous factors that must be weighed, such as the company\u2019s overall strategy, its regulatory environment, the data capabilities of its competitors, the maturity of its data-management practices, and the size of its data budget.<\/span><\/p>\n\n\n\n

Similarly, companies will likely need to continually adjust their strategy due to changing external factors. For instance, a financial services provider may have to become more offensive if competition increases, while a pharmaceutical company may have to go more on the defense in a heightened regulatory environment.<\/span><\/p>\n\n\n\n

Striking this balance, then, also requires balancing data control and flexibility. As the article notes, \u201cThe more uniform data is, the easier it becomes to execute defensive processes, such as complying with regulatory requirements and implementing data-access controls. The more flexible data is\u2014that is, the more readily it can be transformed or interpreted to meet specific business needs\u2014the more useful it is in offense.\u201d<\/span><\/p>\n\n\n\n

Why does this matter?<\/b><\/span><\/p>\n\n\n\n

Data has been a big buzzword for the past couple decades. But while some companies could afford to ignore the hype, we\u2019ve reached a point where data has transformed the way every business operates \u2013 no matter the market or industry.<\/span><\/p>\n\n\n\n

Just consider this: according to the International Institute for Analytics, by 2020, the <\/span>amount of data<\/span><\/a> that is worth analyzing will double \u2013 and businesses who use data will see $430 billion in productivity benefits over competitors who aren\u2019t.<\/span><\/p>\n\n\n\n

Needless to say, the success of a company is now dependent upon a robust data strategy and management plan.<\/span><\/p>\n\n\n\n

Wondering if your company is implementing the right data strategy? Why not sign up for a free consultation<\/a>.   <\/span><\/p>\n","protected":false},"excerpt":{"rendered":"

