{"avg":{"avg_bot_access":91.6,"avg_rendering":93,"avg_structure":35.3,"avg_schema":9.4,"avg_tech_stack":63.4,"avg_overall":56.8},"domain":{"domain":"informationweek.com","crawled_at":"2026-03-18T05:54:43.654745Z","gptbot_allowed":true,"claudebot_allowed":true,"ccbot_allowed":true,"google_extended_allowed":true,"googlebot_allowed":true,"raw_text_length":10345,"rendered_text_length":14779,"ghost_ratio":0.30000001192092896,"rendering_type":"Hybrid","word_count":1567,"li_count":42,"tr_count":0,"th_count":0,"structure_score":2.680000066757202,"has_org_schema":false,"has_product_schema":false,"schema_count":1,"tech_stack":"express","server_header":"cloudflare","cdn":"cloudflare","http_status":200,"load_time_ms":549,"total_html_bytes":532536,"useful_text_bytes":10345,"token_bloat_ratio":51.5,"images_total":48,"images_with_alt":38,"multimodal_pct":79,"tdm_reservation":false,"has_noai_tag":false,"script_bytes":301156,"has_breadcrumb_schema":false,"has_faq_schema":false,"has_article_schema":false,"has_website_schema":false,"page_title":"InformationWeek, News \u0026 Analysis Tech Leaders Trust","meta_description":"News analysis and commentary on information technology strategy.","crawl_blocked":false,"ai_readiness_score":63,"sub_bot_access":100,"sub_rendering":84,"sub_structure":30,"sub_schema":2,"sub_tech_stack":55,"extractability_score":32,"crawl_cost_score":100,"crawl_cost_label":"High","blocklist_risk":0,"blocklist_risk_label":"None","acri_score":41,"acri_extractability":58,"acri_semantic_structure":38,"acri_content_integrity":51,"acri_retrieval_robustness":19,"acri_grade":"D","h2_texts":"TechTarget and Informa Tech’s Digital Business Combine. | What's Trending | Workday’s AI reset: Agents and the race to remake SaaS | Workday’s AI reset: Agents and the race to remake SaaS | How to submit an IT leadership column to InformationWeek","tranco_rank":10639,"category":"government","title_length":51,"meta_desc_length":64,"has_canonical":true,"canonical_url":"https://www.informationweek.com/","canonical_mismatch":false,"has_meta_viewport":true,"h1_count":0,"h2_count":5,"h2_before_h1":true,"has_hreflang":false,"has_noindex":false,"has_lang_attr":true,"lang_attr":"en","og_title":"InformationWeek, News \u0026 Analysis Tech Leaders Trust","og_description":"News analysis and commentary on information technology strategy.","og_image":"https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/bltc0182b2356ae8eed/64b83949410a1b4c0bd7459b/IW_generic_image.png?disable=upscale\u0026width=1200\u0026height=630\u0026fit=crop","ttfb_ms":549,"dom_node_count":1304,"html_payload_kb":520.1,"has_hsts":true,"has_csp":false,"cache_control":"public, max-age=300, s-maxage=86400, must-revalidate, stale-if-error=864000","cf_cache_status":"HIT","sitemap_declared":true,"sitemap_url":"https://www.informationweek.com/sitemap.xml","internal_links":263,"external_links":17,"tracker_scripts":4,"tracker_domains":"doubleclick.net | googletagmanager.com | facebook.net","tracker_token_pct":0,"global_score":52,"seo_pillar":29,"geo_pillar":52,"perf_pillar":54,"arch_pillar":90,"data_tier":1,"ai_trust_score":0,"ai_trust_rank":17465,"ai_trust_percentile":0,"inbound_ai_links":3,"outbound_ai_links":12,"llm_analyzed":true,"llm_analyzed_at":"2026-02-28T22:33:48.766352Z","llm_model":"mlx-community/gemma-3-4b-it-qat-4bit","ai_unified_analysis":{"core_offering":"This article discusses the growing importance of cybersecurity for CIOs and CISOs, particularly regarding deepfakes and the need for cybersecurity talent acquisition.","target_audience":"CIOs, CISOs, IT Leaders, Cybersecurity Professionals","pricing_model":"SEMANTIC VOID","integration_partners":[],"compliance_standards":[],"competitive_moat":"Focus on cybersecurity risk management and talent development for CIOs and CISOs.","content_depth_score":6,"key_pain_points":["Lack of structured cybersecurity guidance for CIOs","Need for cybersecurity talent development"]}},"percentile":52,"similar_domains":[{"domain":"conservatoriumhotel.com","acri_score":66,"ai_readiness_score":79,"tech_stack":"express","category":"government","token_bloat_ratio":9.300000190734863,"schema_count":1,"distance":8.75,"page_title":"Luxury 5 Star Hotel Amsterdam | Mandarin Oriental Conservatorium","h1_text":"Amsterdam"},{"domain":"asse.org","acri_score":66,"ai_readiness_score":75,"tech_stack":"express","category":"government","token_bloat_ratio":3,"schema_count":0,"distance":9.25,"page_title":"ASSP - American Society of Safety Professionals | ASSP","h1_text":""},{"domain":"saskatchewan.ca","acri_score":66,"ai_readiness_score":75,"tech_stack":"express","category":"government","token_bloat_ratio":3,"schema_count":0,"distance":9.25,"page_title":"Government of Saskatchewan","h1_text":"Saskatchewan"},{"domain":"sfcable.com","acri_score":66,"ai_readiness_score":82,"tech_stack":"express","category":"government","token_bloat_ratio":32.900001525878906,"schema_count":3,"distance":9.75,"page_title":"Wholesale Supplier for Power Cables, Adapters \u0026 More","h1_text":"Suggestions"},{"domain":"hacken.io","acri_score":66,"ai_readiness_score":86,"tech_stack":"nextjs","category":"government","token_bloat_ratio":43.5,"schema_count":1,"distance":14.15,"page_title":"Blockchain Security \u0026 Compliance Partner | Hacken","h1_text":"End-to-end \n blockchain security \u0026 \n compliance partner \n for Digital Assets"}]}
