{"id":9312,"date":"2015-07-14T10:00:48","date_gmt":"2015-07-14T15:00:48","guid":{"rendered":"http:\/\/www.mrc-productivity.com\/blog\/?p=9312"},"modified":"2022-11-22T16:03:06","modified_gmt":"2022-11-22T22:03:06","slug":"7-more-important-it-trends-of-2015-and-beyond","status":"publish","type":"post","link":"https:\/\/www.mrc-productivity.com\/blog\/2015\/07\/7-more-important-it-trends-of-2015-and-beyond\/","title":{"rendered":"7 (more) important IT trends of 2015 and beyond"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-725\" alt=\"Education\" src=\"https:\/\/www.mrc-productivity.com\/blog\/wp-content\/uploads\/2010\/11\/Education.jpg\" width=\"76\" height=\"100\" \/><span style=\"font-size: 14px;\"><em>Summary: As technology evolves at an ever-increasing pace, it brings major changes to the IT department. In this era, the IT department moves from a back-office function to a true business partner. What trends are driving this change, and how must your IT department adapt? In this article, we examine 7 more trends to watch in the near future. <\/em><br \/><\/span><br \/>\n<a name=\"20150713\"><\/a><!--more--><\/p>\n<p>The role of the IT department is evolving. As technology plays a larger role in business, the IT department is shifting from a back office function into a key business driver. <\/p>\n<p>How is the IT department changing in the near future? What trends can we expect? In the <a onclick=\"_gaq.push(['_trackEvent', 'Blog', 'Inside Link', 'First Part']); \" href=\"https:\/\/www.mrc-productivity.com\/blog\/2015\/06\/5-important-it-trends-moving-forward\/\" target=\"_blank\" rel=\"noopener\"><span style=\"color: red;font-weight: bold\">first part of this article<\/span><\/a>, we explored these 5 key trends:<\/p>\n<ul class=\"arrow-list colored\">\n<li>Pervasive analytics takes center stage<\/li>\n<li>Data security becomes everyone\u2019s job<\/li>\n<li>Small vendors make life hard for the industry giants<\/li>\n<li>The physical workplace becomes less relevant<\/li>\n<li>More responsibilities move outside of IT<\/li>\n<\/ul>\n<p>But, those trends are just the tip of the iceberg. Today, let\u2019s go a step further. What other trends can we expect in 2015 and beyond? Here are 7 important IT trends to watch for in the near future:<\/p>\n<h3>1. IT becomes the \u201ctechnology enabler\u201d<\/h3>\n<blockquote style=\"line-height: 1.7em; background-image: none; margin-left: 0; padding-left: 18px; height: auto;\"><p>\n&#8220;IT is no longer about delivering a technological resource that the business can take advantage of,\u201d says Bobby Dominguez, Chief Strategy and Security Officer, <a onclick=\"_gaq.push(['_trackEvent', 'Blog', 'Source', 'Lynx Technology Partners Inc']); \" href=\"http:\/\/lynxtp.com\/\" target=\"_blank\" rel=\"noopener\"><span style=\"color: red;font-weight: bold\">Lynx Technology Partners, Inc<\/span><\/a>. \u201cThe business is now driving the capabilities it needs and wants, regardless of whether the IT department can deliver the resources. Simply put, IT has shifted from infrastructure delivery, to product delivery, and then services delivery.\u201d\n<\/p><\/blockquote>\n<figure id=\"attachment_9119\" aria-describedby=\"caption-attachment-9119\" style=\"width: 300px\" class=\"wp-caption alignright\"><a href=\"https:\/\/www.mrc-productivity.com\/blog\/wp-content\/uploads\/2015\/05\/system-571182_640.jpg\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.mrc-productivity.com\/blog\/wp-content\/uploads\/2015\/05\/system-571182_640-300x211.jpg\" alt=\"photo credit: geralt via pixabay cc\" width=\"300\" height=\"211\" class=\"size-medium wp-image-9119\" srcset=\"https:\/\/www.mrc-productivity.com\/blog\/wp-content\/uploads\/2015\/05\/system-571182_640-300x211.jpg 300w, https:\/\/www.mrc-productivity.com\/blog\/wp-content\/uploads\/2015\/05\/system-571182_640.jpg 640w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><figcaption id=\"caption-attachment-9119\" class=\"wp-caption-text\">photo credit: <a href=\"http:\/\/pixabay.com\/en\/system-network-news-personal-571182\/\">geralt<\/a> via <a href=\"http:\/\/pixabay.com\/\">pixabay<\/a> <a href=\"http:\/\/creativecommons.org\/publicdomain\/zero\/1.0\/deed.en\">cc<\/a><\/figcaption><\/figure>\n<p>As mentioned above, IT is undergoing a shift. In the past, IT controlled technology because it was scarce, and hard for users to obtain and use. If the business needed hardware or software, they went through IT.