{"id":1804,"date":"2025-05-19T13:09:51","date_gmt":"2025-05-19T17:09:51","guid":{"rendered":"https:\/\/blog.wavecrest.net\/?p=1804"},"modified":"2025-05-19T13:15:03","modified_gmt":"2025-05-19T17:15:03","slug":"harnessing-revolutionary-tools-lessons-from-the-internet-and-the-dawn-of-ai","status":"publish","type":"post","link":"https:\/\/blog.wavecrest.net\/index.php\/harnessing-revolutionary-tools-lessons-from-the-internet-and-the-dawn-of-ai\/","title":{"rendered":"Harnessing Revolutionary Tools: Lessons from the Internet and the Dawn of AI"},"content":{"rendered":"\n<p><strong>Introduction<\/strong><\/p>\n\n\n\n<p>Thirty years ago, as the CEO of Wavecrest Computing, I witnessed the internet\u2019s emergence as a transformative force, reshaping business operations with a magnitude that arguably surpasses Henry Ford\u2019s assembly line. The introduction of early browsers like Mosaic and Netscape made the internet accessible to all, enabling instant communication, global collaboration, and unprecedented productivity. Today, we stand at the threshold of another revolution: the rise of artificial intelligence (AI) tools. Both the internet and AI are powerful instruments, but their potential is only realized through careful management. At Wavecrest, our products, Cyfin and CyBlock, have helped businesses navigate the internet\u2019s challenges for decades. As AI reshapes the workplace, the lessons we\u2019ve learned underscore the need for oversight, informed decision-making, and tailored strategies to maximize productivity, security, and compliance.<\/p>\n\n\n\n<p><strong>The Internet\u2019s Transformative Impact<\/strong><\/p>\n\n\n\n<p>The internet\u2019s arrival in the 1990s was a paradigm shift. Much like Ford\u2019s assembly line standardized manufacturing, browsers democratized information, empowering businesses to operate globally and innovate rapidly. However, this power came with challenges. When internet access reached every employee\u2019s desktop, businesses gained a revolutionary tool but often lacked the means to manage it effectively. Wavecrest was among the first to recognize this, developing Cyfin to provide actionable insights into employee web usage, addressing not just security but also productivity and legal concerns.<\/p>\n\n\n\n<p>Ford\u2019s assembly line succeeded because he trained workers, monitored performance, and iterated improvements. In contrast, many businesses deployed the internet without similar rigor. Acceptable use policies, often driven by legal departments, focused on liability but rarely harnessed the internet\u2019s full potential. This gap\u2014between the tool\u2019s power and its management\u2014persists, leaving companies vulnerable to risks and missed opportunities.<\/p>\n\n\n\n<p><strong>Challenges of Internet Access<\/strong><\/p>\n\n\n\n<p>The internet introduced three key challenges, each requiring careful oversight:<\/p>\n\n\n\n<p><strong>Security Risks<\/strong>: Research shows that 88% of data breaches stem from human error, such as clicking phishing links or mishandling data (<a href=\"https:\/\/blog.knowbe4.com\/88-percent-of-data-breaches-are-caused-by-human-error\">Stanford Research: 88% Of Data Breaches Are Caused By Human Error<\/a>). Employees, not external hackers, are often the weakest link, necessitating robust training and monitoring.<\/p>\n\n\n\n<p><strong>Legal Liabilities<\/strong>: Internet misuse can lead to lawsuits over harassment, copyright infringement, or data privacy violations. For example, inappropriate email use or unauthorized downloads expose companies to significant risks (<a href=\"https:\/\/smallbusiness.chron.com\/employment-liability-laws-internet-usage-2917.html\">Employment Liability Laws for Internet Usage<\/a>). Legal-driven policies address these but often overlook productivity.<\/p>\n\n\n\n<p><strong>Productivity Losses<\/strong>: Studies estimate that 30-40% of workplace internet activity is non-work-related, costing U.S. businesses $63 billion annually (<a href=\"https:\/\/www.shrm.org\/topics-tools\/news\/hr-magazine\/employee-internet-management-now-hr-issue\">Employee Internet Management: Now an HR Issue<\/a>). Social media, shopping, and entertainment distract employees, undermining efficiency.<\/p>\n\n\n\n<p>These challenges highlight a critical truth: being informed is essential for effective decision-making. Without visibility into how employees use the internet, businesses cannot optimize its benefits or mitigate its risks.