{"id":292,"date":"2021-01-27T15:38:19","date_gmt":"2021-01-27T21:38:19","guid":{"rendered":"https:\/\/idsinc.com\/?page_id=292"},"modified":"2023-11-08T16:55:05","modified_gmt":"2023-11-08T22:55:05","slug":"uberwachungsforensik","status":"publish","type":"page","link":"https:\/\/idsinc.com\/de\/case-studies\/surveillance-forensics\/","title":{"rendered":"Video\u00fcberwachung Forensik"},"content":{"rendered":"<!--themify_builder_content-->\n<div id=\"themify_builder_content-292\" data-postid=\"292\" class=\"themify_builder_content themify_builder_content-292 themify_builder tf_clear\">\n                    <div  data-lazy=\"1\" class=\"module_row themify_builder_row tb_sxix889 tb_first tf_w\">\n                        <div class=\"row_inner col_align_top tb_col_count_1 tf_box tf_rel\">\n                        <div  data-lazy=\"1\" class=\"module_column tb-column col-full tb_dvve891 first\">\n                    <!-- module image -->\n<div  class=\"module module-image tb_1zqw507 image-full-overlay   auto_fullwidth tf_mw\" data-lazy=\"1\">\n        <div class=\"image-wrap tf_rel tf_mw\">\n            <img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"512\" src=\"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Case-Study-Surveillance-Forensics-1024x512.jpg\" class=\"wp-post-image wp-image-293\" title=\"Video Surveillance Forensics | iDS Case Study\" alt=\"Video Surveillance Forensics, iDS Case Study\" srcset=\"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Case-Study-Surveillance-Forensics-1024x512.jpg 1024w, https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Case-Study-Surveillance-Forensics-300x150.jpg 300w, https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Case-Study-Surveillance-Forensics-768x384.jpg 768w, https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Case-Study-Surveillance-Forensics.jpg 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/>    \n        <\/div>\n    <!-- \/image-wrap -->\n    \n        <\/div>\n<!-- \/module image -->        <\/div>\n                        <\/div>\n        <\/div>\n                        <div  data-lazy=\"1\" class=\"module_row themify_builder_row tb_z67o610 tf_w\">\n                        <div class=\"row_inner col_align_top tb_col_count_1 tf_box tf_rel\">\n                        <div  data-lazy=\"1\" class=\"module_column tb-column col-full tb_cajx611 first\">\n                    <!-- module fancy heading -->\n<div  class=\"module module-fancy-heading tb_aw59458\" data-lazy=\"1\">\n        <h1 class=\"fancy-heading\">\n    <span class=\"main-head tf_block\">\n                    HERAUSFORDERUNG            <\/span>\n\n    \n    <span class=\"sub-head tf_block tf_rel\">\n                                <\/span>\n    <\/h1>\n<\/div>\n<!-- \/module fancy heading -->\n<!-- module text -->\n<div  class=\"module module-text tb_vvfw5\" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <div class=\"page\" title=\"Seite 1\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<h5>Ein Kunde, der \u00fcber ein Video\u00fcberwachungssystem verf\u00fcgte, war verklagt worden und behauptete, dass die Klasse der Mitarbeiter \u00dcberstunden f\u00fcr die Zeit bezahlen sollte, die erforderlich ist, um die erforderliche Sicherheitskontrolle zu passieren, bevor ihre Schicht tats\u00e4chlich beginnt.<\/h5>\n<p>Der Kunde ben\u00f6tigte Expertise f\u00fcr Folgendes:<\/p>\n<ul>\n<li>\n<p>Entwerfen, Planen, Koordinieren und Ausf\u00fchren einer Methodik f\u00fcr die forensische Erfassung eines Video\u00fcberwachungssystems.<\/p>\n<\/li>\n<li>\n<p>Um Video-Feeds f\u00fcr verschiedene Zeitpunkte und an verschiedenen Tagen zu lokalisieren und zu analysieren.<\/p>\n<\/li>\n<li>\n<p>Um die Hardware- und Softwareumgebung neu zu erstellen, damit der gegnerische Anwalt das erforderliche Videomaterial sehen kann<\/p>\n<p>sich.<\/p>\n<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>    <\/div>\n<\/div>\n<!-- \/module text --><!-- module fancy heading -->\n<div  class=\"module module-fancy-heading tb_fjro869\" data-lazy=\"1\">\n        <h1 class=\"fancy-heading\">\n    <span class=\"main-head tf_block\">\n                    L\u00f6sung            <\/span>\n\n    \n    <span class=\"sub-head tf_block tf_rel\">\n                                <\/span>\n    <\/h1>\n<\/div>\n<!-- \/module fancy heading -->\n<!-- module text -->\n<div  class=\"module module-text tb_olr8818\" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <div class=\"page\" title=\"Seite 1\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<h5>Unsere iDS Digital Forensics Experts entwarfen einen Workflow, der die Erfassung, Analyse und Produktion von Daten aus dem vom Kunden verwendeten server- und softwarebasierten Video\u00fcberwachungssystem erm\u00f6glicht.