<\/p>\n<p>Over the last few years, that has changed. Consumer technology caught and surpassed business technology. Simple, low-cost SaaS options sprung up that offered a better experience than IT-sanctioned software. With these changes, business units are increasingly bypassing IT and obtaining technology on their own.<\/p>\n<p>What can IT do about this? According to Gartner, IT must undergo a fundamental shift. They recently introduced the concept of \u201cBimodal IT,\u201d designed to address these changes. <\/p>\n<p>What does this mean? Bimodal IT refers to having two modes of IT, each designed to develop and deliver information- and technology-intensive services in its own way. Mode 1 is traditional, emphasizing scalability, efficiency, safety and accuracy. Mode 2 is nonsequential, emphasizing agility and speed.<\/p>\n<p>Where does this leave IT? The IT department must shift from \u201ctechnology gatekeeper\u201d to \u201ctechnology enabler.\u201d Rather than control the technology, they must focus on speed, and delivering the capabilities that the business needs. They must become a true business partner, not a separate entity. <\/p>\n<h3>2. The skills gap widens<\/h3>\n<p>A recent <a onclick=\"_gaq.push(['_trackEvent', 'Blog', 'Inside Link', 'skills gap study']); \" href=\"http:\/\/www.wired.com\/wiredenterprise\/wp-content\/uploads\/2012\/03\/Report_-_CompTIA_IT_Skills_Gap_study_-_Full_Report.sflb_.pdf\" target=\"_blank\" rel=\"noopener\"><span style=\"color: red;font-weight: bold\">study<\/span><\/a> finds that 93% of businesses indicate there is an IT skills gap\u2013a substantial shortfall between the supply of qualified IT professionals and the demand for modern IT skills. <\/p>\n<p>The problem: As technology evolves at breakneck speed, this IT skills gap is widening. <\/p>\n<blockquote style=\"line-height: 1.7em; background-image: none; margin-left: 0; padding-left: 18px; height: auto;\"><p>\n\u201cA big change in the IT industry is the overlap of skills needed to succeed,\u201d says Peter Dorotiak, Director at <a onclick=\"_gaq.push(['_trackEvent', 'Blog', 'Source', 'Aspect IT ltd']); \" href=\"http:\/\/www.aspectit.co.uk\/\" target=\"_blank\" rel=\"noopener\"><span style=\"color: red;font-weight: bold\">Aspect IT ltd<\/span><\/a>. \u201cNo longer are clients ringing up and requesting just a new website design, they now need SEO incorporating into this, along with ecommerce functionalities and mobile responsiveness. This means our employees must be experts in all different areas rather than just general IT support and web design.\u201d\n<\/p><\/blockquote>\n<p>The big(ger) problem: The same study finds that the importance of information technology to a company\u2019s overall success is growing. In other words, as technology becomes more important, finding employees with modern technology skills is becoming more challenging.<\/p>\n<p>What does this mean for IT? Businesses must find ways to address this IT skills gap while staying current with the ever-changing tech trends. <\/p>\n<h3>3. The Internet of Things (IoT) brings a data influx<\/h3>\n<figure id=\"attachment_9182\" aria-describedby=\"caption-attachment-9182\" style=\"width: 300px\" class=\"wp-caption alignright\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.mrc-productivity.com\/blog\/wp-content\/uploads\/2015\/06\/waterfall-335985_640-300x199.jpg\" alt=\"photo credit: Snapographic_com via pixabay cc\" width=\"300\" height=\"199\" class=\"size-medium wp-image-9182\" srcset=\"https:\/\/www.mrc-productivity.com\/blog\/wp-content\/uploads\/2015\/06\/waterfall-335985_640-300x199.jpg 300w, https:\/\/www.mrc-productivity.com\/blog\/wp-content\/uploads\/2015\/06\/waterfall-335985_640.jpg 