{"id":1014,"date":"2020-10-27T16:00:00","date_gmt":"2020-10-27T20:00:00","guid":{"rendered":"https:\/\/www.pwvconsultants.com\/blog\/?p=1014"},"modified":"2020-10-27T15:40:04","modified_gmt":"2020-10-27T19:40:04","slug":"blockchain-explained-how-it-works","status":"publish","type":"post","link":"https:\/\/www.pwvconsultants.com\/blog\/blockchain-explained-how-it-works\/","title":{"rendered":"Blockchain Explained: How It Works"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Blockchain, distributed ledgers and cryptocurrency are not interchangeable terms. Blockchain has to happen in sequence and partially helps provide data integrity.<\/h2>\n\n\n\n<p>Often, people misconstrue what blockchain is. The term \u201cblockchain\u201d has been co-opted. It is not cryptocurrency. Cryptocurrency uses blockchain. There are a number of elements to blockchain, which is sometimes also confused with a distributed ledger. To start, let\u2019s discuss how blockchain and distributed ledger work together for an effective security strategy.<\/p>\n\n\n\n<p>As crazy as this sounds, blockchain is exactly what it sounds like. It\u2019s a literal chain of blocks. This chain of blocks only fits together in one specific way, providing a security benefit.<\/p>\n\n\n\n<p>Let\u2019s back up a little. Everything in security deals with CIA: Confidentiality, Integrity and Availability. Confidentiality refers to keeping information protected from people who don\u2019t need access to it. Availability refers to being able to locate that data when you do need it. Integrity is different, this is typically an assurance from your provider that your data hasn\u2019t been tampered with. It\u2019s <a href=\"https:\/\/www.pwvconsultants.com\/blog\/aws-adds-iam-lambda-features-to-http-apis\/\" target=\"_blank\" rel=\"noreferrer noopener\">AWS<\/a> or <a href=\"https:\/\/www.pwvconsultants.com\/blog\/azure-communication-services-announced\/\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Azure<\/a> or whichever provider you choose to secure your data (we implore you to use cloud services) saying that your data is safe, it\u2019s duplicated, unaltered and untouched. However, aside from their assurances, there\u2019s no 100% way to know for sure if anything has been tampered with.<\/p>\n\n\n\n<p>For example, a hacker could potentially access and tamper with data in a database, give themselves a million dollars, tamper with the logs to remove evidence that those changes were made and that they were in the system, and get&nbsp; back out.<\/p>\n\n\n\n<p>Enter blockchain. This literal chain of blocks only fit together in one specific way, which is confirmed as each block is added to the chain. When a block is added, there is a chain of data pieces that are hashed together to reduce large sets of data down to a determinable alphanumeric string of determined length that is incredibly unlikely to be duplicated. This string of data can be simply a couple of words, or it can be as long as War &amp; Peace and anything in between. Because of the way it works, when you hash data together, getting the same result twice is rare. So, if you take all the data and data records and hash them together, those hashes have to fit. If someone tampers with one of those records, or even just the last two records, they have to re-hash the data and it\u2019s unlikely to match the rest of the hashes.<\/p>\n\n\n\n<p>Yes, there are different ways to hash data. You could hash everything that\u2019s been in the database or you can hash the last block with the block before it. The former is more cumbersome than the latter, but they both serve the same purpose.<\/p>\n\n\n\n<p>But what if someone goes into the blockchain and hashes and tampers with the record that was preceding it as well as the current record they want to mess with and then alters the hash? Well, there\u2019s another piece to how blockchain is usually implemented. This element distribution makes distributed blockchain an effective superset of distributed ledger. On its own, blockchain would not be hyper-effective because of the example above.<\/p>\n\n\n\n<p>This is why blockchain needs distributed ledger, which is a whole other topic that we will dive into in the next article.&nbsp;<\/p>\n\n\n\n<p>One key thing to remember about blockchain is that you don\u2019t need to use it for everything, nor should you. There are practical use cases, which include transactional exchanges and semi-transactional contracts which need to happen in a specific order. Blockchain needs to happen in sequence, so applications that do not have a set order will not work. Blockchain is a tool, it\u2019s not the whole toolbox. Tomorrow, we discuss how distributed ledger and blockchain work together to create an effective security strategy for specific operations.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Blockchain is a term that is often misconstrued. The way it is designed and functions makes it helpful in certain security protocols.<\/p>\n","protected":false},"author":1,"featured_media":1024,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[4,14],"tags":[1923,602,1925,1926,1822,1831,1273,1924,575],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.2 (Yoast SEO v22.2) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Blockchain Explained: How It Works - PWV Consultants<\/title>\n<meta name=\"description\" content=\"Blockchain is a term that is often misconstrued. The way it is designed and functions makes it helpful in certain security protocols.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pwvconsultants.com\/blog\/blockchain-explained-how-it-works\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Blockchain Explained: How It Works\" \/>\n<meta property=\"og:description\" content=\"Blockchain is a term that is often misconstrued. The way it is designed and functions makes it helpful in certain security protocols.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pwvconsultants.com\/blog\/blockchain-explained-how-it-works\/\" \/>\n<meta property=\"og:site_name\" content=\"PWV Consultants\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\" \/>\n<meta property=\"article:published_time\" content=\"2020-10-27T20:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-10-27T19:40:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/10\/blockchain-3277336_1280.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"720\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Pieter VanIperen\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:site\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Pieter VanIperen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/blockchain-explained-how-it-works\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/blockchain-explained-how-it-works\/\"},\"author\":{\"name\":\"Pieter VanIperen\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\"},\"headline\":\"Blockchain Explained: How It Works\",\"datePublished\":\"2020-10-27T20:00:00+00:00\",\"dateModified\":\"2020-10-27T19:40:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/blockchain-explained-how-it-works\/\"},\"wordCount\":657,\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/blockchain-explained-how-it-works\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/10\/blockchain-3277336_1280.png\",\"keywords\":[\"blockchain\",\"Coding\",\"cryptocurrecny\",\"data hashing\",\"data privacy\",\"data protection\",\"Database\",\"distributed ledger\",\"Information Security\"],\"articleSection\":[\"Information Security\",\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/blockchain-explained-how-it-works\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/blockchain-explained-how-it-works\/\",\"name\":\"Blockchain Explained: How It Works - PWV Consultants\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/blockchain-explained-how-it-works\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/blockchain-explained-how-it-works\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/10\/blockchain-3277336_1280.png\",\"datePublished\":\"2020-10-27T20:00:00+00:00\",\"dateModified\":\"2020-10-27T19:40:04+00:00\",\"description\":\"Blockchain is a term that is often misconstrued. The way it is designed and functions makes it helpful in certain security protocols.