{"id":33339,"date":"2023-09-07T11:06:18","date_gmt":"2023-09-07T18:06:18","guid":{"rendered":"https:\/\/insidebigdata.com\/?p=33339"},"modified":"2023-09-07T11:06:20","modified_gmt":"2023-09-07T18:06:20","slug":"navigating-data-lake-challenges-governance-security-and-gdpr-compliance","status":"publish","type":"post","link":"https:\/\/insidebigdata.com\/2023\/09\/07\/navigating-data-lake-challenges-governance-security-and-gdpr-compliance\/","title":{"rendered":"Navigating Data Lake Challenges: Governance, Security, and GDPR Compliance"},"content":{"rendered":"\n<p>Data lakes are becoming a crucial strategy for data management, with 62% of organizations in the production, proof-of-concept or pilot stage with their data lakes. Another 25% of organizations indicate they plan to implement a data lake within three years, according to\u00a0<a href=\"https:\/\/www.spglobal.com\/marketintelligence\/en\/news-insights\/research\/cloud-permeates-nearly-every-facet-of-data-platforms-technology\" target=\"_blank\" rel=\"noreferrer noopener\">451 Research<\/a>.\u00a0<a href=\"https:\/\/insidebigdata.com\/2022\/04\/29\/data-virtualizations-ubiquity-data-meshes-data-products-data-lake-houses-data-fabrics\/\" target=\"_blank\" rel=\"noreferrer noopener\">Data lakes<\/a>\u00a0enable organizations to store and analyze diverse data from multiple applications with unmatched flexibility. But that flexibility also makes it much harder to find specific data across applications and support governance and GDPR compliance. A single Right to Be Forgotten request can require searching multiple databases while using extensive compute resources. Using data effectively is even more challenging when organizations land their data in an unstructured form without creating the infrastructure to manage that data down the road. Here are a few areas to focus on to make a data lake more useful.<\/p>\n\n\n\n<p><strong>Data Lake Challenges<\/strong><\/p>\n\n\n\n<ul>\n<li>Governance: Despite the flexibility of data lakes, governance is still crucial for efficient data management. You can&#8217;t just toss all your clothes into a closet and expect to find your favorite shirt instantly. In this sense, structured data needs proper organization. Implementing governance measures allows for features like Time Travel to compare older versions while ensuring database compliance with ACID principles.<\/li>\n<\/ul>\n\n\n\n<ul>\n<li>Security: Cloud-based data lakes alleviate some of the security concerns with older on-premises Hadoop solutions which required frequent maintenance and updates. Cloud service providers have large teams focused on data security and access controls, meaning their customers benefit from enhanced protection against data leaks and unauthorized access. Managing responsibilities like access rights, logging and data backups are shifted to the cloud service provider, reducing the burden on companies to process these requests.<\/li>\n<\/ul>\n\n\n\n<ul>\n<li>GDPR Compliance: For many companies, GDPR compliance is focused on fulfilling Right to Be Forgotten requests. Identifying all information associated with a particular individual can be a daunting task. Instead of manual searches across multiple databases, a metadata catalog provides a more efficient approach. These catalogs enable data teams to access comprehensive metadata and quickly locate relevant information, simplifying compliance with data deletion requests.<\/li>\n<\/ul>\n\n\n\n<ul>\n<li>Analytics: Data lakes have a significant advantage over older technologies with their ability to combine and analyze diverse data sets simultaneously. Combining data from sources such as Salesforce, AWS Dynamo DB and Marketo in one place offers unique insights. However, to achieve meaningful analysis, organizations require a metadata catalog, such as AWS Glue Data Catalog, or similar offerings from Google or Microsoft. These catalogs organize unstructured data within the data lake, making it much easier to combine relevant datasets in a meaningful way without extensive data processing.