Consider this: in 1992, global internet networks carried roughly 100 GB of traffic per day. Ten years later, global internet traffic amounted to 100 Gigabytes per second (GBps). In 2016, global internet traffic reached more than 20,00 GBps \u2013 and surpassed one zettabyte for the first time \u2013 the equivalent, as this article reports, of…<\/p>\n","protected":false},"author":2,"featured_media":409,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[32],"tags":[33,35,34,8],"class_list":["post-408","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-data-strategy","tag-data-strategy","tag-defensive-strategy","tag-offensive-strategy","tag-solutions"],"acf":[],"yoast_head":"\nYour borgata online casino reviewsData Strategy, Offense or Defense? | Treehouse Tech Group<\/title>\n<meta name=\"description\" content=\"While developing a data strategy can seem overwhelming and time consuming, a good place for companies to start is in understanding the difference between a \u201cdefensive\u201d and \u201coffensive\u201d data strategy\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/treehousetechgroup.com\/data-strategy-offense-defense\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Your Data Strategy, Offense or Defense? | Treehouse Tech Group\" \/>\n<meta property=\"og:description\" content=\"While developing a data strategy can seem overwhelming and time consuming, a good place for companies to start is in understanding the difference between a \u201cdefensive\u201d and \u201coffensive\u201d data strategy\" \/>\n<meta property=\"og:url\" content=\"https:\/\/treehousetechgroup.com\/data-strategy-offense-defense\/\" \/>\n<meta property=\"og:site_name\" content=\"Treehouse Tech Group\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/treehousetech\" \/>\n<meta property=\"article:published_time\" content=\"2018-01-26T16:11:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-05-20T15:35:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/treehousetechgroup.com\/wp-content\/uploads\/2018\/01\/Screen-Shot-2018-01-25-at-4.07.58-PM.png\" \/>\n\t<meta property=\"og:image:width\" content=\"615\" \/>\n\t<meta property=\"og:image:height\" content=\"401\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Treehouse Technology Group\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Treehouse_Tech\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Treehouse Technology Group\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/treehousetechgroup.com\/data-strategy-offense-defense\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/treehousetechgroup.com\/data-strategy-offense-defense\/\"},\"author\":{\"name\":\"Treehouse Technology Group\",\"@id\":\"https:\/\/treehousetechgroup.com\/#\/schema\/person\/ad28bf7d9347e73bf2876687f40e31ec\"},\"headline\":\"Is Your Data Strategy on the Offense or Defense?\",\"datePublished\":\"2018-01-26T16:11:14+00:00\",\"dateModified\":\"2021-05-20T15:35:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/treehousetechgroup.com\/data-strategy-offense-defense\/\"},\"wordCount\":702,\"publisher\":{\"@id\":\"https:\/\/treehousetechgroup.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/treehousetechgroup.com\/data-strategy-offense-defense\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/treehousetechgroup.com\/wp-content\/uploads\/2018\/01\/Screen-Shot-2018-01-25-at-4.07.58-PM.png\",\"keywords\":[\"data strategy\",\"defensive strategy\",\"offensive strategy\",\"solutions\"],\"articleSection\":[\"Data Strategy\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/treehousetechgroup.com\/data-strategy-offense-defense\/\",\"url\":\"https:\/\/treehousetechgroup.com\/data-strategy-offense-defense\/\",\"name\":\"Your borgata online casino reviewsData Strategy, Offense or Defense? | Treehouse Tech Group\",\"isPartOf\":{\"@id\":\"https:\/\/treehousetechgroup.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/treehousetechgroup.com\/data-strategy-offense-defense\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/treehousetechgroup.com\/data-strategy-offense-defense\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/treehousetechgroup.com\/wp-content\/uploads\/2018\/01\/Screen-Shot-2018-01-25-at-4.07.58-PM.png\",\"datePublished\":\"2018-01-26T16:11:14+00:00\",\"dateModified\":\"2021-05-20T15:35:41+00:00\",\"description\":\"While developing a data strategy can seem overwhelming and time consuming, a good place for companies to start is in understanding the difference between a \u201cdefensive\u201d and \u201coffensive\u201d data strategy\",\"breadcrumb\":{\"@id\":\"https:\/\/treehousetechgroup.com\/data-strategy-offense-defense\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/treehousetechgroup.com\/data-strategy-offense-defense\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/treehousetechgroup.com\/data-strategy-offense-defense\/#primaryimage\",\"url\":\"https:\/\/treehousetechgroup.com\/wp-content\/uploads\/2018\/01\/Screen-Shot-2018-01-25-at-4.07.58-PM.png\",\"contentUrl\":\"https:\/\/treehousetechgroup.com\/wp-content\/uploads\/2018\/01\/Screen-Shot-2018-01-25-at-4.07.58-PM.png\",\"width\":615,\"height\":401},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/treehousetechgroup.com\/data-strategy-offense-defense\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/treehousetechgroup.