<\/h5>\n<p>Das iDS-Team hat Folgendes gesammelt, analysiert und dar\u00fcber berichtet:<\/p>\n<ul>\n<li>\n<p>Die vertretbare Abbildung des Videosystems und des zugeh\u00f6rigen Videodateispeichersystems.<\/p>\n<\/li>\n<li>\n<p>Die Analyse und Extraktion des gew\u00fcnschten Videomaterials.<\/p>\n<\/li>\n<li>\n<p>Die Replikation der notwendigen Hard- und Software, die es allen Beteiligten erm\u00f6glichen w\u00fcrde, das Videomaterial in einem zu \u00fcberpr\u00fcfen<\/p>\n<p>simulierte Live-Umgebung.<\/p>\n<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>    <\/div>\n<\/div>\n<!-- \/module text --><!-- module fancy heading -->\n<div  class=\"module module-fancy-heading tb_h5vm641\" data-lazy=\"1\">\n        <h1 class=\"fancy-heading\">\n    <span class=\"main-head tf_block\">\n                    Ergebnis            <\/span>\n\n    \n    <span class=\"sub-head tf_block tf_rel\">\n                                <\/span>\n    <\/h1>\n<\/div>\n<!-- \/module fancy heading -->\n<!-- module text -->\n<div  class=\"module module-text tb_17by0\" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <div class=\"page\" title=\"Seite 1\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<h5>Durch die Nutzung des Fachwissens von iDS war der Kunde in der Lage, sein Videosystem in Betrieb zu lassen und gleichzeitig eine vertretbare forensische Sammlung zu erm\u00f6glichen, und er konnte eine replizierte virtuelle Umgebung erstellen, die ein Spiegel des Systems des Kunden zur Verwendung durch andere Parteien war.<\/h5>\n<p>Der Kunde sparte Tausende bis Hunderttausende von Dollar, indem er iDS mit der Erstellung eines innovativen Workflows zur Erf\u00fcllung dieser Aufgabe beauftragte.<\/p>\n<\/div>\n<\/div>\n<\/div>    <\/div>\n<\/div>\n<!-- \/module text -->        <\/div>\n                        <\/div>\n        <\/div>\n        <\/div>\n<!--\/themify_builder_content-->","protected":false},"excerpt":{"rendered":"<p>A client who had a video surveillance system in place had been sued, alleging the class of employees should be paid overtime for the amount of time it takes to get through the required security checkpoint before their shift actually started. The client needed expertise for the following: To design, plan, coordinate, and execute a [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":293,"parent":33,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"team":[],"class_list":["post-292","page","type-page","status-publish","has-post-thumbnail","hentry","has-post-title","has-post-date","has-post-category","has-post-tag","has-post-comment","has-post-author",""],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.6 (Yoast SEO v27.6) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Video Surveillance Forensics - iDiscovery Solutions<\/title>\n<meta name=\"description\" content=\"Video Surveillance Forensics allowed iDS to create a replicated virtual environment, mirroring the client\u2019s system for use by other parties.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/idsinc.com\/de\/fallstudien\/uberwachungsforensik\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Video Surveillance Forensics\" \/>\n<meta property=\"og:description\" content=\"Video Surveillance Forensics allowed iDS to create a replicated virtual environment, mirroring the client\u2019s system for use by other parties.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/idsinc.com\/de\/fallstudien\/uberwachungsforensik\/\" \/>\n<meta property=\"og:site_name\" content=\"iDiscovery Solutions\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472\" \/>\n<meta property=\"article:modified_time\" content=\"2023-11-08T22:55:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Case-Study-Surveillance-Forensics.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/surveillance-forensics\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/surveillance-forensics\\\/\",\"name\":\"Video Surveillance Forensics - iDiscovery Solutions\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/surveillance-forensics\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/surveillance-forensics\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Case-Study-Surveillance-Forensics.jpg\",\"datePublished\":\"2021-01-27T21:38:19+00:00\",\"dateModified\":\"2023-11-08T22:55:05+00:00\",\"description\":\"Video Surveillance Forensics allowed iDS to create a replicated virtual environment, mirroring the client\u2019s system for use by other parties.