
{"id":2447,"date":"2013-05-16T00:00:00","date_gmt":"2013-05-16T00:00:00","guid":{"rendered":"http:\/\/otava.test\/encryption-at-the-software-level-linux-and-windows\/"},"modified":"2013-05-16T00:00:00","modified_gmt":"2013-05-16T00:00:00","slug":"encryption-at-the-software-level-linux-and-windows","status":"publish","type":"post","link":"https:\/\/www.otava.com\/blog\/encryption-at-the-software-level-linux-and-windows\/","title":{"rendered":"Encryption at the Software Level: Linux and Windows"},"content":{"rendered":"<p id=\"docs-internal-guid-3d08088c-a9b8-5a62-ef04-9042e7c47465\" dir=\"ltr\">Encryption\u2019s the name of the game these days, whether it\u2019s at the software, hardware or storage level. And it\u2019s an industry best practice for organizations that need to meet <a href=\"https:\/\/otavawebsite.wpengine.com\/compliance-security\/hipaa-compliant-cloud\/\">HIPAA<\/a> and <a href=\"https:\/\/www.onlinetech.com\/compliant-hosting\/pci-compliant-hosting\/overview\">PCI compliance<\/a>. We\u2019ve got three webinars lined up for the month of June with IT security professionals to help educate you and take your questions about encryption.<\/p>\n<p dir=\"ltr\">For the first one of the series, join Chris Heuman, Practice Leader for RISC Management and Consulting for a discussion on the value of encryption for HIPAA, PCI and many other regulatory frameworks and the successful components of a data security program that integrates encryption. Find out how you can sign up online for <a href=\"https:\/\/otavawebsite.wpengine.com\/about\/events\/\">Encryption &#8211; Perspective on Privacy, Security &amp; Compliance<\/a>.<\/p>\n<p dir=\"ltr\">The second in the encryption webinar series features Mark Stanislav, Security Evangelist at Duo Security as he discusses encryption for Linux, and Farooq Ahmed, Software Development Manager of Online Tech who will cover encryption for Windows.<\/p>\n<p><strong>Title<\/strong>: <em>Encryption at the Software Level: Linux and Windows<\/em><br \/>\n<strong>When<\/strong>: Tuesday, June 18, 2013 @2PM ET<br \/>\n<strong>Register<\/strong>: <a href=\"https:\/\/otavawebsite.wpengine.com\/about\/events\/\">Find the GoToMeeting link at our website<\/a>.<br \/>\n<strong>Description<\/strong>: Join Farooq Ahmed, Software Development Manager for Online Tech and Mark Stanislav, Security Evangelist for Duo Security, for an informative webinar on encryption at the software level for Linux and Windows. \u00a0Farooq and Mark will discuss how encryption can be applied at various levels, from the software application code.<\/p>\n<p>Impacts on performance, backup, security, and available resources may suggest very different encryption implementations. This webinar explores the variety of places where encryption can be employed to mitigate risk of data loss or breach, and some of the considerations for choosing the most appropriate method to employ.<\/p>\n<hr \/>\n<p><strong><img loading=\"lazy\" decoding=\"async\" style=\"margin-right: 10px; margin-bottom: 10px; float: left;\" src=\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/Mark-Stanislav.jpeg\" alt=\"Mark Stanislav\" width=\"90\" height=\"90\" \/>Mark Stanislav, Security Evangelist, Duo Security<\/strong><br \/>\nMark Stanislav is the Security Evangelist for Duo Security, an Ann Arbor-based startup focused on <a href=\"https:\/\/otavawebsite.wpengine.com\/solutions\/cloud-security\/\">two-factor authentication<\/a> and mobile security. With a career spanning over a decade, Mark has worked within small business, academia, startup, and corporate environments, primarily focused on Linux architecture, information security, and web application development.<\/p>\n<p>Mark earned his Bachelor of Science Degree in Networking &amp; IT Administration and his Master of Science Degree in Technology Studies, focused on Information Assurance, both from Eastern Michigan University. Mark also holds his CISSP, Security+, Linux+, and CCSK certifications.<\/p>\n<hr \/>\n<p><strong><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-11399\" title=\"Farooq_Ahmed\" src=\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/Farooq_Ahmed.png\" alt=\"Farooq_Ahmed\" width=\"94\" height=\"140\" \/>Farooq Ahmed, Software Development Manager, Online Tech<\/strong><br \/>\nFarooq Ahmed is Online Tech\u2019s Software Development Manager and is the Chief Architect of OTPortal, Online Tech\u2019s feature-rich dashboard which delivers on-demand access to server monitoring, management and customer support 24&#215;7.<\/p>\n<p>His career spans more than 14 years with analysis, design and .Net development with VB.Net and C#. Farooq has designed components for online payment systems and the banking industry. Farooq earned a Master\u2019s in Computer Science from the University of Karachi.