<\/p>\n\n\n\n<p><strong>The AI Revolution: A New Frontier<\/strong><\/p>\n\n\n\n<p>As we reflect on the internet\u2019s impact, AI tools\u2014large language models, automation platforms, and analytics engines\u2014are ushering in a new era. Like the internet, AI promises to augment human capabilities, streamline tasks, and drive innovation. However, it also amplifies existing challenges and introduces new ones. Dropping AI onto employees\u2019 desktops without oversight risks repeating the internet\u2019s early mistakes, where enthusiasm outpaced management.<\/p>\n\n\n\n<p><strong>Security Risks<\/strong>: AI amplifies human error risks. A 2024 Gartner report notes that 40% of organizations faced AI-related security incidents due to employee misuse, such as inputting sensitive data into unsecured models (<a href=\"https:\/\/www.gartner.com\/en\/topics\/artificial-intelligence\">Gartner: AI Security Risks<\/a>). Without monitoring, businesses cannot detect or prevent these vulnerabilities.<\/p>\n\n\n\n<p><strong>Legal Liabilities<\/strong>: AI raises complex legal issues, including data privacy violations and ethical concerns. Processing personal data with AI can violate regulations like GDPR, while AI-generated content may infringe copyrights or produce biased outputs (<a href=\"https:\/\/www.forbes.com\/sites\/forbestechcouncil\/2023\/05\/15\/ai-and-data-privacy-navigating-the-risks\/\">AI and Data Privacy Risks<\/a>). Tailored policies are essential but must be grounded in real usage data.<\/p>\n\n\n\n<p><strong>Productivity Concerns<\/strong>: AI\u2019s potential to boost efficiency is immense, but misuse can erode gains. A 2025 McKinsey study estimates that 20% of AI initiatives fail to deliver ROI due to poor integration (<a href=\"https:\/\/www.mckinsey.com\/capabilities\/quantumblack\/our-insights\/the-state-of-ai-in-2025\">McKinsey: AI Productivity Challenges<\/a>). Employees using AI for personal tasks or inefficient workflows\u2014such as excessive prompt tweaking\u2014can mirror the internet\u2019s productivity losses.<\/p>\n\n\n\n<p><strong>Training Gaps<\/strong>: Effective AI use requires training, but generic programs miss the mark. Without data on how employees interact with AI (e.g., tools used, tasks performed), training cannot address specific needs, reducing its impact.<\/p>\n\n\n\n<p><strong>The Pitfalls of Generic Policies<\/strong><\/p>\n\n\n\n<p>Both the internet and AI suffer from a common issue: reliance on boilerplate policies. Internet acceptable use policies, often legal-driven, focused on liability but neglected productivity. Similarly, generic AI policies\u2014such as blanket bans on public models or vague usage guidelines\u2014fail to account for organizational nuances. A marketing team may need AI for creative content, while a finance team requires strict data controls. Without understanding actual usage, policies remain disconnected from reality, undermining productivity, security, and compliance.<\/p>\n\n\n\n<p><strong>The Role of Oversight: Lessons from Cyfin<\/strong><\/p>\n\n\n\n<p>Wavecrest\u2019s experience with the internet offers a blueprint for managing AI. Cyfin addresses the internet\u2019s challenges by transforming complex firewall logs into clear, actionable reports, enabling management and HR to monitor usage, identify risks, and optimize productivity. Unlike built-in firewall tools, which focus on traffic and security, Cyfin excels at reconstructing user actions, providing insights competitors cannot match. This capability is critical, as raw logs are voluminous and difficult to interpret, often leading IT and management to chase inaccurate data (<a href=\"https:\/\/www.exabeam.com\/explainers\/event-logging\/firewall-logs\/\">The Significance and Role of Firewall Logs | Exabeam<\/a>).<\/p>\n\n\n\n<p>Extending this to AI, businesses need tools to track interactions with AI platforms\u2014e.g., which tools are used, how often, and for what purposes. Cyfin\u2019s adaptability positions it to deliver similar visibility, reporting on AI usage to inform policies, training, and security measures. For example, Cyfin could identify employees sharing sensitive data with AI models, spending excessive time on non-work tasks, or struggling with specific tools, enabling targeted interventions.