640w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><figcaption id=\"caption-attachment-9182\" class=\"wp-caption-text\">photo credit: <a href=\"http:\/\/pixabay.com\/en\/waterfall-water-level-movement-335985\/\">Snapographic_com<\/a> via <a href=\"http:\/\/pixabay.com\/\">pixabay<\/a> <a href=\"http:\/\/creativecommons.org\/publicdomain\/zero\/1.0\/deed.en\">cc<\/a><\/figcaption><\/figure>\n<p>We hear all about \u201cBig Data,\u201d but where is this data coming from? More and more, it\u2019s coming from web-connected buildings\/objects and device sensors&#8211;a trend that will grow exponentially in the coming years. <\/p>\n<p>As more physical objects connect to the internet, IT departments face a challenge. In the next few years, we\u2019ll see a greater push to capture and harness this data. As explained by <a onclick=\"_gaq.push(['_trackEvent', 'Blog', 'Inside Link', 'IoT']); \" href=\"http:\/\/www.forbes.com\/sites\/howardbaldwin\/2014\/11\/24\/a-match-made-somewhere-big-data-and-the-internet-of-things\/\" target=\"_blank\" rel=\"noopener\"><span style=\"color: red;font-weight: bold\">Forbes<\/span><\/a> \u201cEvery enterprise needs to factor in how the Internet of Things is going to affect them and their business, and must respond by establishing the right infrastructure to support this level of Big Data and analytics. If they don\u2019t, they will fall behind.\u201d<\/p>\n<blockquote style=\"line-height: 1.7em; background-image: none; margin-left: 0; padding-left: 18px; height: auto;\"><p>\n\u201cA significant amount of new devices will continue to be added to the network in keeping with the IoT (Internet of Things),\u201d says David Glenn RCDD, CTS-D, LEED AP BD+C, Systems Designer at <a onclick=\"_gaq.push(['_trackEvent', 'Blog', 'Source', 'The Sextant Group']); \" href=\"http:\/\/thesextantgroup.com\/\" target=\"_blank\" rel=\"noopener\"><span style=\"color: red;font-weight: bold\">The Sextant Group<\/span><\/a>. \u201cNew buildings now have various sensors and devices connected to the network for building automation, management, and monitoring services. These connected &#8220;things&#8221; are now able to communicate and share powerful data that can support meaningful analytics that ultimately can lead to improving and streamlining business operations. In keeping with the consumerization of technology, more items will continually be added to the network. This is especially true as high performance and intelligent buildings require more of these devices. As more devices are added to the network, IT departments must understand who is managing each individual device, their security requirements, and the potential consequences if that device is offline for a period of time.\u201d\n<\/p><\/blockquote>\n<p>What types of data can you extract from web-connected devices, and how will it improve your business? The options are truly limitless. For instance, retailers can track shelf inventory in real-time, office buildings can alert you to energy-saving opportunities, and so much more. You can also find another great example in this <a onclick=\"_gaq.push(['_trackEvent', 'Blog', 'Inside Link', 'Hadoop']); \" href=\"https:\/\/www.mrc-productivity.com\/research\/videos\/video-hadoop.html\" target=\"_blank\" rel=\"noopener\"><span style=\"color: red;font-weight: bold\">webinar on the practical uses of Hadoop<\/span><\/a>. One example highlighted in the webinar explains how machine data pulled from HVAC systems lets users analyze potential problems.<\/p>\n<h3>4. IoT (also) brings new security concerns<\/h3>\n<p>While the Internet of Things provides data that can improve your business, it\u2019s not without risk. Specifically, how do you secure every connected device?