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul>\n<li>Access Control: Access control is crucial to ensure data confidentiality and compliance with privacy regulations. While analysts may require access to customer data for specific projects, they should only access relevant information for that research, not all of a customer\u2019s data. Metadata catalogs play a pivotal role in controlling access, allowing organizations to provide access to necessary data while protecting sensitive information. By enabling aggregated usage of personally identifiable information (PII), companies can strike a balance between data accessibility and privacy.<\/li>\n<\/ul>\n\n\n\n<p><strong>Leveraging Data Catalogs for Optimal Data Lake Management<\/strong><\/p>\n\n\n\n<p>I mentioned how a robust data catalog can be the most effective solution to handle GDPR, analytics and access challenges. A data catalog provides valuable metadata insights into user access history, tracking the most recent information and enabling efficient troubleshooting. I\u2019ve seen many organizations that have recently adopted data lakes skimp when it comes to deploying a data catalog, and this just causes issues down the road.&nbsp;<\/p>\n\n\n\n<p>A data catalog will add an incremental cost in terms of logging, but when it comes time to utilize disparate data sources or identify specific records across applications, a catalog makes a data lake an order of magnitude more useful. The small incremental cost of implementing a data catalog yields significant benefits and value in terms of time saved, especially for handling individual user record retrieval after data deletion requests and managing customer data from multiple applications.<\/p>\n\n\n\n<p>Data lakes offer significant advantages in data management, enabling organizations to flexibly store and analyze diverse data. However, organizations must prioritize key areas such as governance, security, GDPR compliance, analytics, and access control to overcome the challenges associated with data lakes. Deploying a robust data catalog provides invaluable metadata insights, simplifying compliance with data deletion requests and facilitating efficient data discovery. By embracing data catalogs, organizations can fully harness the power of their data lakes, unlocking valuable insights while ensuring security, compliance and efficient data management.<\/p>\n\n\n\n<p><strong>About the Author<\/strong><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"alignleft size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"125\" height=\"176\" src=\"https:\/\/insidebigdata.com\/wp-content\/uploads\/2023\/09\/Coral-Trivedi-Fivetran.jpg\" alt=\"\" class=\"wp-image-33340\" srcset=\"https:\/\/insidebigdata.com\/wp-content\/uploads\/2023\/09\/Coral-Trivedi-Fivetran.jpg 125w, https:\/\/insidebigdata.com\/wp-content\/uploads\/2023\/09\/Coral-Trivedi-Fivetran-107x150.jpg 107w\" sizes=\"(max-width: 125px) 100vw, 125px\" \/><\/figure><\/div>\n\n\n<p><em>Coral Trivedi is a Product Manager at <a href=\"http:\/\/fivetran.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Fivetran<\/a> where she works on making access to data as simple and reliable as electricity by building out Data Lake and Cloud Data Warehouse destinations.<\/em><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><em>Sign up for the free insideBIGDATA\u00a0<a href=\"http:\/\/inside-bigdata.com\/newsletter\/\" target=\"_blank\" rel=\"noreferrer noopener\">newsletter<\/a>.<\/em><\/p>\n\n\n\n<p><em>Join us on Twitter:&nbsp;<a href=\"https:\/\/twitter.com\/InsideBigData1\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/twitter.com\/InsideBigData1<\/a><\/em><\/p>\n\n\n\n<p><em>Join us on LinkedIn:&nbsp;<a href=\"https:\/\/www.linkedin.com\/company\/insidebigdata\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.linkedin.com\/company\/insidebigdata\/<\/a><\/em><\/p>\n\n\n\n<p><em>Join us on Facebook:&nbsp;<a href=\"https:\/\/www.facebook.com\/insideBIGDATANOW\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.facebook.com\/insideBIGDATANOW<\/a><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In this contributed article, Coral Trivedi, Product Manager at Fivetran, discusses how enterprises can get the most value from a data lake. The article discusses automation, security, pipelines and GSPR compliance issues. <\/p>\n","protected":false},"author":10531,"featured_media":33048,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"footnotes":""},"categories":[115,68,180,268,56,97,1],"tags":[331,336,367,588,110,96],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Navigating Data Lake Challenges: Governance, Security, and GDPR Compliance - insideBIGDATA<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/insidebigdata.com\/2023\/09\/07\/navigating-data-lake-challenges-governance-security-and-gdpr-compliance\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Navigating Data Lake Challenges: Governance, Security, and GDPR Compliance - insideBIGDATA\" \/>\n<meta property=\"og:description\" content=\"In this contributed article, Coral Trivedi, Product Manager at Fivetran, discusses how enterprises can get the most value from a data lake. The article discusses automation, security, pipelines and GSPR compliance issues.