{"version":"1.0","provider_name":"LightsOnData","provider_url":"https:\/\/www.lightsondata.com","author_name":"George Firican","author_url":"https:\/\/www.lightsondata.com\/author\/juni_83yahoo-com\/","title":"The How - Step 2: Determine and Adopt Best Practices | LightsOnData","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"Js8Ldiw3yA\"><a href=\"https:\/\/www.lightsondata.com\/module\/the-how-step-2-determine-and-adopt-best-practices\/\">The How &#8211; Step 2: Determine and Adopt Best Practices<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.lightsondata.com\/module\/the-how-step-2-determine-and-adopt-best-practices\/embed\/#?secret=Js8Ldiw3yA\" width=\"600\" height=\"338\" title=\"&#8220;The How &#8211; Step 2: Determine and Adopt Best Practices&#8221; &#8212; LightsOnData\" data-secret=\"Js8Ldiw3yA\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","description":"Determining the naming and definitions guidelines in order to secure state of the art content. Understand what attributes to include in your first iteration and then subsequent ones. Choose the life-cycle and workflow to follow and what metrics to track and report on.\u00a0"}