{"id":462,"date":"2016-11-11T04:22:37","date_gmt":"2016-11-11T11:22:37","guid":{"rendered":"https:\/\/www.morphis-insights.com\/?p=462"},"modified":"2024-01-26T11:09:56","modified_gmt":"2024-01-26T11:09:56","slug":"federal-budget-breaking-legacy-cycle","status":"publish","type":"post","link":"https:\/\/morphis-tech.com\/blog\/federal-budget-breaking-legacy-cycle\/","title":{"rendered":"Federal IT Budget: Breaking The Legacy Cycle"},"content":{"rendered":"<p>2016 has been a big year for cybersecurity. IT departments in nearly every industry around the world are scrambling to keep up with the latest cyber threats, and the US federal government is beginning to do the same.<\/p>\n<p>President Barack Obama\u2019s fiscal 2017 budget proposal <a href=\"http:\/\/www.fedtechmagazine.com\/article\/2016\/02\/2017-budget-boosts-it-spending-899-billion-expands-us-digital-service\" target=\"_blank\" rel=\"noopener\">raised federal IT spending<\/a> up to $89.9 billion and allocated $38.55 billion for defense-related IT spending. While the growth in spending is quite a bit lower than the average annual growth during Bush\u2019s administration, according to budget documents, that is \u201cdue in part to the administration\u2019s achievements in improving the efficiency of how funds are spent on IT.\u201d<\/p>\n<p>However, <a href=\"http:\/\/www.nextgov.com\/cio-briefing\/2015\/11\/crisis-federal-it-rivals-y2k\/123908\/\" target=\"_blank\" rel=\"noopener\">some estimates<\/a> believe that nearly three-quarters of the budget spent by the federal government on information technology goes toward operating and maintaining outdated legacy systems in order to keep them running. This leaves merely one-quarter of the total federal IT budget to be invested into the development of new systems.<\/p>\n<p>Congress took notice, and in an attempt to address this very serious issue, the <a href=\"https:\/\/www.congress.gov\/bill\/114th-congress\/house-bill\/6004\" target=\"_blank\" rel=\"noopener\">Modernizing Government Technology Act<\/a> was introduced to \u2014 and <a href=\"https:\/\/www.morphis-insights.com\/modernizing-government\/\" target=\"_blank\" rel=\"noopener\">passed<\/a> in\u2014 the House of Representatives last month. The act also stands a chance of passing the Senate this month, as well.<\/p>\n<p>Whether the act passes the Senate, a number of federal agencies will have to face the challenge of replacing their tragically outdated legacy systems and some are worse off than others. Recently released <a href=\"https:\/\/idc-community.com\/government\/smart_government\/legacy_system_money_pits__our_federal_it_budget_analysis_spotlights_\" target=\"_blank\" rel=\"noopener\">research by the International Data Corporation (IDC)<\/a> highlights just how pervasive the problem has become. The report says that in the last eight years, \u201cthe amount of money spent on maintaining older systems has crept steadily upward.\u201d<\/p>\n<p>A few data points exhibit how extensive this issue has become for our federal government. This list highlights the federal organizations spending the most on maintaining their existing systems:<\/p>\n<p>&#8211; Army Corps of Engineers &#8211; 96 percent of its $459.8 million budget<br \/>\n&#8211; Nuclear Regulatory Commission &#8211; 93 percent of its $156.5 million budget<br \/>\n&#8211; Agriculture Department &#8211; \u00a090 percent of its $3.2 billion budget<br \/>\n&#8211; Veteran&#8217;s Administration &#8211; \u00a088 percent of its $4.4 billion budget<\/p>\n<p>As the report notes, \u201cthis legacy expense creep is an important issue, since supporting new development is very important not only to help agencies work to transition toward cheaper commodity IT, but also to help them take advantage of advances related to the Internet of things, flexible mobile applications and location-aware IT solutions.\u201d<\/p>\n<p>Unfortunately, it seems that these kind of legacy system spending totals will require much more than legislation to be fixed. While the Modernizing Government Technology Act could provide the necessary funds, and as the new fiscal year \u2014 under a new president \u2014 is beginning soon, funding remains in limbo.<\/p>\n<p>While it is apparent that a severe problem exists, how long will it take the federal government to address?<\/p>\n<p>In the end, it is crucial that federal IT systems are modernized in order to reduce the threat posed to cybersecurity and develop new, more agile frameworks that protect sensitive information better. Security breaches have already added billions of dollars to the sizable federal IT budget, proving they can be expensive as well as dangerous.