<\/p>\n\n\n\n<p><strong>Best Practices for Harnessing Revolutionary Tools<\/strong><\/p>\n\n\n\n<p>To maximize the internet and AI\u2019s potential, businesses should adopt these strategies:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Implement Comprehensive Monitoring<\/strong>: Use tools like Cyfin to gain visibility into internet and AI usage, providing management with data to make informed decisions.<\/li>\n\n\n\n<li><strong>Develop Tailored Policies<\/strong>: Base policies on actual usage patterns, ensuring they address productivity, security, and legal needs specific to your organization.<\/li>\n\n\n\n<li><strong>Prioritize Training<\/strong>: Tailor training to usage data, addressing gaps in skills or security awareness to enhance effectiveness.<\/li>\n\n\n\n<li><strong>Foster a Culture of Responsibility<\/strong>: Encourage employees to use these tools productively and safely, supported by clear expectations and monitoring.<\/li>\n\n\n\n<li><strong>Leverage Specialized Tools<\/strong>: Avoid relying on generic solutions like firewall logs, which lack the granularity needed for user-focused insights.<\/li>\n<\/ul>\n\n\n\n<p><strong>Conclusion: A Call to Action<\/strong><\/p>\n\n\n\n<p>The internet transformed business, and AI promises to take this further. However, their power is only realized through proactive management. Ford\u2019s assembly line succeeded because he monitored and optimized it; businesses must do the same with the internet and AI. Security risks, legal liabilities, productivity losses, and training needs demand comprehensive oversight, tailored policies, and actionable data. At Wavecrest, we\u2019ve spent 30 years helping businesses navigate these challenges with tools like Cyfin, which deliver the insights needed to harness revolutionary tools effectively.<\/p>\n\n\n\n<p>As we embrace AI, let us learn from the internet\u2019s history. Being informed is critical\u2014only with the most facts can we make the best decisions. Businesses unaware of tools like Cyfin or struggling to implement oversight risk squandering AI\u2019s potential, just as many did with the internet. By investing in visibility and management, organizations can shape a future where these tools drive productivity, security, and innovation. Join us in harnessing the next revolution.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.wavecrest.net\">Lean more<\/a><\/div>\n<\/div>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Introduction Thirty years ago, as the CEO of Wavecrest Computing, I witnessed the internet\u2019s emergence as a transformative force, reshaping business operations with a magnitude that arguably surpasses Henry Ford\u2019s assembly line. The introduction of early browsers like Mosaic and Netscape made the internet accessible to all, enabling instant communication, global collaboration, and unprecedented productivity. [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[566],"tags":[613,312,313,577,374,20],"class_list":["post-1804","post","type-post","status-publish","format-standard","hentry","category-ceo-articles","tag-ai","tag-cyblock-2","tag-cyfin-2","tag-internet","tag-web-security","tag-web-use-reporting"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Harnessing Revolutionary Tools: Lessons from the Internet and the Dawn of AI - Wavecrest Blog<\/title>\n<meta name=\"description\" content=\"Explore how AI usage monitoring in the workplace can boost productivity and security. Learn from the internet\u2019s history with Wavecrest Computing\u2019s 30 years of expertise.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.wavecrest.net\/company\/ceo_articles.html\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Harnessing Revolutionary Tools: Lessons from the Internet and the Dawn of AI - Wavecrest Blog\" \/>\n<meta property=\"og:description\" content=\"Explore how AI usage monitoring in the workplace can boost productivity and security. Learn from the internet\u2019s history with Wavecrest Computing\u2019s 30 years of expertise.