{"id":64786,"date":"2020-10-13T12:12:43","date_gmt":"2020-10-13T16:12:43","guid":{"rendered":"http:\/\/lantechweb.wpengine.com\/blog\/supply-chain-security-the-unrecognized-value-of-stretch-wrapping\/"},"modified":"2020-10-13T12:12:43","modified_gmt":"2020-10-13T16:12:43","slug":"supply-chain-security-the-unrecognized-value-of-stretch-wrapping","status":"publish","type":"post","link":"https:\/\/www.lantech.com\/r2\/blog\/supply-chain-security-the-unrecognized-value-of-stretch-wrapping\/","title":{"rendered":"Supply Chain Security: The Unrecognized Value of Stretch Wrapping"},"content":{"rendered":"

 <\/p>\n

\"q-semi-automatic-stretch-wrappers.png\"Theft deterrence & detection – The\u00a0unrecognized value of stretch wrapping<\/h3>\n

You’ve probably trained your receiving team well. When a shipment arrives they carefully count the items and check for damage, and any observed damage is documented with photos and noted when they sign the bill of lading. Your customers follow a similar process, and for most CPG (consumer packaged goods) products this is entirely adequate.<\/p>\n

<\/p>\n

But in some cases it’s not. Certain\u00a0products, based on regulatory controls or high value, require more.\u00a0In these cases, stretch wrapping can provide additional security in the supply chain in two ways.<\/p>\n

First is deterrence.<\/strong><\/h3>\n

There are several things you can do to make your loads uninviting. The simplest is to\u00a0unitize them wel<\/strong>l. When loads tip over or fall apart during their logistics and distribution journey the boxes can become disorganized or scattered. Boxes that are scattered around are subject to loss not only by opportunistic theft, but also damage and inadvertent misplacement.<\/p>\n

Securely wrapped, cubed loads remove the chance of individual distribution units (like corrugated cases) floating around. They look complete and proper; they’re confident loads that don’t expect to be messed with.<\/p>\n

Sometimes though you need to take another step to remove temptation – again thinking of products that are particularly enticing based on value or their inherent nature. In those cases,\u00a0opaque stretch film can prevent logos or product descriptions from catching unwanted attention as products move through the distribution network<\/strong>. A load that is opaquely and securely wrapped is much less enticing.<\/p>\n

Second is detection.<\/strong><\/h3>\n

How do you know if an interior case is removed? Or if a load has been re-wrapped\u00a0(for any reason, including damage or convenience in transit)?<\/p>\n

Weighing the pallet load while stretch\u00a0wrapping it is an effective method of detecting load changes. Check weighing a load and keeping records of the weight is an easy way to provide a solid level of supply chain security.<\/p>\n

Check out recent updates<\/a>\u00a0to our popular\u00a0article on the theft of Pappy van Winkle bourbon<\/a>\u00a0where check weighing\u00a0is used to prevent pilferage.<\/p>\n

Printed stretch\u00a0film offers a rarely used, but very effective, indicator which can’t be easily replicated en-route. Even random prints with infrequent impressions can serve to simultaneously boost your brand while making it immediately apparent to your customers’ receiving teams that something is amiss. When the presence of printed film is noted on shipping paperwork it may even alert recipients that haven’t grown accustomed to your sharp looking loads arriving in great condition (due to consistent containment force) with branded stretch film.<\/p>\n

Additional techniques include common tracking tools that are applied to the outside of stretch film (and often come with pressure sensitive stickers for notation on the bill of lading) that record excessive shock or tipping. Running branded tape on\u00a0case sealers<\/a>\u00a0provides unit level indication of tampering as well.<\/p>\n


\n
Download our free<\/span> Guide to Buying a Stretch Wrapper<\/a> for more detailed information on safety considerations along with technical, operational and financial factors.<\/span><\/strong><\/div>\n
\n

New technology to prevent supply chain substitution and fraud<\/h2>\n

Blockchain<\/strong><\/h3>\n

Stretch wrapping is a common and simple way to deter and detect physical tampering of products between shipment and receipt. But as supply chains become more attenuated and complex, and as product claims are increasingly key in differentiating suppliers (e.g. organic certification), there are additional steps that companies are considering to guarantee authenticity.<\/p>\n