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/insidebigdata.com\/2023\/09\/07\/navigating-data-lake-challenges-governance-security-and-gdpr-compliance\/\" \/>\n<meta property=\"og:site_name\" content=\"insideBIGDATA\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/www.facebook.com\/insidebigdata\" \/>\n<meta property=\"article:published_time\" content=\"2023-09-07T18:06:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-09-07T18:06:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/insidebigdata.com\/wp-content\/uploads\/2023\/08\/Data_center_shutterstock_1062915266_special.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1100\" \/>\n\t<meta property=\"og:image:height\" content=\"550\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Contributor\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@insideBigData\" \/>\n<meta name=\"twitter:site\" content=\"@insideBigData\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Contributor\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/insidebigdata.com\/2023\/09\/07\/navigating-data-lake-challenges-governance-security-and-gdpr-compliance\/\",\"url\":\"https:\/\/insidebigdata.com\/2023\/09\/07\/navigating-data-lake-challenges-governance-security-and-gdpr-compliance\/\",\"name\":\"Navigating Data Lake Challenges: Governance, Security, and GDPR Compliance - insideBIGDATA\",\"isPartOf\":{\"@id\":\"https:\/\/insidebigdata.com\/#website\"},\"datePublished\":\"2023-09-07T18:06:18+00:00\",\"dateModified\":\"2023-09-07T18:06:20+00:00\",\"author\":{\"@id\":\"https:\/\/insidebigdata.com\/#\/schema\/person\/35a290930284d4cdbf002d457f3d5d87\"},\"breadcrumb\":{\"@id\":\"https:\/\/insidebigdata.com\/2023\/09\/07\/navigating-data-lake-challenges-governance-security-and-gdpr-compliance\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/insidebigdata.com\/2023\/09\/07\/navigating-data-lake-challenges-governance-security-and-gdpr-compliance\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/insidebigdata.com\/2023\/09\/07\/navigating-data-lake-challenges-governance-security-and-gdpr-compliance\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/insidebigdata.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Navigating Data Lake Challenges: Governance, Security, and GDPR Compliance\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/insidebigdata.com\/#website\",\"url\":\"https:\/\/insidebigdata.com\/\",\"name\":\"insideBIGDATA\",\"description\":\"Your Source for AI, Data Science, Deep Learning &amp; Machine Learning Strategies\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/insidebigdata.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/insidebigdata.com\/#\/schema\/person\/35a290930284d4cdbf002d457f3d5d87\",\"name\":\"Contributor\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/insidebigdata.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/36bffd267e38ed3f525205f67270e91b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/36bffd267e38ed3f525205f67270e91b?s=96&d=mm&r=g\",\"caption\":\"Contributor\"},\"url\":\"https:\/\/insidebigdata.com\/author\/contributor\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Navigating Data Lake Challenges: Governance, Security, and GDPR Compliance - insideBIGDATA","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/insidebigdata.com\/2023\/09\/07\/navigating-data-lake-challenges-governance-security-and-gdpr-compliance\/","og_locale":"en_US","og_type":"article","og_title":"Navigating Data Lake Challenges: Governance, Security, and GDPR Compliance - insideBIGDATA","og_description":"In this contributed article, Coral Trivedi, Product Manager at Fivetran, discusses how enterprises can get the most value from a data lake. The article discusses automation, security, pipelines and GSPR compliance