{"id":2132,"date":"2021-07-20T14:57:34","date_gmt":"2021-07-20T18:57:34","guid":{"rendered":"https:\/\/www.pwvconsultants.com\/blog\/?p=2132"},"modified":"2021-07-20T14:57:36","modified_gmt":"2021-07-20T18:57:36","slug":"data-privacy-in-the-age-of-information","status":"publish","type":"post","link":"https:\/\/www.pwvconsultants.com\/blog\/data-privacy-in-the-age-of-information\/","title":{"rendered":"Data Privacy in the Age of Information"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\" id=\"h-data-privacy-is-making-headlines-as-consumers-vie-for-more-control-but-it-s-not-just-consumers-affected-businesses-play-a-big-role\">Data privacy is making headlines as consumers vie for more control. But it&#8217;s not just consumers affected, businesses play a big role.<\/h2>\n\n\n\n<p>Data privacy is a hot button topic of late. Consumers are increasingly educating themselves and becoming knowledgeable about data and how it\u2019s used. Businesses collect and use customer data for a variety of reasons, whether it\u2019s personalization, how features are used in an app or on a website or something else, your information is being stored somewhere. Let\u2019s be clear about something though, companies&#8217; data collection policies don\u2019t just affect consumers, but businesses, too. Data privacy isn\u2019t just about identity theft anymore, and it\u2019s important that businesses not only secure what they collect, but also train employees on how to keep their information safe.<\/p>\n\n\n\n<p>That seems weird, right? Is it really the employer\u2019s responsibility to teach someone how to keep their personal information safe? Technically, the answer is no. We\u2019re all adults and are responsible for our own actions and information we share. However, when an employee\u2019s actions inadvertently affect the business, it becomes the problem of that business. <\/p>\n\n\n\n<p>Let\u2019s back up a little bit, let\u2019s explain how this works. There are a plethora of new gadgets and tools and smart IoT devices on the market today. <a rel=\"noreferrer noopener\" href=\"https:\/\/www.businessinsider.com\/amazon-sleep-monitoring-device-radar-fcc-permission-granted-2021-7\" target=\"_blank\">Amazon just got federal approval<\/a> to create a device that monitors sleep using radar. Radar provides touchless sleep monitoring, something the company claims will provide more precise information and location accuracy. MIT made an \u201c<a rel=\"noreferrer noopener\" href=\"https:\/\/interestingengineering.com\/intelligent-mat-predicts-posture-based-on-tactile-movement\" target=\"_blank\">Intelligent Carpet<\/a>\u201d that can monitor people without the use of cameras. There are smart refrigerators, smart thermostats, smart doorbells, etc. that keep track of everything we do and every purchase we make.<\/p>\n\n\n\n<p>For every website we enter our information on, we create a new access point to our data. For every device we use that helps us automate our lives (Alexa, Siri, etc.), we give another company a peek into our daily lives. Every single website, product, etc. has terms and conditions which contain information about the data they collect and how they use it. But consumers really have no say what the company does with that information once they agree to the terms. For example, the use of smart meters for public utilities is becoming more widespread. It was recently discovered that <a rel=\"noreferrer noopener\" href=\"https:\/\/interestingengineering.com\/spies-on-the-side-of-your-house-smart-meters\" target=\"_blank\">some meters were accessed and adjusted remotely<\/a>, without the consumer\u2019s explicit OK, per the agreed terms of service.<\/p>\n\n\n\n<p>As a business leader or business owner, you have an obligation to protect your business. You likely have an inherent desire to protect your business so that it remains alive and profitable. That means you need to ensure your employees know how to keep their information safe. If their information becomes exposed and a threat actor gets ahold of it, they can use that information to infiltrate places of business where people work. This is why IAM controls are imperative, the requirement of strong passwords that have to be changed at regular intervals is a good idea, using a password manager to orchestrate this makes it so that employees don\u2019t even have to think about it.&nbsp;<\/p>\n\n\n\n<p>Remember, it doesn\u2019t matter how a hacker gets into your systems. Once they are there, you are on the hook for any damage they cause or havoc they wreak.<\/p>\n\n\n\n<p>On the flip side, this should also serve as a lesson to businesses everywhere: Don\u2019t collect information you don\u2019t need! Not only does this protect your business, but it protects your customers and it helps protect other businesses that may not have stringent security protocols or training programs for employees.<\/p>\n\n\n\n<p>We are in the thick of the Age of Information, where the more information you have, the higher you are on the food chain. Big data is big business and big tech runs the world. Data privacy is coming to the forefront, though, and consumers are ready to keep their information safe. As a business owner or business leader, be sure to take notice. Listen to your customers, clients, business partners and employees. Understand that no one wants their information shared with unauthorized parties, and if they are sharing information with you, they are trusting you to keep it safe.