Blockchain, the unique identifier and anti-fraud\u00a0concept\u00a0originally developed for Bitcoin, technology is one which is very early in development. Since it originated with Bitcoin, many of the early applications are in the field of FinTech (financial technology.) However, the supply chain field is the focus of numerous early applications and fascinating experimentation. These articles provide a preview of ways in which blockchain technology may impact supply chain, and, specifically, warehouse \/ shipping \/ receiving operations.\u00a0Article 1 from Load Delivered<\/a>\u00a0|\u00a0Article 2 from Wall Street Journal<\/a>\u00a0|\u00a0Article 3 from Talking Logistics<\/a>\u00a0| It’s even spurring discussions such as this\u00a0LinkedIn group “Blockchain for Logistics<\/a>”<\/p>\n

There’s exciting potential – but much remains theoretical, and supply chain systems will have to reach a critical mass for broad value to emerge.<\/p>\n

DNA tagging<\/strong><\/h3>\n

In contrast to blockchain, there’s a technology which is less discussed and more technically advanced. In fact, DNA tagging is fully developed, patented, and deployed in the field. And the implications are incredible.<\/p>\n

Applied DNA Sciences describes their\u00a0SigNature\u00ae DNA<\/a>\u00a0process as follows:<\/p>\n

\n

Unique and powerful means to authenticate originality, verify provenance…With essentially infinite variability, individualized custom DNA sequences can be created and embedded into a range of host carriers such as ink, varnish, thread, laminates, and metal coatings. Highly secure, robust, durable, and cost-effective, SigNature DNA markers can be used as a forensic complement to barcodes, watermarks, holograms, RFIDs, microdots, or any other security platform….SigNature DNA markers are based on plant DNA. These engineered marks have not and cannot be broken. The conventional process used to sequence (\u201cdecode\u201d) native DNA is not possible with the engineered mark. Additional layers of protection and complexity are added to the mark in a proprietary manner. This botanically engineered solution is shielded by a portfolio of 24 patents, 58 patent applications, and other intellectual property protection…The SigNature DNA platform has proven highly resistant to UV radiation, heat, cold, vibration, abrasion, and other extreme environmental conditions, and a single SigNature DNA mark will support at least ten authentications in its lifetime. Unsurpassed durability, accuracy, and assurance make SigNature DNA markers an ideal foundation or enhancement for any security effort.<\/em><\/p>\n<\/blockquote>\n

What does this mean, how does it apply to supply chain security, and how is it pertinent to stretch wrapping?<\/p>\n

Let’s take several random examples.<\/p>\n

    \n
  1. DNA tags can be added to extruded material. A multinational with a global purchasing contract for materials (stretch film for instance) could stipulate confidentially that the manufacturer include a DNA tag in the approved formulation of film which corporate engineering accepts for global use. Although the material may be manufactured in different locations and distributed through different channels, it could periodically be checked at stretch wrappers in each facility to ensure that the film that’s specified and bought is the film that’s delivered<\/li>\n
  2. Those same tags could be used to confirm products are wrapped in the original stretch film as they are received on the dock. (The testing, or assay, process is inexpensive and quick – normally results are available in 15 minutes or less.)<\/li>\n
  3. Ensure that replacement parts for your stretch wrapping (or other) machine are genuine.<\/li>\n
  4. And of course there are a number of easily envisioned applications for CPG products themselves and their primary packaging.\u00a0One great example is the case study of a supplier\u00a0of textiles to an international retailer who needed to prevent the illicit introduction of substandard fiber into finished goods<\/a>.<\/li>\n<\/ol>\n

    The possibilities are, one can imagine, almost limitless. And the economics are compelling. The cost of tagging, particularly in volume, is immaterial for most applications.<\/p>\n

    Physical verification on the shipping & receiving dock<\/h2>\n

    While some raw materials are delivered via rail head or in other bulk vehicles, pallets are shipped and received every day in countless quantities as efficient global supply chains grind along.<\/p>\n