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Is Your Data Strategy on the Offense or Defense?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/treehousetechgroup.com\/#website\",\"url\":\"https:\/\/treehousetechgroup.com\/\",\"name\":\"Treehouse Tech Group\",\"description\":\"Technology Strategy and Consulting\",\"publisher\":{\"@id\":\"https:\/\/treehousetechgroup.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/treehousetechgroup.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/treehousetechgroup.com\/#organization\",\"name\":\"Treehouse Tech Group\",\"url\":\"https:\/\/treehousetechgroup.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/treehousetechgroup.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/treehousetechgroup.com\/wp-content\/uploads\/2018\/01\/treehousetech_logo_full_white.png\",\"contentUrl\":\"https:\/\/treehousetechgroup.com\/wp-content\/uploads\/2018\/01\/treehousetech_logo_full_white.png\",\"width\":800,\"borgata online casino reviewsheight\":300,\"caption\":\"Treehouse Tech Group\"},\"image\":{\"@id\":\"https:\/\/treehousetechgroup.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/treehousetechgroup.com\/#\/schema\/person\/ad28bf7d9347e73bf2876687f40e31ec\",\"name\":\"Treehouse Technology Group\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/treehousetechgroup.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/b246a0ca411c01fda9be17471b8c8e47?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/b246a0ca411c01fda9be17471b8c8e47?s=96&d=mm&r=g\",\"caption\":\"Treehouse Technology Group\"},\"sameAs\":[\"https:\/\/treehousetechgroup.com\/\",\"https:\/\/www.facebook.com\/treehousetech\",\"https:\/\/www.instagram.com\/treehouse_tech_group\/\",\"https:\/\/www.linkedin.com\/company\/treehouse-technology-group\",\"https:\/\/x.com\/Treehouse_Tech\",\"https:\/\/www.youtube.com\/channel\/UCXxGI43dg4YS83RLLHkzDCg\"],\"url\":\"https:\/\/treehousetechgroup.com\/author\/treehouse\/\"}]}<\/script>\n","yoast_head_json":{"title":"Your Data Strategy, Offense or Defense? | Treehouse Tech Group","description":"While developing a data strategy can seem overwhelming and time consuming, a good place for companies to start is in understanding the difference between a \u201cdefensive\u201d and \u201coffensive\u201d data strategy","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/treehousetechgroup.com\/data-strategy-offense-defense\/","og_locale":"en_US","og_type":"article","og_title":"Your Data Strategy, Offense or Defense? | Treehouse Tech Group","og_description":"While developing a data strategy can seem overwhelming and time consuming, a good place for companies to start is in understanding the difference between a \u201cdefensive\u201d and \u201coffensive\u201d data strategy","og_url":"https:\/\/treehousetechgroup.com\/data-strategy-offense-defense\/","og_site_name":"Treehouse Tech Group","article_author":"https:\/\/www.facebook.com\/treehousetech","article_published_time":"2018-01-26T16:11:14+00:00","article_modified_time":"2021-05-20T15:35:41+00:00","og_image":[{"width":615,"height":401,"url":"https:\/\/treehousetechgroup.com\/wp-content\/uploads\/2018\/01\/Screen-Shot-2018-01-25-at-4.07.58-PM.png","type":"image\/png"}],"author":"Treehouse Technology Group","twitter_card":"summary_large_image","twitter_creator":"@Treehouse_Tech","twitter_misc":{"Written by":"Treehouse Technology Group","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/treehousetechgroup.com\/data-strategy-offense-defense\/#article","isPartOf":{"@id":"https:\/\/treehousetechgroup.com\/data-strategy-offense-defense\/"},"author":{"name":"Treehouse Technology Group","@id":"https:\/\/treehousetechgroup.com\/#\/schema\/person\/ad28bf7d9347e73bf2876687f40e31ec"},"headline":"Is Your Data Strategy on the Offense or Defense?","datePublished":"2018-01-26T16:11:14+00:00","dateModified":"2021-05-20T15:35:41+00:00","mainEntityOfPage":{"@id":"https:\/\/treehousetechgroup.com\/data-strategy-offense-defense\/"},"wordCount":702,"publisher":{"@id":"https:\/\/treehousetechgroup.com\/#organization"},"image":{"@id":"https:\/\/treehousetechgroup.com\/data-strategy-offense-defense\/#primaryimage"},"thumbnailUrl":"https:\/\/treehousetechgroup.com\/wp-content\/uploads\/2018\/01\/Screen-Shot-2018-01-25-at-4.07.58-PM.png","keywords":["data strategy","defensive strategy","offensive strategy","solutions"],"articleSection":["Data Strategy"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/treehousetechgroup.com\/data-strategy-offense-defense\/","url":"https:\/\/treehousetechgroup.com\/data-strategy-offense-defense\/","name":"Your Data Strategy, Offense or Defense? | Treehouse Tech Group","isPartOf":{"@id":"https:\/\/treehousetechgroup.