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.wavecrest.net\/company\/ceo_articles.html\" \/>\n<meta property=\"og:site_name\" content=\"Wavecrest Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/WebFiltering\" \/>\n<meta property=\"article:published_time\" content=\"2025-05-19T17:09:51+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-19T17:15:03+00:00\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@wavecrestnet\" \/>\n<meta name=\"twitter:site\" content=\"@wavecrestnet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.wavecrest.net\/company\/ceo_articles.html#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.wavecrest.net\/index.php\/harnessing-revolutionary-tools-lessons-from-the-internet-and-the-dawn-of-ai\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/blog.wavecrest.net\/#\/schema\/person\/49694141f524c27bbdfca11c590820cc\"},\"headline\":\"Harnessing Revolutionary Tools: Lessons from the Internet and the Dawn of AI\",\"datePublished\":\"2025-05-19T17:09:51+00:00\",\"dateModified\":\"2025-05-19T17:15:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.wavecrest.net\/index.php\/harnessing-revolutionary-tools-lessons-from-the-internet-and-the-dawn-of-ai\/\"},\"wordCount\":1256,\"publisher\":{\"@id\":\"https:\/\/blog.wavecrest.net\/#organization\"},\"keywords\":[\"AI\",\"cyblock\",\"cyfin\",\"internet\",\"web security\",\"web-use reporting\"],\"articleSection\":[\"CEO Articles\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.wavecrest.net\/index.php\/harnessing-revolutionary-tools-lessons-from-the-internet-and-the-dawn-of-ai\/\",\"url\":\"https:\/\/www.wavecrest.net\/company\/ceo_articles.html\",\"name\":\"Harnessing Revolutionary Tools: Lessons from the Internet and the Dawn of AI - Wavecrest Blog\",\"isPartOf\":{\"@id\":\"https:\/\/blog.wavecrest.net\/#website\"},\"datePublished\":\"2025-05-19T17:09:51+00:00\",\"dateModified\":\"2025-05-19T17:15:03+00:00\",\"description\":\"Explore how AI usage monitoring in the workplace can boost productivity and security. Learn from the internet\u2019s history with Wavecrest Computing\u2019s 30 years of expertise.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.wavecrest.net\/company\/ceo_articles.html#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.wavecrest.net\/company\/ceo_articles.html\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.wavecrest.net\/company\/ceo_articles.html#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/blog.wavecrest.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Harnessing Revolutionary Tools: Lessons from the Internet and the Dawn of AI\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.wavecrest.net\/#website\",\"url\":\"https:\/\/blog.wavecrest.net\/\",\"name\":\"Wavecrest Blog\",\"description\":\"The Latest news, tips and resources straight from the Wavecrest team.\",\"publisher\":{\"@id\":\"https:\/\/blog.wavecrest.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.wavecrest.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/blog.wavecrest.net\/#organization\",\"name\":\"Wavecrest Blog\",\"url\":\"https:\/\/blog.wavecrest.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.wavecrest.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2015\/08\/CF_Full_F.png\",\"contentUrl\":\"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2015\/08\/CF_Full_F.png\",\"width\":1210,\"height\":765,\"caption\":\"Wavecrest Blog\"},\"image\":{\"@id\":\"https:\/\/blog.wavecrest.net\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/WebFiltering\",\"https:\/\/x.com\/wavecrestnet\",\"https:\/\/www.linkedin.com\/company\/wavecrest-computing\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.wavecrest.net\/#\/schema\/person\/49694141f524c27bbdfca11c590820cc\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/57312a01ee193eba72681938d65d35e991afb7e806c02d57f63579f2d73c1536?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/57312a01ee193eba72681938d65d35e991afb7e806c02d57f63579f2d73c1536?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/57312a01ee193eba72681938d65d35e991afb7e806c02d57f63579f2d73c1536?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"url\":\"https:\/\/blog.wavecrest.net\/index.php\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Harnessing Revolutionary Tools: Lessons from the Internet and the Dawn of AI - Wavecrest Blog","description":"Explore how AI usage monitoring in the workplace can boost productivity and security. Learn from the internet\u2019s history with Wavecrest Computing\u2019s 30 years of expertise.