    One commonality in many cases is the role of stretch wrapping – not only it’s primary functional goal of load containment, but secondary roles of deterring and detecting theft and pilferage.<\/p>\n

    As supply chains become a source of ever greater competitive advantage, the role of stretch wrapping will likely become more important in fraud prevention and detection. These evolving technologies will likely be important tools as that develops.<\/p>\n

    \"New<\/a><\/span><\/span>
    \nThis post was published on July 21, 2016 and updated on February 8, 2019.<\/em><\/p>\n

    July 21, 2016<\/p>\n

    As supply chains become a source of greater competitive advantage,stretch wrapping will become more important in fraud prevention and detection. Call Lantech!<\/p>\n","protected":false},"excerpt":{"rendered":"

    As supply chains become a source of greater competitive advantage,stretch wrapping will become more important in fraud prevention and detection. Call Lantech!<\/p>\n","protected":false},"author":10,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":""},"categories":[97,127],"tags":[],"acf":[],"yoast_head":"\nSupply Chain Security: The Unrecognized Value of Stretch Wrapping<\/title>\n<meta name=\"description\" content=\"As supply chains become a source of greater competitive advantage,stretch wrapping will become more important in fraud prevention and detection. Call Lantech!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.lantech.com\/r2\/blog\/supply-chain-security-the-unrecognized-value-of-stretch-wrapping\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Supply Chain Security: The Unrecognized Value of Stretch Wrapping\" \/>\n<meta property=\"og:description\" content=\"As supply chains become a source of greater competitive advantage,stretch wrapping will become more important in fraud prevention and detection. Call Lantech!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.lantech.com\/r2\/blog\/supply-chain-security-the-unrecognized-value-of-stretch-wrapping\/\" \/>\n<meta property=\"og:site_name\" content=\"Lantech | Region 2\" \/>\n<meta property=\"article:published_time\" content=\"2020-10-13T16:12:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/lantech.com\/wp-content\/uploads\/2020\/10\/q-semi-automatic-stretch-wrappers.png\" \/>\n<meta name=\"author\" content=\"Lantech\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Supply Chain Security: The Unrecognized Value of Stretch Wrapping\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lantech\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.lantech.com\/r2\/blog\/supply-chain-security-the-unrecognized-value-of-stretch-wrapping\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.lantech.com\/r2\/blog\/supply-chain-security-the-unrecognized-value-of-stretch-wrapping\/\"},\"author\":{\"name\":\"Lantech\",\"@id\":\"http:\/\/www.lantech.com\/r2\/#\/schema\/person\/75d86c2971e84db528ee452e0691dce0\"},\"headline\":\"Supply Chain Security: The Unrecognized Value of Stretch Wrapping\",\"datePublished\":\"2020-10-13T16:12:43+00:00\",\"dateModified\":\"2020-10-13T16:12:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.lantech.com\/r2\/blog\/supply-chain-security-the-unrecognized-value-of-stretch-wrapping\/\"},\"wordCount\":1309,\"publisher\":{\"@id\":\"http:\/\/www.lantech.com\/r2\/#organization\"},\"articleSection\":[\"Stretch Wrapping\",\"Supply Chain\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.lantech.com\/r2\/blog\/supply-chain-security-the-unrecognized-value-of-stretch-wrapping\/\",\"url\":\"https:\/\/www.lantech.com\/r2\/blog\/supply-chain-security-the-unrecognized-value-of-stretch-wrapping\/\",\"name\":\"Supply Chain Security: The Unrecognized Value of Stretch Wrapping\",\"isPartOf\":{\"@id\":\"http:\/\/www.lantech.com\/r2\/#website\"},\"datePublished\":\"2020-10-13T16:12:43+00:00\",\"dateModified\":\"2020-10-13T16:12:43+00:00\",\"description\":\"As supply chains become a source of greater competitive advantage,stretch wrapping will become more important in fraud prevention and detection. Call Lantech!