<\/p>\n\n\n\n<p>Last week, President Biden <a href=\"https:\/\/www.pwvconsultants.com\/blog\/net-neutrality-restored-by-executive-order\/\" target=\"_blank\" rel=\"noreferrer noopener\">signed an executive order<\/a> promoting competition among businesses. Small and medium sized businesses will see a big benefit from this, so it\u2019s important that those businesses especially look at their data storage and security methods. Make sure you\u2019re ready to scale as business picks up and that you aren\u2019t caught off guard. Bring in an expert now, someone who can ensure you have the proper storage solutions in place and that security is where it needs to be. You\u2019re responsible for the data you collect, so make sure you\u2019re ready!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In the Age of Information, data privacy is a major concern for everyone. Consumer&#8217;s lack of control over data poses a problem for businesses.<\/p>\n","protected":false},"author":1,"featured_media":2146,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[1969,2299,2134],"tags":[36,925,1822,1763,570,2383,1820,17,571],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.2 (Yoast SEO v22.2) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Data Privacy in the Age of Information - PWV Consultants<\/title>\n<meta name=\"description\" content=\"In the Age of Information, data privacy is a major concern for everyone. Consumer&#039;s lack of control over data poses a problem for businesses.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pwvconsultants.com\/blog\/data-privacy-in-the-age-of-information\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Data Privacy in the Age of Information\" \/>\n<meta property=\"og:description\" content=\"In the Age of Information, data privacy is a major concern for everyone. Consumer&#039;s lack of control over data poses a problem for businesses.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pwvconsultants.com\/blog\/data-privacy-in-the-age-of-information\/\" \/>\n<meta property=\"og:site_name\" content=\"PWV Consultants\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\" \/>\n<meta property=\"article:published_time\" content=\"2021-07-20T18:57:34+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-07-20T18:57:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/07\/Data-Privacy-Information-Age-scaled.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1697\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Pieter VanIperen\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:site\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Pieter VanIperen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/data-privacy-in-the-age-of-information\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/data-privacy-in-the-age-of-information\/\"},\"author\":{\"name\":\"Pieter VanIperen\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\"},\"headline\":\"Data Privacy in the Age of Information\",\"datePublished\":\"2021-07-20T18:57:34+00:00\",\"dateModified\":\"2021-07-20T18:57:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/data-privacy-in-the-age-of-information\/\"},\"wordCount\":812,\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/data-privacy-in-the-age-of-information\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/07\/Data-Privacy-Information-Age-scaled.jpeg\",\"keywords\":[\"Business\",\"data\",\"data privacy\",\"data storage\",\"Information\",\"information sharing\",\"privacy\",\"Security\",\"technology\"],\"articleSection\":[\"Business\",\"Data\",\"Privacy\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/data-privacy-in-the-age-of-information\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/data-privacy-in-the-age-of-information\/\",\"name\":\"Data Privacy in the Age of Information - PWV Consultants\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/data-privacy-in-the-age-of-information\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/data-privacy-in-the-age-of-information\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/07\/Data-Privacy-Information-Age-scaled.jpeg\",\"datePublished\":\"2021-07-20T18:57:34+00:00\",\"dateModified\":\"2021-07-20T18:57:36+00:00\",\"description\":\"In the Age of Information, data privacy is a major concern for everyone. Consumer's lack of control over data poses a problem for businesses.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/data-privacy-in-the-age-of-information\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.pwvconsultants.com\/blog\/data-privacy-in-the-age-of-information\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/data-privacy-in-the-age-of-information\/#primaryimage\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/07\/Data-Privacy-Information-Age-scaled.jpeg\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/07\/Data-Privacy-Information-Age-scaled.jpeg\",\"width\":2560,\"height\":1697,\"caption\":\"privacy, information leak and cybersecurity concept, protection of private data, emails and documents, virtual diagram with icons\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/data-privacy-in-the-age-of-information\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.pwvconsultants.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Data Privacy in the Age of Information\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"name\":\"PWV Consultants\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\",\"name\":\"PWV Consultants\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"width\":98,\"height\":84,\"caption\":\"PWV Consultants\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\",\"https:\/\/twitter.com\/PWV_Consultants\",\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\",\"name\":\"Pieter VanIperen\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"caption\":\"Pieter VanIperen\"},\"description\":\"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Data Privacy in the Age of Information - PWV Consultants","description":"In the Age of Information, data privacy is a major concern for everyone. Consumer's lack of control over data poses a problem for businesses.