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/surveillance-forensics\\\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/surveillance-forensics\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/surveillance-forensics\\\/#primaryimage\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Case-Study-Surveillance-Forensics.jpg\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Case-Study-Surveillance-Forensics.jpg\",\"width\":1200,\"height\":600,\"caption\":\"Video Surveillance Forensics allowed iDS to create a replicated virtual environment, mirroring the client\u2019s system for use by other parties.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/surveillance-forensics\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/idsinc.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Case Studies\",\"item\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Video Surveillance Forensics\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"name\":\"iDiscovery Solutions\",\"description\":\"Use data to your advantage in the courtroom\",\"publisher\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\"},\"alternateName\":\"iDS\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\",\"name\":\"iDiscovery Solutions\",\"alternateName\":\"iDS\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"width\":100,\"height\":73,\"caption\":\"iDiscovery Solutions\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/iDiscovery-Solutions-110210573904472\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/idsinc\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCarv7o1MeYfCp0eZ1IrufIw\"],\"description\":\"iDS provides consultative data solutions to corporations and law firms around the world, giving them a decisive advantage \u2013 both in and out of the courtroom. iDS\u2019s subject matter experts and data strategists specialize in finding solutions to complex data problems, ensuring data can be leveraged as an asset, not a liability.\",\"email\":\"info@idsinc.com\",\"telephone\":\"+1.800.813.4832\",\"legalName\":\"iDiscovery Solutions\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Video\u00fcberwachungsforensik \u2013 iDiscovery-L\u00f6sungen","description":"Mit Video Surveillance Forensics konnte iDS eine replizierte virtuelle Umgebung erstellen, die das System des Kunden zur Nutzung durch andere Parteien spiegelt.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/idsinc.com\/de\/fallstudien\/uberwachungsforensik\/","og_locale":"de_DE","og_type":"article","og_title":"Video Surveillance Forensics","og_description":"Video Surveillance Forensics allowed iDS to create a replicated virtual environment, mirroring the client\u2019s system for use by other parties.","og_url":"https:\/\/idsinc.com\/de\/fallstudien\/uberwachungsforensik\/","og_site_name":"iDiscovery Solutions","article_publisher":"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","article_modified_time":"2023-11-08T22:55:05+00:00","og_image":[{"width":1200,"height":600,"url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Case-Study-Surveillance-Forensics.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/idsinc.com\/case-studies\/surveillance-forensics\/","url":"https:\/\/idsinc.com\/case-studies\/surveillance-forensics\/","name":"Video\u00fcberwachungsforensik \u2013 iDiscovery-L\u00f6sungen","isPartOf":{"@id":"https:\/\/idsinc.com\/en_gb\/#website"},"primaryImageOfPage":{"@id":"https:\/\/idsinc.com\/case-studies\/surveillance-forensics\/#primaryimage"},"image":{"@id":"https:\/\/idsinc.com\/case-studies\/surveillance-forensics\/#primaryimage"},"thumbnailUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Case-Study-Surveillance-Forensics.jpg","datePublished":"2021-01-27T21:38:19+00:00","dateModified":"2023-11-08T22:55:05+00:00","description":"Mit Video Surveillance Forensics konnte iDS eine replizierte virtuelle Umgebung erstellen, die das System des Kunden zur Nutzung durch andere Parteien spiegelt.","breadcrumb":{"@id":"https:\/\/idsinc.com\/case-studies\/surveillance-forensics\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/idsinc.com\/case-studies\/surveillance-forensics\/"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/idsinc.com\/case-studies\/surveillance-forensics\/#primaryimage","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Case-Study-Surveillance-Forensics.jpg","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Case-Study-Surveillance-Forensics.jpg","width":1200,"height":600,"caption":"Video Surveillance Forensics allowed iDS to create a replicated virtual environment, mirroring the client\u2019s system for use by other parties."