<\/p>\n<blockquote style=\"line-height: 1.7em; background-image: none; margin-left: 0; padding-left: 18px; height: auto;\"><p>\n\u201cIn the coming year, we are going to see an increase in the adoption of gadgets, home appliances that connect to the internet,\u201d says Prateek Gianchandani, Security Researcher at the <a onclick=\"_gaq.push(['_trackEvent', 'Blog', 'Source', 'InfoSec Institute']); \" href=\"http:\/\/www.infosecinstitute.com\/\" target=\"_blank\" rel=\"noopener\"><span style=\"color: red;font-weight: bold\">InfoSec Institute<\/span><\/a>. \u201cHowever, in addition to the convenience it offers us, it also increases the attack surface for the hacker. This year, there have been a number of attacks demonstrated in conferences worldwide showing attacks on these embedded devices. Also, some of these devices might not even support software upgrades, which makes it even more vulnerable. These devices could be potentially used to install trojans on the network, install malware and ransomware, deliver unwanted ads etc. Security of Internet of things is worth keeping a close eye on for 2015.\u201d\n<\/p><\/blockquote>\n<p>Now, some IT leaders view IoT security as a consumer issue&#8211;not a problem they need to worry about. Will the Internet of Things affect IT departments in the near future? Absolutely! According to a recent <a onclick=\"_gaq.push(['_trackEvent', 'Blog', 'Inside Link', 'Datamation']); \" href=\"http:\/\/www.datamation.com\/networks\/internet-of-things-to-revolutionize-the-it-department-idc.html\" target=\"_blank\" rel=\"noopener\"><span style=\"color: red;font-weight: bold\">report<\/span><\/a> from IDC, the Internet of Things will revolutionize IT in the next few years. It\u2019s not a trend you can afford to ignore.<\/p>\n<blockquote style=\"line-height: 1.7em; background-image: none; margin-left: 0; padding-left: 18px; height: auto;\"><p>\n&#8220;Bottom-line, while everyone is looking at IoT as a consumer security problem, it presents numerous challenges for the enterprise,&#8221; said Trevor Daughney, Executive Vice President at <a onclick=\"_gaq.push(['_trackEvent', 'Blog', 'Source', 'Inside Secure']); \" href=\"http:\/\/www.insidesecure.com\/\" target=\"_blank\" rel=\"noopener\"><span style=\"color: red;font-weight: bold\">Inside Secure<\/span><\/a>. &#8220;Whether or not IT leaders want to consider the impacts to their enterprise, it will not be a choice &#8211; their job description moving forward will look a whole lot different.&#8221;\n<\/p><\/blockquote>\n<h3>5. Attacks on legacy software increase<\/h3>\n<figure id=\"attachment_8550\" aria-describedby=\"caption-attachment-8550\" style=\"width: 300px\" class=\"wp-caption alignright\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.mrc-productivity.com\/blog\/wp-content\/uploads\/2014\/10\/crocodile-195783_640-300x225.jpg\" alt=\"photo credit: Eelffica via pixabay cc\" width=\"300\" height=\"225\" class=\"size-medium wp-image-8550\" srcset=\"https:\/\/www.mrc-productivity.com\/blog\/wp-content\/uploads\/2014\/10\/crocodile-195783_640-300x225.jpg 300w, https:\/\/www.mrc-productivity.com\/blog\/wp-content\/uploads\/2014\/10\/crocodile-195783_640.jpg 640w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><figcaption id=\"caption-attachment-8550\" class=\"wp-caption-text\">photo credit: <a href=\"http:\/\/pixabay.com\/en\/crocodile-alligator-dangerous-195783\/\">Eelffica<\/a> via <a href=\"http:\/\/pixabay.com\/\">pixabay<\/a> <a href=\"http:\/\/creativecommons.org\/publicdomain\/zero\/1.0\/deed.en\">cc<\/a><\/figcaption><\/figure>\n<p>Many businesses still run their operations on software created 20-30 years ago. Why don\u2019t they replace these legacy systems? Oftentimes, they\u2019re locked down. Past customizations have locked the business into a specific software, or version. Replacing these systems comes with considerable cost and risk.<\/p>\n<p>But, how much do these <a onclick=\"_gaq.push(['_trackEvent', 'Blog', 'Inside Link', 'Legacy Apps Cost']); \" href=\"https:\/\/www.mrc-productivity.com\/blog\/2015\/03\/whats-the-true-cost-of-your-legacy-applications\/\" target=\"_blank\" rel=\"noopener\"><span style=\"color: red;font-weight: bold\">legacy systems truly cost the business<\/span><\/a>? As explained below, security is one cost of legacy systems that is often overlooked. Attackers are targeting known vulnerabilities in older software&#8211;a practice which you can expect more of in the coming years.