<\/p>\n<p>Government agencies don\u2019t have to wait for funding to become available to address this issue, though. Morphis\u2019 innovative technology platform has driven the low-risk, low-cost, expedient delivery of modernized applications for several years. Take a look at our <a href=\"https:\/\/www.morphis-insights.com\/miami-dade-county-case-study\/\" target=\"_blank\" rel=\"noopener\">Miami-Dade County Case Study<\/a> for an example of how we were able to modernize over 20 applications and associated databases for the county\u2019s IT department.<\/p>\n<p><a href=\"https:\/\/www.morphis-insights.com\/contact\/\" target=\"_blank\" rel=\"noopener\">Contact us<\/a> to modernize your outdated IT systems and software, and make sure your sensitive data is safe.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>2016 has been a big year for cybersecurity. IT departments in nearly every industry around the world are scrambling to keep up with the latest cyber threats, and the US federal government is beginning to do the same. President Barack Obama\u2019s fiscal 2017 budget proposal raised federal IT spending up to $89.9 billion and allocated [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":461,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[82],"tags":[91],"class_list":["post-462","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-application-modernization","tag-federal-agency"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Federal IT Budget: Breaking The Legacy Cycle | Morphis Insights<\/title>\n<meta name=\"description\" content=\"IT depts are scrambling to deny cyber threats. Modernizing legacy systems with Morphis is a low risk\/cost, rapid way to prevent these threats.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/morphis-tech.com\/blog\/federal-budget-breaking-legacy-cycle\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Federal IT Budget: Breaking The Legacy Cycle | Morphis Insights\" \/>\n<meta property=\"og:description\" content=\"IT depts are scrambling to deny cyber threats. Modernizing legacy systems with Morphis is a low risk\/cost, rapid way to prevent these threats.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/morphis-tech.com\/blog\/federal-budget-breaking-legacy-cycle\/\" \/>\n<meta property=\"og:site_name\" content=\"Morphis-Tech Blog\" \/>\n<meta property=\"article:published_time\" content=\"2016-11-11T11:22:37+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-01-26T11:09:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/morphis-tech.com\/blog\/wp-content\/uploads\/2016\/11\/030816spendingNG.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"576\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Bruno Andrade\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Bruno Andrade\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/morphis-tech.com\/blog\/federal-budget-breaking-legacy-cycle\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/morphis-tech.com\/blog\/federal-budget-breaking-legacy-cycle\/\"},\"author\":{\"name\":\"Bruno Andrade\",\"@id\":\"https:\/\/morphis-tech.com\/blog\/#\/schema\/person\/b6d9d149d3091b09f3ee9bd007183275\"},\"headline\":\"Federal IT Budget: Breaking The Legacy Cycle\",\"datePublished\":\"2016-11-11T11:22:37+00:00\",\"dateModified\":\"2024-01-26T11:09:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/morphis-tech.com\/blog\/federal-budget-breaking-legacy-cycle\/\"},\"wordCount\":600,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/morphis-tech.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/morphis-tech.com\/blog\/federal-budget-breaking-legacy-cycle\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/morphis-tech.com\/blog\/wp-content\/uploads\/2016\/11\/030816spendingNG.jpg\",\"keywords\":[\"Federal Agency\"],\"articleSection\":[\"Application Modernization\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/morphis-tech.com\/blog\/federal-budget-breaking-legacy-cycle\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/morphis-tech.com\/blog\/federal-budget-breaking-legacy-cycle\/\",\"url\":\"https:\/\/morphis-tech.com\/blog\/federal-budget-breaking-legacy-cycle\/\",\"name\":\"Federal IT Budget: Breaking The Legacy Cycle | Morphis Insights\",\"isPartOf\":{\"@id\":\"https:\/\/morphis-tech.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/morphis-tech.com\/blog\/federal-budget-breaking-legacy-cycle\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/morphis-tech.com\/blog\/federal-budget-breaking-legacy-cycle\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/morphis-tech.com\/blog\/wp-content\/uploads\/2016\/11\/030816spendingNG.jpg\",\"datePublished\":\"2016-11-11T11:22:37+00:00\",\"dateModified\":\"2024-01-26T11:09:56+00:00\",\"description\":\"IT depts are scrambling to deny cyber threats. Modernizing legacy systems with Morphis is a low risk\/cost, rapid way to prevent these threats.