\",\"breadcrumb\":{\"@id\":\"https:\/\/www.lantech.com\/r2\/blog\/supply-chain-security-the-unrecognized-value-of-stretch-wrapping\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.lantech.com\/r2\/blog\/supply-chain-security-the-unrecognized-value-of-stretch-wrapping\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.lantech.com\/r2\/blog\/supply-chain-security-the-unrecognized-value-of-stretch-wrapping\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"http:\/\/www.lantech.com\/r2\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Stretch Wrapping\",\"item\":\"https:\/\/www.lantech.com\/r2\/blog\/category\/stretch-wrapping\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Supply Chain Security: The Unrecognized Value of Stretch Wrapping\"}]},{\"@type\":\"WebSite\",\"@id\":\"http:\/\/www.lantech.com\/r2\/#website\",\"url\":\"http:\/\/www.lantech.com\/r2\/\",\"name\":\"Lantech | Region 2\",\"description\":\"\",\"publisher\":{\"@id\":\"http:\/\/www.lantech.com\/r2\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"http:\/\/www.lantech.com\/r2\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"http:\/\/www.lantech.com\/r2\/#organization\",\"name\":\"Lantech\",\"url\":\"http:\/\/www.lantech.com\/r2\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"http:\/\/www.lantech.com\/r2\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.lantech.com\/r2\/wp-content\/uploads\/sites\/2\/2019\/10\/lantech-logo-blue.png\",\"contentUrl\":\"https:\/\/www.lantech.com\/r2\/wp-content\/uploads\/sites\/2\/2019\/10\/lantech-logo-blue.png\",\"width\":450,\"height\":110,\"caption\":\"Lantech\"},\"image\":{\"@id\":\"http:\/\/www.lantech.com\/r2\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"http:\/\/www.lantech.com\/r2\/#\/schema\/person\/75d86c2971e84db528ee452e0691dce0\",\"name\":\"Lantech\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"http:\/\/www.lantech.com\/r2\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4a9c782de6ba1cb404a4f3e168af8416?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4a9c782de6ba1cb404a4f3e168af8416?s=96&d=mm&r=g\",\"caption\":\"Lantech\"},\"url\":\"https:\/\/www.lantech.com\/r2\/about\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Supply Chain Security: The Unrecognized Value of Stretch Wrapping","description":"As supply chains become a source of greater competitive advantage,stretch wrapping will become more important in fraud prevention and detection. Call Lantech!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.lantech.com\/r2\/blog\/supply-chain-security-the-unrecognized-value-of-stretch-wrapping\/","og_locale":"en_US","og_type":"article","og_title":"Supply Chain Security: The Unrecognized Value of Stretch Wrapping","og_description":"As supply chains become a source of greater competitive advantage,stretch wrapping will become more important in fraud prevention and detection. Call Lantech!","og_url":"https:\/\/www.lantech.com\/r2\/blog\/supply-chain-security-the-unrecognized-value-of-stretch-wrapping\/","og_site_name":"Lantech | Region 2","article_published_time":"2020-10-13T16:12:43+00:00","og_image":[{"url":"https:\/\/lantech.com\/wp-content\/uploads\/2020\/10\/q-semi-automatic-stretch-wrappers.png"}],"author":"Lantech","twitter_card":"summary_large_image","twitter_title":"Supply Chain Security: The Unrecognized Value of Stretch Wrapping","twitter_misc":{"Written by":"Lantech","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.lantech.com\/r2\/blog\/supply-chain-security-the-unrecognized-value-of-stretch-wrapping\/#article","isPartOf":{"@id":"https:\/\/www.lantech.com\/r2\/blog\/supply-chain-security-the-unrecognized-value-of-stretch-wrapping\/"},"author":{"name":"Lantech","@id":"http:\/\/www.lantech.com\/r2\/#\/schema\/person\/75d86c2971e84db528ee452e0691dce0"},"headline":"Supply Chain Security: The Unrecognized Value of Stretch