},{"@type":"BreadcrumbList","@id":"https:\/\/idsinc.com\/case-studies\/surveillance-forensics\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/idsinc.com\/"},{"@type":"ListItem","position":2,"name":"Case Studies","item":"https:\/\/idsinc.com\/case-studies\/"},{"@type":"ListItem","position":3,"name":"Video Surveillance Forensics"}]},{"@type":"WebSite","@id":"https:\/\/idsinc.com\/en_gb\/#website","url":"https:\/\/idsinc.com\/en_gb\/","name":"iDiscovery-L\u00f6sungen","description":"Nutzen Sie Daten im Gerichtssaal zu Ihrem Vorteil","publisher":{"@id":"https:\/\/idsinc.com\/en_gb\/#organization"},"alternateName":"iDS","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/idsinc.com\/en_gb\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/idsinc.com\/en_gb\/#organization","name":"iDiscovery-L\u00f6sungen","alternateName":"iDS","url":"https:\/\/idsinc.com\/en_gb\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","width":100,"height":73,"caption":"iDiscovery Solutions"},"image":{"@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","https:\/\/www.linkedin.com\/company\/idsinc","https:\/\/www.youtube.com\/channel\/UCarv7o1MeYfCp0eZ1IrufIw"],"description":"iDS bietet Unternehmen und Anwaltskanzleien weltweit beratende Datenl\u00f6sungen und verschafft ihnen damit einen entscheidenden Vorteil \u2013 sowohl vor als auch au\u00dferhalb des Gerichtssaals. Die Fachexperten und Datenstrategen von iDS sind auf die L\u00f6sung komplexer Datenprobleme spezialisiert und stellen sicher, dass Daten als Vorteil und nicht als Belastung genutzt werden.","email":"info@idsinc.com","telephone":"+1.800.813.4832","legalName":"iDiscovery Solutions"}]}},"builder_content":"\n<h1>CHALLENGE<br\/><\/h1>\n<h5>A client who had a video surveillance system in place had been sued, alleging the class of employees should be paid overtime for the amount of time it takes to get through the required security checkpoint before their shift actually started.<\/h5> <p>The client needed expertise for the following:<\/p> <ul> <li> <p>To design, plan, coordinate, and execute a methodology for forensic collection of a video surveillance system.<\/p> <\/li> <li> <p>To locate and analyze video feeds for various points in time, and on various days.<\/p> <\/li> <li> <p>To recreate the hardware and software environment to allow opposing counsel to see the necessary video footage for<\/p> <p>themselves.<\/p> <\/li> <\/ul>\n<h1>Solution<br\/><\/h1>\n<h5>Our iDS Digital Forensics Experts designed a workflow that would accommodate the collection, analysis, and production of data from the server and software-based video surveillance system used by the client.<\/h5> <p>The iDS team collected, analyzed, and reported on the following:<\/p> <ul> <li> <p>The defensible imaging of the video system and associated video file storage system.<\/p> <\/li> <li> <p>The analysis and extraction of desired video footage.<\/p> <\/li> <li> <p>The replication of the necessary hardware and software that would allow all parties to review the video footage in a<\/p> <p>simulated live environment.<\/p> <\/li> <\/ul>\n<h1>Result<br\/><\/h1>\n<h5>By leveraging the expertise of iDS, the client was able to leave their video system up and running, while allowing a defensible forensic collection, and was able to create a replicated virtual environment that was a mirror of the client\u2019s system for use by other parties.<\/h5> <p>The client saved thousands, to hundreds of thousands, of dollars by engaging iDS to create an innovative workflow to accomplish this assignment.<\/p>","_links":{"self":[{"href":"https:\/\/idsinc.com\/de\/wp-json\/wp\/v2\/pages\/292","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/idsinc.com\/de\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/idsinc.com\/de\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/idsinc.com\/de\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/idsinc.com\/de\/wp-json\/wp\/v2\/comments?post=292"}],"version-history":[{"count":0,"href":"https:\/\/idsinc.com\/de\/wp-json\/wp\/v2\/pages\/292\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/idsinc.com\/de\/wp-json\/wp\/v2\/pages\/33"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/idsinc.com\/de\/wp-json\/wp\/v2\/media\/293"}],"wp:attachment":[{"href":"https:\/\/idsinc.com\/de\/wp-json\/wp\/v2\/media?parent=292"}],"wp:term":[{"taxonomy":"team","embeddable":true,"href":"https:\/\/idsinc.com\/de\/wp-json\/wp\/v2\/team?post=292"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}