<\/p>\n<blockquote style=\"line-height: 1.7em; background-image: none; margin-left: 0; padding-left: 18px; height: auto;\"><p>\n\u201cIn 2014, we had two major vulnerabilities with the names of Heartbleed and Shellshock, one of which targeted a weakness in the OpenSSL cryptographic library and the other one in the Unix Bash shell,\u201d says Gianchandani. \u201cThese are softwares we have been dependent on since a long time and any vulnerability in these softwares could potentially have a very huge target base. Attackers have already recognized this fact and we can expect more of such vulnerabilities discovered in the coming year.\u201d\n<\/p><\/blockquote>\n<h3>6. Business gravitate towards the hybrid cloud<\/h3>\n<figure id=\"attachment_8304\" aria-describedby=\"caption-attachment-8304\" style=\"width: 240px\" class=\"wp-caption alignright\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.mrc-productivity.com\/blog\/wp-content\/uploads\/2014\/09\/small_8772045680.jpg\" alt=\"photo credit: FutUndBeidl via photopin cc\" width=\"240\" height=\"135\" class=\"size-full wp-image-8304\" \/><figcaption id=\"caption-attachment-8304\" class=\"wp-caption-text\">photo credit: <a href=\"https:\/\/www.flickr.com\/photos\/61423903@N06\/8772045680\/\">FutUndBeidl<\/a> via <a href=\"http:\/\/photopin.com\">photopin<\/a> <a href=\"http:\/\/creativecommons.org\/licenses\/by\/2.0\/\">cc<\/a><\/figcaption><\/figure>\n<p>While many businesses are migrating some data\/services to the public cloud, few are going all in. With security concerns surrounding cloud computing, many opt for a \u201chybrid cloud\u201d approach&#8211;a combination of public and private cloud services. <\/p>\n<p>In a growing trend, we\u2019ll see this approach become more popular in the coming years. In fact, <a onclick=\"_gaq.push(['_trackEvent', 'Blog', 'Inside Link', 'Gartner predicts']); \" href=\"http:\/\/www.gartner.com\/newsroom\/id\/2599315\" target=\"_blank\" rel=\"noopener\"><span style=\"color: red;font-weight: bold\">Gartner predicts<\/span><\/a> that by the end of 2017, nearly half of large enterprises will have hybrid cloud deployments.<\/p>\n<blockquote style=\"line-height: 1.7em; background-image: none; margin-left: 0; padding-left: 18px; height: auto;\"><p>\n\u201cCompanies will continue to migrate to public cloud solutions due to the many benefits they provide, including cost-effectiveness, improved quality of service and performance, and gains in agility and speed in implementation of solutions,\u201d says Adam Simpson, CEO\/co-founder of <span style=\"color: red;font-weight: bold\">Easy Office Phone<\/span>. \u201cHowever, many mid-size businesses have not yet completely transitioned to cloud computing due to fears about cyber security, loss of control of their data, and sharing their data space within a public cloud solution. Companies that have specialized Line of Business Apps (LOB), compliance requirements or sensitive customer data need the redundancy and uptime of a public cloud solution, but the security of a private network. In 2015, prices will drop for online storage and data transfers, which will cause SMBs \u2013 particularly those that prefer not to use a public solution due to risks of sharing physical resources \u2013 to take a second look at hosted private cloud solutions.\u201d\n<\/p><\/blockquote>\n<h3>7. IT Automation takes off<\/h3>\n<p>More than ever, IT groups face more pressure to reduce costs and show business value. Combine this fact with the increase of web-connected devices, and we see a big trend emerging: IT automation. IT automation is the linking of disparate systems and software in such a way that they become self-acting or self-regulating. <\/p>\n<p>The opportunities in this area are limitless. Just imagine: Now, you can automate actions based on nearly any event, using software or hardware based triggers. This growth will not only drive down IT costs, it will improve productivity.