Wrapping","datePublished":"2020-10-13T16:12:43+00:00","dateModified":"2020-10-13T16:12:43+00:00","mainEntityOfPage":{"@id":"https:\/\/www.lantech.com\/r2\/blog\/supply-chain-security-the-unrecognized-value-of-stretch-wrapping\/"},"wordCount":1309,"publisher":{"@id":"http:\/\/www.lantech.com\/r2\/#organization"},"articleSection":["Stretch Wrapping","Supply Chain"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.lantech.com\/r2\/blog\/supply-chain-security-the-unrecognized-value-of-stretch-wrapping\/","url":"https:\/\/www.lantech.com\/r2\/blog\/supply-chain-security-the-unrecognized-value-of-stretch-wrapping\/","name":"Supply Chain Security: The Unrecognized Value of Stretch Wrapping","isPartOf":{"@id":"http:\/\/www.lantech.com\/r2\/#website"},"datePublished":"2020-10-13T16:12:43+00:00","dateModified":"2020-10-13T16:12:43+00:00","description":"As supply chains become a source of greater competitive advantage,stretch wrapping will become more important in fraud prevention and detection. Call Lantech!","breadcrumb":{"@id":"https:\/\/www.lantech.com\/r2\/blog\/supply-chain-security-the-unrecognized-value-of-stretch-wrapping\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.lantech.com\/r2\/blog\/supply-chain-security-the-unrecognized-value-of-stretch-wrapping\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.lantech.com\/r2\/blog\/supply-chain-security-the-unrecognized-value-of-stretch-wrapping\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"http:\/\/www.lantech.com\/r2\/"},{"@type":"ListItem","position":2,"name":"Stretch Wrapping","item":"https:\/\/www.lantech.com\/r2\/blog\/category\/stretch-wrapping\/"},{"@type":"ListItem","position":3,"name":"Supply Chain Security: The Unrecognized Value of Stretch Wrapping"}]},{"@type":"WebSite","@id":"http:\/\/www.lantech.com\/r2\/#website","url":"http:\/\/www.lantech.com\/r2\/","name":"Lantech | Region 2","description":"","publisher":{"@id":"http:\/\/www.lantech.com\/r2\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"http:\/\/www.lantech.com\/r2\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"http:\/\/www.lantech.com\/r2\/#organization","name":"Lantech","url":"http:\/\/www.lantech.com\/r2\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"http:\/\/www.lantech.com\/r2\/#\/schema\/logo\/image\/","url":"https:\/\/www.lantech.com\/r2\/wp-content\/uploads\/sites\/2\/2019\/10\/lantech-logo-blue.png","contentUrl":"https:\/\/www.lantech.com\/r2\/wp-content\/uploads\/sites\/2\/2019\/10\/lantech-logo-blue.png","width":450,"height":110,"caption":"Lantech"},"image":{"@id":"http:\/\/www.lantech.com\/r2\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"http:\/\/www.lantech.com\/r2\/#\/schema\/person\/75d86c2971e84db528ee452e0691dce0","name":"Lantech","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"http:\/\/www.lantech.com\/r2\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4a9c782de6ba1cb404a4f3e168af8416?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4a9c782de6ba1cb404a4f3e168af8416?s=96&d=mm&r=g","caption":"Lantech"},"url":"https:\/\/www.lantech.com\/r2\/about"}]}},"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Lantech | Region 2","distributor_original_site_url":"https:\/\/www.lantech.com\/r2","push-errors":false,"_links":{"self":[{"href":"https:\/\/www.lantech.com\/r2\/wp-json\/wp\/v2\/posts\/64786"}],"collection":[{"href":"https:\/\/www.lantech.com\/r2\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.lantech.com\/r2\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.lantech.com\/r2\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/www.lantech.com\/r2\/wp-json\/wp\/v2\/comments?post=64786"}],"version-history":[{"count":0,"href":"https:\/\/www.lantech.com\/r2\/wp-json\/wp\/v2\/posts\/64786\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.lantech.com\/r2\/wp-json\/wp\/v2\/media?parent=64786"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.lantech.com\/r2\/wp-json\/wp\/v2\/categories?post=64786"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.lantech.com\/r2\/wp-json\/wp\/v2\/tags?post=64786"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}