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/blockchain-explained-how-it-works\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.pwvconsultants.com\/blog\/blockchain-explained-how-it-works\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/blockchain-explained-how-it-works\/#primaryimage\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/10\/blockchain-3277336_1280.png\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/10\/blockchain-3277336_1280.png\",\"width\":1280,\"height\":720,\"caption\":\"Image by mmi9 from Pixabay\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/blockchain-explained-how-it-works\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.pwvconsultants.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blockchain Explained: How It Works\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"name\":\"PWV Consultants\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\",\"name\":\"PWV Consultants\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"width\":98,\"height\":84,\"caption\":\"PWV Consultants\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\",\"https:\/\/twitter.com\/PWV_Consultants\",\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\",\"name\":\"Pieter VanIperen\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"caption\":\"Pieter VanIperen\"},\"description\":\"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Blockchain Explained: How It Works - PWV Consultants","description":"Blockchain is a term that is often misconstrued. The way it is designed and functions makes it helpful in certain security protocols.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pwvconsultants.com\/blog\/blockchain-explained-how-it-works\/","og_locale":"en_US","og_type":"article","og_title":"Blockchain Explained: How It Works","og_description":"Blockchain is a term that is often misconstrued. The way it is designed and functions makes it helpful in certain security protocols.","og_url":"https:\/\/www.pwvconsultants.com\/blog\/blockchain-explained-how-it-works\/","og_site_name":"PWV Consultants","article_publisher":"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","article_published_time":"2020-10-27T20:00:00+00:00","article_modified_time":"2020-10-27T19:40:04+00:00","og_image":[{"width":1280,"height":720,"url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/10\/blockchain-3277336_1280.png","type":"image\/png"}],"author":"Pieter VanIperen","twitter_card":"summary_large_image","twitter_creator":"@PWV_Consultants","twitter_site":"@PWV_Consultants","twitter_misc":{"Written by":"Pieter VanIperen","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pwvconsultants.com\/blog\/blockchain-explained-how-it-works\/#article","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/blockchain-explained-how-it-works\/"},"author":{"name":"Pieter VanIperen","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4"},"headline":"Blockchain Explained: How It Works","datePublished":"2020-10-27T20:00:00+00:00","dateModified":"2020-10-27T19:40:04+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/blockchain-explained-how-it-works\/"},"wordCount":657,"publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/blockchain-explained-how-it-works\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/10\/blockchain-3277336_1280.png","keywords":["blockchain","Coding","cryptocurrecny","data hashing","data privacy","data protection","Database","distributed ledger","Information Security"],"articleSection":["Information Security","Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.pwvconsultants.com\/blog\/blockchain-explained-how-it-works\/","url":"https:\/\/www.pwvconsultants.com\/blog\/blockchain-explained-how-it-works\/","name":"Blockchain Explained: How It Works - PWV Consultants","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/blockchain-explained-how-it-works\/#primaryimage"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/blockchain-explained-how-it-works\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/10\/blockchain-3277336_1280.png","datePublished":"2020-10-27T20:00:00+00:00","dateModified":"2020-10-27T19:40:04+00:00","description":"Blockchain is a term that is often misconstrued. The way it is designed and functions makes it helpful in certain security protocols.","breadcrumb":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/blockchain-explained-how-it-works\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pwvconsultants.com\/blog\/blockchain-explained-how-it-works\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/blockchain-explained-how-it-works\/#primaryimage","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/10\/blockchain-3277336_1280.png","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/10\/blockchain-3277336_1280.png","width":1280,"height":720,"caption":"Image by mmi9 from Pixabay"},{"@type":"BreadcrumbList","@id":"https:\/\/www.pwvconsultants.com\/blog\/blockchain-explained-how-it-works\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pwvconsultants.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Blockchain Explained: How It Works"}]},{"@type":"WebSite","@id":"https:\/\/www.pwvconsultants.com\/blog\/#website","url":"https:\/\/www.pwvconsultants.com\/blog\/","name":"PWV Consultants","description":"","publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization","name":"PWV Consultants","url":"https:\/\/www.pwvconsultants.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","width":98,"height":84,"caption":"PWV Consultants"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","https:\/\/twitter.com\/PWV_Consultants","https:\/\/www.linkedin.com\/company\/pwv-consultants"]},{"@type":"Person","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4","name":"Pieter VanIperen","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","caption":"Pieter VanIperen"},"description":"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.","sameAs":["https:\/\/www.linkedin.com\/company\/pwv-consultants"]}]}},"_links":{"self":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/1014"}],"collection":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/comments?post=1014"}],"version-history":[{"count":7,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/1014\/revisions"}],"predecessor-version":[{"id":1120,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/1014\/revisions\/1120"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media\/1024"}],"wp:attachment":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media?parent=1014"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/categories?post=1014"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/tags?post=1014"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}