<\/p>\n<blockquote style=\"line-height: 1.7em; background-image: none; margin-left: 0; padding-left: 18px; height: auto;\"><p>\n\u201cOne important IT trend we&#8217;re seeing is IT Automation,\u201d says Kim Terca, Director of UX and PR, <a onclick=\"_gaq.push(['_trackEvent', 'Blog', 'Source', 'Netvibes']); \" href=\"http:\/\/www.netvibes.com\/en\" target=\"_blank\" rel=\"noopener\"><span style=\"color: red;font-weight: bold\">Netvibes<\/span><\/a>. \u201cWith the Internet of Things, remote-controlling your thermostat is just the tip of the iceberg. The real magic lies in *automatic interactions* between data, events and devices. By selecting the Trigger(s) and Action(s), the enterprise can create &#8220;Potions&#8221; that automate almost any digital activity, without the need for IT intervention.\u201d<\/p>\n<p>&#8220;For example:<\/p>\n<p>*When the website goes down:* email the IT team, text the administrator, and automatically begin the reboot process through SSH.<\/p>\n<p>*When a DDoS attack is detected:* automatically block packets from that source, and send mobile alerts to the IT team using PushBullet.&#8221;\n<\/p><\/blockquote>\n<p>While those are some great examples, the opportunities are truly limitless. This could range from automatic email replies based on customer actions, to automatic shutdown when a device overheats, and everything in between. As more and more devices connect to the web, your automation opportunities expand greatly. <\/p>\n<h3>Summary<\/h3>\n<p>Now, these are just a few important IT trends you can expect to see in the near future, but these are just the tip of the iceberg. If you would like to add anything to this list, I\u2019d love to hear it. Feel free to share in the comments.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Summary: As technology evolves at an ever-increasing pace, it brings major changes to the IT department. In this era, the IT department moves from a back-office function to a true business partner. What trends are driving this change, and how must your IT department adapt? In this article, we examine 7 more trends to watch &hellip;<\/p>\n<p class=\"read-more\"> <a class=\"\" href=\"https:\/\/www.mrc-productivity.com\/blog\/2015\/07\/7-more-important-it-trends-of-2015-and-beyond\/\"> <span class=\"screen-reader-text\">7 (more) important IT trends of 2015 and beyond<\/span> Read More &raquo;<\/a><\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"default","ast-global-header-display":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","slim_seo":{"title":"7 (more) important IT trends of 2015 and beyond - mrc&#039;s Cup of Joe Blog","description":"Summary: As technology evolves at an ever-increasing pace, it brings major changes to the IT department. In this era, the IT department moves from a back-office"},"footnotes":""},"categories":[8],"tags":[81,33],"class_list":["post-9312","post","type-post","status-publish","format-standard","hentry","category-education","tag-cio-challenges","tag-tech-trends"],"_links":{"self":[{"href":"https:\/\/www.mrc-productivity.com\/blog\/wp-json\/wp\/v2\/posts\/9312","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mrc-productivity.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mrc-productivity.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mrc-productivity.com\/blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mrc-productivity.com\/blog\/wp-json\/wp\/v2\/comments?post=9312"}],"version-history":[{"count":17,"href":"https:\/\/www.mrc-productivity.com\/blog\/wp-json\/wp\/v2\/posts\/9312\/revisions"}],"predecessor-version":[{"id":14127,"href":"https:\/\/www.mrc-productivity.com\/blog\/wp-json\/wp\/v2\/posts\/9312\/revisions\/14127"}],"wp:attachment":[{"href":"https:\/\/www.mrc-productivity.com\/blog\/wp-json\/wp\/v2\/media?parent=9312"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mrc-productivity.com\/blog\/wp-json\/wp\/v2\/categories?post=9312"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mrc-productivity.com\/blog\/wp-json\/wp\/v2\/tags?post=9312"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}