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pwvconsultants.com\/blog\/data-privacy-in-the-age-of-information\/","og_locale":"en_US","og_type":"article","og_title":"Data Privacy in the Age of Information","og_description":"In the Age of Information, data privacy is a major concern for everyone. Consumer's lack of control over data poses a problem for businesses.","og_url":"https:\/\/www.pwvconsultants.com\/blog\/data-privacy-in-the-age-of-information\/","og_site_name":"PWV Consultants","article_publisher":"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","article_published_time":"2021-07-20T18:57:34+00:00","article_modified_time":"2021-07-20T18:57:36+00:00","og_image":[{"width":2560,"height":1697,"url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/07\/Data-Privacy-Information-Age-scaled.jpeg","type":"image\/jpeg"}],"author":"Pieter VanIperen","twitter_card":"summary_large_image","twitter_creator":"@PWV_Consultants","twitter_site":"@PWV_Consultants","twitter_misc":{"Written by":"Pieter VanIperen","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pwvconsultants.com\/blog\/data-privacy-in-the-age-of-information\/#article","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/data-privacy-in-the-age-of-information\/"},"author":{"name":"Pieter VanIperen","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4"},"headline":"Data Privacy in the Age of Information","datePublished":"2021-07-20T18:57:34+00:00","dateModified":"2021-07-20T18:57:36+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/data-privacy-in-the-age-of-information\/"},"wordCount":812,"publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/data-privacy-in-the-age-of-information\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/07\/Data-Privacy-Information-Age-scaled.jpeg","keywords":["Business","data","data privacy","data storage","Information","information sharing","privacy","Security","technology"],"articleSection":["Business","Data","Privacy"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.pwvconsultants.com\/blog\/data-privacy-in-the-age-of-information\/","url":"https:\/\/www.pwvconsultants.com\/blog\/data-privacy-in-the-age-of-information\/","name":"Data Privacy in the Age of Information - PWV Consultants","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/data-privacy-in-the-age-of-information\/#primaryimage"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/data-privacy-in-the-age-of-information\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/07\/Data-Privacy-Information-Age-scaled.jpeg","datePublished":"2021-07-20T18:57:34+00:00","dateModified":"2021-07-20T18:57:36+00:00","description":"In the Age of Information, data privacy is a major concern for everyone. Consumer's lack of control over data poses a problem for businesses.","breadcrumb":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/data-privacy-in-the-age-of-information\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pwvconsultants.com\/blog\/data-privacy-in-the-age-of-information\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/data-privacy-in-the-age-of-information\/#primaryimage","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/07\/Data-Privacy-Information-Age-scaled.jpeg","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/07\/Data-Privacy-Information-Age-scaled.jpeg","width":2560,"height":1697,"caption":"privacy, information leak and cybersecurity concept, protection of private data, emails and documents, virtual diagram with icons"},{"@type":"BreadcrumbList","@id":"https:\/\/www.pwvconsultants.com\/blog\/data-privacy-in-the-age-of-information\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pwvconsultants.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Data Privacy in the Age of Information"}]},{"@type":"WebSite","@id":"https:\/\/www.pwvconsultants.com\/blog\/#website","url":"https:\/\/www.pwvconsultants.com\/blog\/","name":"PWV Consultants","description":"","publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization","name":"PWV Consultants","url":"https:\/\/www.pwvconsultants.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","width":98,"height":84,"caption":"PWV Consultants"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","https:\/\/twitter.com\/PWV_Consultants","https:\/\/www.linkedin.com\/company\/pwv-consultants"]},{"@type":"Person","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4","name":"Pieter VanIperen","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","caption":"Pieter VanIperen"},"description":"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.","sameAs":["https:\/\/www.linkedin.com\/company\/pwv-consultants"]}]}},"_links":{"self":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/2132"}],"collection":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/comments?post=2132"}],"version-history":[{"count":5,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/2132\/revisions"}],"predecessor-version":[{"id":2150,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/2132\/revisions\/2150"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media\/2146"}],"wp:attachment":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media?parent=2132"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/categories?post=2132"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/tags?post=2132"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}