issues.","og_url":"https:\/\/insidebigdata.com\/2023\/09\/07\/navigating-data-lake-challenges-governance-security-and-gdpr-compliance\/","og_site_name":"insideBIGDATA","article_publisher":"http:\/\/www.facebook.com\/insidebigdata","article_published_time":"2023-09-07T18:06:18+00:00","article_modified_time":"2023-09-07T18:06:20+00:00","og_image":[{"width":1100,"height":550,"url":"https:\/\/insidebigdata.com\/wp-content\/uploads\/2023\/08\/Data_center_shutterstock_1062915266_special.jpg","type":"image\/jpeg"}],"author":"Contributor","twitter_card":"summary_large_image","twitter_creator":"@insideBigData","twitter_site":"@insideBigData","twitter_misc":{"Written by":"Contributor","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/insidebigdata.com\/2023\/09\/07\/navigating-data-lake-challenges-governance-security-and-gdpr-compliance\/","url":"https:\/\/insidebigdata.com\/2023\/09\/07\/navigating-data-lake-challenges-governance-security-and-gdpr-compliance\/","name":"Navigating Data Lake Challenges: Governance, Security, and GDPR Compliance - insideBIGDATA","isPartOf":{"@id":"https:\/\/insidebigdata.com\/#website"},"datePublished":"2023-09-07T18:06:18+00:00","dateModified":"2023-09-07T18:06:20+00:00","author":{"@id":"https:\/\/insidebigdata.com\/#\/schema\/person\/35a290930284d4cdbf002d457f3d5d87"},"breadcrumb":{"@id":"https:\/\/insidebigdata.com\/2023\/09\/07\/navigating-data-lake-challenges-governance-security-and-gdpr-compliance\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/insidebigdata.com\/2023\/09\/07\/navigating-data-lake-challenges-governance-security-and-gdpr-compliance\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/insidebigdata.com\/2023\/09\/07\/navigating-data-lake-challenges-governance-security-and-gdpr-compliance\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/insidebigdata.com\/"},{"@type":"ListItem","position":2,"name":"Navigating Data Lake Challenges: Governance, Security, and GDPR Compliance"}]},{"@type":"WebSite","@id":"https:\/\/insidebigdata.com\/#website","url":"https:\/\/insidebigdata.com\/","name":"insideBIGDATA","description":"Your Source for AI, Data Science, Deep Learning &amp; Machine Learning Strategies","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/insidebigdata.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/insidebigdata.com\/#\/schema\/person\/35a290930284d4cdbf002d457f3d5d87","name":"Contributor","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/insidebigdata.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/36bffd267e38ed3f525205f67270e91b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/36bffd267e38ed3f525205f67270e91b?s=96&d=mm&r=g","caption":"Contributor"},"url":"https:\/\/insidebigdata.com\/author\/contributor\/"}]}},"jetpack_featured_media_url":"https:\/\/insidebigdata.com\/wp-content\/uploads\/2023\/08\/Data_center_shutterstock_1062915266_special.jpg","jetpack_shortlink":"https:\/\/wp.me\/p9eA3j-8FJ","jetpack-related-posts":[{"id":22539,"url":"https:\/\/insidebigdata.com\/2019\/04\/27\/okera-introduces-attribute-based-access-control-for-data-lake-security-and-access-management\/","url_meta":{"origin":33339,"position":0},"title":"Okera Introduces Attribute-Based Access Control for Data Lake Security and Access Management","date":"April 27, 2019","format":false,"excerpt":"Okera, a leading active data management company for data lake security and governance, announced the release of new attribute-based access control (ABAC) and automated business metadata tagging and policy enforcement capabilities. These new features help enterprises simplify how to manage, secure, and govern data access on data lakes at scale\u2026","rel":"","context":"In &quot;Big Data&quot;","img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":19743,"url":"https:\/\/insidebigdata.com\/2018\/01\/11\/interview-joe-pasqua-executive-vice-president-products-marklogic-2\/","url_meta":{"origin":33339,"position":1},"title":"Interview: Joe Pasqua, Executive Vice President of Products at MarkLogic","date":"January 11, 2018","format":false,"excerpt":"I recently spoke with Joe Pasqua, Executive Vice President of Products at MarkLogic. Our discussion touched on a number of related issues, including the importance of effective data integration as organizations\u2019 work to implement initiatives as broad as digital transformation and as specific as compliance with the new General Data\u2026","rel":"","context":"In &quot;Big Data&quot;","img":{"alt_text":"","src":"https:\/\/i0.wp.com\/insidebigdata.com\/wp-content\/uploads\/2016\/11\/Joe-Pasqua.jpg?