\",\"breadcrumb\":{\"@id\":\"https:\/\/morphis-tech.com\/blog\/federal-budget-breaking-legacy-cycle\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/morphis-tech.com\/blog\/federal-budget-breaking-legacy-cycle\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/morphis-tech.com\/blog\/federal-budget-breaking-legacy-cycle\/#primaryimage\",\"url\":\"https:\/\/morphis-tech.com\/blog\/wp-content\/uploads\/2016\/11\/030816spendingNG.jpg\",\"contentUrl\":\"https:\/\/morphis-tech.com\/blog\/wp-content\/uploads\/2016\/11\/030816spendingNG.jpg\",\"width\":1200,\"height\":576,\"caption\":\"Federal IT Budget\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/morphis-tech.com\/blog\/federal-budget-breaking-legacy-cycle\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/morphis-tech.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Federal IT Budget: Breaking The Legacy Cycle\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/morphis-tech.com\/blog\/#website\",\"url\":\"https:\/\/morphis-tech.com\/blog\/\",\"name\":\"Legacy Modernization - Blog\",\"description\":\"Legacy to Cloud\",\"publisher\":{\"@id\":\"https:\/\/morphis-tech.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/morphis-tech.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/morphis-tech.com\/blog\/#organization\",\"name\":\"Morphis Tech\",\"url\":\"https:\/\/morphis-tech.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/morphis-tech.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/morphis-tech.com\/blog\/wp-content\/uploads\/2024\/06\/Logo_Blog_2024-1.svg\",\"contentUrl\":\"https:\/\/morphis-tech.com\/blog\/wp-content\/uploads\/2024\/06\/Logo_Blog_2024-1.svg\",\"width\":344,\"height\":51,\"caption\":\"Morphis Tech\"},\"image\":{\"@id\":\"https:\/\/morphis-tech.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.instagram.com\/morphis_technologies\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/morphis-tech.com\/blog\/#\/schema\/person\/b6d9d149d3091b09f3ee9bd007183275\",\"name\":\"Bruno Andrade\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/morphis-tech.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/b26e477ef67cba42b8bc646722ca9ae122b8dc44bf6f5bf0c4072c2e36902b59?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/b26e477ef67cba42b8bc646722ca9ae122b8dc44bf6f5bf0c4072c2e36902b59?s=96&d=mm&r=g\",\"caption\":\"Bruno Andrade\"},\"url\":\"https:\/\/morphis-tech.com\/blog\/author\/bruno-andrade\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Federal IT Budget: Breaking The Legacy Cycle | Morphis Insights","description":"IT depts are scrambling to deny cyber threats. Modernizing legacy systems with Morphis is a low risk\/cost, rapid way to prevent these threats.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/morphis-tech.com\/blog\/federal-budget-breaking-legacy-cycle\/","og_locale":"en_GB","og_type":"article","og_title":"Federal IT Budget: Breaking The Legacy Cycle | Morphis Insights","og_description":"IT depts are scrambling to deny cyber threats. Modernizing legacy systems with Morphis is a low risk\/cost, rapid way to prevent these threats.","og_url":"https:\/\/morphis-tech.com\/blog\/federal-budget-breaking-legacy-cycle\/","og_site_name":"Morphis-Tech Blog","article_published_time":"2016-11-11T11:22:37+00:00","article_modified_time":"2024-01-26T11:09:56+00:00","og_image":[{"width":1200,"height":576,"url":"https:\/\/morphis-tech.com\/blog\/wp-content\/uploads\/2016\/11\/030816spendingNG.jpg","type":"image\/jpeg"}],"author":"Bruno Andrade","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Bruno Andrade","Estimated reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/morphis-tech.com\/blog\/federal-budget-breaking-legacy-cycle\/#article","isPartOf":{"@id":"https:\/\/morphis-tech.com\/blog\/federal-budget-breaking-legacy-cycle\/"},"author":{"name":"Bruno Andrade","@id":"https:\/\/morphis-tech.com\/blog\/#\/schema\/person\/b6d9d149d3091b09f3ee9bd007183275"},"headline":"Federal IT Budget: Breaking The Legacy Cycle","datePublished":"2016-11-11T11:22:37+00:00","dateModified":"2024-01-26T11:09:56+00:00","mainEntityOfPage":{"@id":"https:\/\/morphis-tech.com\/blog\/federal-budget-breaking-legacy-cycle\/"},"wordCount":600,"commentCount":0,"publisher":{"@id":"https:\/\/morphis-tech.com\/blog\/#organization"},"image":{"@id":"https:\/\/morphis-tech.com\/blog\/federal-budget-breaking-legacy-cycle\/#primaryimage"},"thumbnailUrl":"https:\/\/morphis-tech.com\/blog\/wp-content\/uploads\/2016\/11\/030816spendingNG.jpg","keywords":["Federal Agency"],"articleSection":["Application Modernization"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/morphis-tech.com\/blog\/federal-budget-breaking-legacy-cycle\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/morphis-tech.com\/blog\/federal-budget-breaking-legacy-cycle\/","url":"https:\/\/morphis-tech.com\/blog\/federal-budget-breaking-legacy-cycle\/","name":"Federal IT Budget: Breaking The Legacy Cycle | Morphis Insights","isPartOf":{"@id":"https:\/\/morphis-tech.