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.wavecrest.net\/company\/ceo_articles.html","og_locale":"en_US","og_type":"article","og_title":"Harnessing Revolutionary Tools: Lessons from the Internet and the Dawn of AI - Wavecrest Blog","og_description":"Explore how AI usage monitoring in the workplace can boost productivity and security. Learn from the internet\u2019s history with Wavecrest Computing\u2019s 30 years of expertise.","og_url":"https:\/\/www.wavecrest.net\/company\/ceo_articles.html","og_site_name":"Wavecrest Blog","article_publisher":"https:\/\/www.facebook.com\/WebFiltering","article_published_time":"2025-05-19T17:09:51+00:00","article_modified_time":"2025-05-19T17:15:03+00:00","author":"admin","twitter_card":"summary_large_image","twitter_creator":"@wavecrestnet","twitter_site":"@wavecrestnet","twitter_misc":{"Written by":"admin","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.wavecrest.net\/company\/ceo_articles.html#article","isPartOf":{"@id":"https:\/\/blog.wavecrest.net\/index.php\/harnessing-revolutionary-tools-lessons-from-the-internet-and-the-dawn-of-ai\/"},"author":{"name":"admin","@id":"https:\/\/blog.wavecrest.net\/#\/schema\/person\/49694141f524c27bbdfca11c590820cc"},"headline":"Harnessing Revolutionary Tools: Lessons from the Internet and the Dawn of AI","datePublished":"2025-05-19T17:09:51+00:00","dateModified":"2025-05-19T17:15:03+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.wavecrest.net\/index.php\/harnessing-revolutionary-tools-lessons-from-the-internet-and-the-dawn-of-ai\/"},"wordCount":1256,"publisher":{"@id":"https:\/\/blog.wavecrest.net\/#organization"},"keywords":["AI","cyblock","cyfin","internet","web security","web-use reporting"],"articleSection":["CEO Articles"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/blog.wavecrest.net\/index.php\/harnessing-revolutionary-tools-lessons-from-the-internet-and-the-dawn-of-ai\/","url":"https:\/\/www.wavecrest.net\/company\/ceo_articles.html","name":"Harnessing Revolutionary Tools: Lessons from the Internet and the Dawn of AI - Wavecrest Blog","isPartOf":{"@id":"https:\/\/blog.wavecrest.net\/#website"},"datePublished":"2025-05-19T17:09:51+00:00","dateModified":"2025-05-19T17:15:03+00:00","description":"Explore how AI usage monitoring in the workplace can boost productivity and security. Learn from the internet\u2019s history with Wavecrest Computing\u2019s 30 years of expertise.","breadcrumb":{"@id":"https:\/\/www.wavecrest.net\/company\/ceo_articles.html#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.wavecrest.net\/company\/ceo_articles.html"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.wavecrest.net\/company\/ceo_articles.html#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.wavecrest.net\/"},{"@type":"ListItem","position":2,"name":"Harnessing Revolutionary Tools: Lessons from the Internet and the Dawn of AI"}]},{"@type":"WebSite","@id":"https:\/\/blog.wavecrest.net\/#website","url":"https:\/\/blog.wavecrest.net\/","name":"Wavecrest Blog","description":"The Latest news, tips and resources straight from the Wavecrest team.","publisher":{"@id":"https:\/\/blog.wavecrest.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.wavecrest.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/blog.wavecrest.net\/#organization","name":"Wavecrest Blog","url":"https:\/\/blog.wavecrest.net\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.wavecrest.net\/#\/schema\/logo\/image\/","url":"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2015\/08\/CF_Full_F.png","contentUrl":"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2015\/08\/CF_Full_F.png","width":1210,"height":765,"caption":"Wavecrest Blog"},"image":{"@id":"https:\/\/blog.wavecrest.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/WebFiltering","https:\/\/x.com\/wavecrestnet","https:\/\/www.linkedin.com\/company\/wavecrest-computing"]},{"@type":"Person","@id":"https:\/\/blog.wavecrest.net\/#\/schema\/person\/49694141f524c27bbdfca11c590820cc","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/57312a01ee193eba72681938d65d35e991afb7e806c02d57f63579f2d73c1536?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/57312a01ee193eba72681938d65d35e991afb7e806c02d57f63579f2d73c1536?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/57312a01ee193eba72681938d65d35e991afb7e806c02d57f63579f2d73c1536?s=96&d=mm&r=g","caption":"admin"},"url":"https:\/\/blog.wavecrest.net\/index.php\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/posts\/1804","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/comments?post=1804"}],"version-history":[{"count":1,"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/posts\/1804\/revisions"}],"predecessor-version":[{"id":1805,"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/posts\/1804\/revisions\/1805"}],"wp:attachment":[{"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/media?parent=1804"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/categories?post=1804"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/tags?post=1804"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}