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/treehousetechgroup.com\/data-strategy-offense-defense\/#primaryimage"},"image":{"@id":"https:\/\/treehousetechgroup.com\/data-strategy-offense-defense\/#primaryimage"},"thumbnailUrl":"https:\/\/treehousetechgroup.com\/wp-content\/uploads\/2018\/01\/Screen-Shot-2018-01-25-at-4.07.58-PM.png","datePublished":"2018-01-26T16:11:14+00:00","dateModified":"2021-05-20T15:35:41+00:00","description":"While developing a data strategy can seem overwhelming and time consuming, a good place for companies to start is in understanding the difference between a \u201cdefensive\u201d and \u201coffensive\u201d data strategy","breadcrumb":{"@id":"https:\/\/treehousetechgroup.com\/data-strategy-offense-defense\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/treehousetechgroup.com\/data-strategy-offense-defense\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/treehousetechgroup.com\/data-strategy-offense-defense\/#primaryimage","url":"https:\/\/treehousetechgroup.com\/wp-content\/uploads\/2018\/01\/Screen-Shot-2018-01-25-at-4.07.58-PM.png","contentUrl":"https:\/\/treehousetechgroup.com\/wp-content\/uploads\/2018\/01\/Screen-Shot-2018-01-25-at-4.07.58-PM.png","width":615,"height":401},{"@type":"BreadcrumbList","@id":"https:\/\/treehousetechgroup.com\/data-strategy-offense-defense\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/treehousetechgroup.com\/"},{"@type":"ListItem","position":2,"name":"Is Your Data Strategy on the Offense or Defense?"}]},{"@type":"WebSite","@id":"https:\/\/treehousetechgroup.com\/#website","url":"https:\/\/treehousetechgroup.com\/","name":"Treehouse Tech Group","description":"Technology Strategy and Consulting","publisher":{"@id":"https:\/\/treehousetechgroup.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/treehousetechgroup.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/treehousetechgroup.com\/#organization","name":"Treehouse Tech Group","url":"https:\/\/treehousetechgroup.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/treehousetechgroup.com\/#\/schema\/logo\/image\/","url":"https:\/\/treehousetechgroup.com\/wp-content\/uploads\/2018\/01\/treehousetech_logo_full_white.png","contentUrl":"https:\/\/treehousetechgroup.com\/wp-content\/uploads\/2018\/01\/treehousetech_logo_full_white.png","width":800,"height":300,"caption":"Treehouse Tech Group"},"image":{"@id":"https:\/\/treehousetechgroup.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/treehousetechgroup.com\/#\/schema\/person\/ad28bf7d9347e73bf2876687f40e31ec","name":"Treehouse Technology Group","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/treehousetechgroup.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/b246a0ca411c01fda9be17471b8c8e47?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b246a0ca411c01fda9be17471b8c8e47?s=96&d=mm&r=g","caption":"Treehouse Technology Group"},"sameAs":["https:\/\/treehousetechgroup.com\/","https:\/\/www.facebook.com\/treehousetech","https:\/\/www.instagram.com\/treehouse_tech_group\/","https:\/\/www.linkedin.com\/company\/treehouse-technology-group","https:\/\/x.com\/Treehouse_Tech","https:\/\/www.youtube.com\/channel\/UCXxGI43dg4YS83RLLHkzDCg"],"url":"https:\/\/treehousetechgroup.com\/author\/treehouse\/"}]}},"jetpack_featured_media_url":"https:\/\/treehousetechgroup.com\/wp-content\/uploads\/2018\/01\/Screen-Shot-2018-01-25-at-4.07.58-PM.png","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pavGO9-6A","jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/treehousetechgroup.com\/wp-json\/wp\/v2\/posts\/408"}],"collection":[{"href":"https:\/\/treehousetechgroup.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/treehousetechgroup.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/treehousetechgroup.com\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/treehousetechgroup.com\/wp-json\/wp\/v2\/comments?post=408"}],"version-history":[{"count":0,"href":"https:\/\/treehousetechgroup.com\/wp-json\/wp\/v2\/posts\/408\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/treehousetechgroup.com\/wp-json\/wp\/v2\/media\/409"}],"wp:attachment":[{"href":"https:\/\/treehousetechgroup.com\/wp-json\/wp\/v2\/media?parent=408"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/treehousetechgroup.com\/wp-json\/wp\/v2\/categories?post=408"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/treehousetechgroup.com\/wp-json\/wp\/v2\/tags?post=408"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}