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/morphis-tech.com\/blog\/federal-budget-breaking-legacy-cycle\/#primaryimage"},"image":{"@id":"https:\/\/morphis-tech.com\/blog\/federal-budget-breaking-legacy-cycle\/#primaryimage"},"thumbnailUrl":"https:\/\/morphis-tech.com\/blog\/wp-content\/uploads\/2016\/11\/030816spendingNG.jpg","datePublished":"2016-11-11T11:22:37+00:00","dateModified":"2024-01-26T11:09:56+00:00","description":"IT depts are scrambling to deny cyber threats. Modernizing legacy systems with Morphis is a low risk\/cost, rapid way to prevent these threats.","breadcrumb":{"@id":"https:\/\/morphis-tech.com\/blog\/federal-budget-breaking-legacy-cycle\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/morphis-tech.com\/blog\/federal-budget-breaking-legacy-cycle\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/morphis-tech.com\/blog\/federal-budget-breaking-legacy-cycle\/#primaryimage","url":"https:\/\/morphis-tech.com\/blog\/wp-content\/uploads\/2016\/11\/030816spendingNG.jpg","contentUrl":"https:\/\/morphis-tech.com\/blog\/wp-content\/uploads\/2016\/11\/030816spendingNG.jpg","width":1200,"height":576,"caption":"Federal IT Budget"},{"@type":"BreadcrumbList","@id":"https:\/\/morphis-tech.com\/blog\/federal-budget-breaking-legacy-cycle\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/morphis-tech.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Federal IT Budget: Breaking The Legacy Cycle"}]},{"@type":"WebSite","@id":"https:\/\/morphis-tech.com\/blog\/#website","url":"https:\/\/morphis-tech.com\/blog\/","name":"Legacy Modernization - Blog","description":"Legacy to Cloud","publisher":{"@id":"https:\/\/morphis-tech.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/morphis-tech.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/morphis-tech.com\/blog\/#organization","name":"Morphis Tech","url":"https:\/\/morphis-tech.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/morphis-tech.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/morphis-tech.com\/blog\/wp-content\/uploads\/2024\/06\/Logo_Blog_2024-1.svg","contentUrl":"https:\/\/morphis-tech.com\/blog\/wp-content\/uploads\/2024\/06\/Logo_Blog_2024-1.svg","width":344,"height":51,"caption":"Morphis Tech"},"image":{"@id":"https:\/\/morphis-tech.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.instagram.com\/morphis_technologies\/"]},{"@type":"Person","@id":"https:\/\/morphis-tech.com\/blog\/#\/schema\/person\/b6d9d149d3091b09f3ee9bd007183275","name":"Bruno Andrade","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/morphis-tech.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/b26e477ef67cba42b8bc646722ca9ae122b8dc44bf6f5bf0c4072c2e36902b59?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b26e477ef67cba42b8bc646722ca9ae122b8dc44bf6f5bf0c4072c2e36902b59?s=96&d=mm&r=g","caption":"Bruno Andrade"},"url":"https:\/\/morphis-tech.com\/blog\/author\/bruno-andrade\/"}]}},"_links":{"self":[{"href":"https:\/\/morphis-tech.com\/blog\/wp-json\/wp\/v2\/posts\/462","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/morphis-tech.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/morphis-tech.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/morphis-tech.com\/blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/morphis-tech.com\/blog\/wp-json\/wp\/v2\/comments?post=462"}],"version-history":[{"count":1,"href":"https:\/\/morphis-tech.com\/blog\/wp-json\/wp\/v2\/posts\/462\/revisions"}],"predecessor-version":[{"id":6926,"href":"https:\/\/morphis-tech.com\/blog\/wp-json\/wp\/v2\/posts\/462\/revisions\/6926"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/morphis-tech.com\/blog\/wp-json\/wp\/v2\/media\/461"}],"wp:attachment":[{"href":"https:\/\/morphis-tech.com\/blog\/wp-json\/wp\/v2\/media?parent=462"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/morphis-tech.com\/blog\/wp-json\/wp\/v2\/categories?post=462"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/morphis-tech.com\/blog\/wp-json\/wp\/v2\/tags?post=462"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}