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":20478,"url":"https:\/\/insidebigdata.com\/2018\/05\/27\/arcadia-data-drives-gdpr-compliance-modern-data-lake-bi-architecture\/","url_meta":{"origin":33339,"position":2},"title":"Arcadia Data Drives GDPR Compliance With Modern Data Lake BI Architecture","date":"May 27, 2018","format":false,"excerpt":"Arcadia Data, provider of the visual analytics and BI software native to big data, announced that its flagship product, Arcadia Enterprise, which is defining the next era of analytics and BI for data lakes, offers capabilities that help address compliance for the General Data Protection Regulation (GDPR) through its robust\u2026","rel":"","context":"In &quot;Big Data&quot;","img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":32768,"url":"https:\/\/insidebigdata.com\/2023\/07\/04\/why-do-we-prefer-elt-rather-than-etl-in-the-data-lake-what-is-the-difference-between-etl-elt\/","url_meta":{"origin":33339,"position":3},"title":"Why Do We Prefer ELT Rather than ETL in the Data Lake? What is the Difference between ETL &#038; ELT","date":"July 4, 2023","format":false,"excerpt":"In this article, Ashutosh Kumar discusses the emergence of modern data solutions that have led to the development of ELT and ETL with unique features and advantages. ELT is more popular due to its ability to handle large and unstructured datasets like in data lakes. Traditional ETL has evolved into\u2026","rel":"","context":"In &quot;Big Data Software&quot;","img":{"alt_text":"","src":"https:\/\/i0.wp.com\/insidebigdata.com\/wp-content\/uploads\/2019\/10\/data-lakes_SHUTTERSTOCK.jpg?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":18314,"url":"https:\/\/insidebigdata.com\/2017\/07\/09\/informatica-delivers-real-business-outcomes-general-data-protection-regulation-gdpr-automated-data-governance-compliance-enterprise\/","url_meta":{"origin":33339,"position":4},"title":"Informatica Delivers Real Business Outcomes for General Data Protection Regulation (GDPR) with Automated Data Governance &#038; Compliance for the Enterprise","date":"July 9, 2017","format":false,"excerpt":"Informatica\u00ae, the Enterprise Cloud Data Management leader accelerating data-driven digital transformation, announced Informatica Data Governance & Compliance for GDPR, the industry\u2019s first governance solution designed specifically to support customers on their journey to GDPR compliance.","rel":"","context":"In &quot;Big Data&quot;","img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":21202,"url":"https:\/\/insidebigdata.com\/2018\/10\/03\/data-lakes-just-dumping-grounds\/","url_meta":{"origin":33339,"position":5},"title":"Are Data Lakes Just Dumping Grounds?","date":"October 3, 2018","format":false,"excerpt":"In this special guest feature Stan Christiaens, Co-founder and CTO at Collibra, shares strategies to ensure that data moves beyond raw material to take its rightful place as a valuable business asset. The article outlines common problems with data lakes, strategies for how business can avoid those problems, and how\u2026","rel":"","context":"In &quot;Data Storage&quot;","img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"_links":{"self":[{"href":"https:\/\/insidebigdata.com\/wp-json\/wp\/v2\/posts\/33339"}],"collection":[{"href":"https:\/\/insidebigdata.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/insidebigdata.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/insidebigdata.com\/wp-json\/wp\/v2\/users\/10531"}],"replies":[{"embeddable":true,"href":"https:\/\/insidebigdata.com\/wp-json\/wp\/v2\/comments?post=33339"}],"version-history":[{"count":0,"href":"https:\/\/insidebigdata.com\/wp-json\/wp\/v2\/posts\/33339\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/insidebigdata.com\/wp-json\/wp\/v2\/media\/33048"}],"wp:attachment":[{"href":"https:\/\/insidebigdata.com\/wp-json\/wp\/v2\/media?parent=33339"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/insidebigdata.com\/wp-json\/wp\/v2\/categories?post=33339"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/insidebigdata.com\/wp-json\/wp\/v2\/tags?post=33339"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}