<\/p>\n<hr \/>\n<p>Stay tuned for info on our third encryption webinar! And read more about encryption in:<\/p>\n<p><strong><em><a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/federal-health-it-budget-increases-by-28-percent-encryption-mobile-security-ehr-safety\/\">Federal Health IT Budget Increases by 28 Percent: Encryption, Mobile Security &amp; EHR Safety<\/a><\/em><\/strong><br \/>\nThe proposed federal fiscal 2014 budget calls for a 28 percent increase to support further development of health IT initiatives while taking over where HITECH funding stops (ending in fiscal year 2013). The Office for Civil Rights\u2019 (ONC) funding will \u2026 <a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/federal-health-it-budget-increases-by-28-percent-encryption-mobile-security-ehr-safety\/\">Continue reading \u2192<\/a><\/p>\n<p><em><strong><a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/2013-state-of-hipaa-encryption-authentication-for-healthcare\/\">2013 State of HIPAA Encryption &amp; Authentication for Healthcare<\/a><\/strong><\/em><br \/>\nAccording to the Healthcare Information Security Today report, 2013 Outlook: Survey Offers Update on Safeguarding Patient Information, most healthcare organizations believe that encryption would greatly improve their data security. Forty-one percent plan to encrypt all mobile devices and removable media, \u2026 <a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/2013-state-of-hipaa-encryption-authentication-for-healthcare\/\">Continue reading \u2192<\/a><\/p>\n<p><em><strong><a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/encrypting-data-to-meet-hipaa-compliance\/\">Encrypting Data to Meet HIPAA Compliance<\/a><\/strong><\/em><br \/>\nTo address the question of whether or not to use data encryption when it comes to meeting HIPAA compliance and keeping patient health information (PHI) protected, let\u2019s revisit the Health Insurance Portability and Accountability Act of 1996 (HIPAA): \u2026 <a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/encrypting-data-to-meet-hipaa-compliance\/\">Continue reading \u2192<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Encryption\u2019s the name of the game these days, whether it\u2019s at the software, hardware or storage level. And it\u2019s an industry best practice for organizations that need to meet HIPAA and PCI compliance. We\u2019ve got three webinars lined up for the month of June with IT security professionals to help educate you and take your questions about encryption. For the first one of the series, join Chris Heuman, Practice Leader for RISC Management and Consulting for a discussion on the value of encryption for HIPAA, PCI and many other regulatory frameworks and the successful components of a data security program that integrates encryption. Find out how you can sign up online for Encryption &#8211; Perspective on Privacy, Security &amp; Compliance. The second in the encryption webinar series features Mark Stanislav, Security Evangelist at Duo Security as he discusses encryption for Linux, and Farooq Ahmed, Software Development Manager of Online Tech who will cover encryption for Windows. Title: Encryption at the Software Level: Linux and Windows When: Tuesday, June 18, 2013 @2PM ET Register: Find the GoToMeeting link at our website. Description: Join Farooq Ahmed, Software Development Manager for Online Tech and Mark Stanislav, Security Evangelist for Duo Security, for an&#8230;<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"other_category":[],"class_list":["post-2447","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Encryption at the Software Level: Linux and Windows | OTAVA<\/title>\n<meta name=\"description\" content=\"We\u2019ve got three webinars lined up for the month of June with IT security professionals to help educate you and take your questions about encryption.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.otava.com\/blog\/encryption-at-the-software-level-linux-and-windows\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Encryption at the Software Level: Linux and Windows\" \/>\n<meta property=\"og:description\" content=\"We\u2019ve got three webinars lined up for the month of June with IT security professionals to help educate you and take your questions about encryption.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.otava.com\/blog\/encryption-at-the-software-level-linux-and-windows\/\" \/>\n<meta property=\"og:site_name\" content=\"OTAVA\" \/>\n<meta property=\"article:published_time\" content=\"2013-05-16T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/Mark-Stanislav.jpeg\" \/>\n<meta name=\"author\" content=\"Irma Brillantes\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Irma Brillantes\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.otava.com\/blog\/encryption-at-the-software-level-linux-and-windows\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/blog\/encryption-at-the-software-level-linux-and-windows\/\"},\"author\":{\"name\":\"Irma Brillantes\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\"},\"headline\":\"Encryption at the Software Level: Linux and Windows\",\"datePublished\":\"2013-05-16T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.otava.com\/blog\/encryption-at-the-software-level-linux-and-windows\/\"},\"wordCount\":626,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/blog\/encryption-at-the-software-level-linux-and-windows\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/Mark-Stanislav.jpeg\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.otava.com\/blog\/encryption-at-the-software-level-linux-and-windows\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.otava.com\/blog\/encryption-at-the-software-level-linux-and-windows\/\",\"url\":\"https:\/\/www.otava.com\/blog\/encryption-at-the-software-level-linux-and-windows\/\",\"name\":\"Encryption at the Software Level: Linux and Windows | OTAVA\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.otava.com\/blog\/encryption-at-the-software-level-linux-and-windows\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/blog\/encryption-at-the-software-level-linux-and-windows\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/Mark-Stanislav.jpeg\",\"datePublished\":\"2013-05-16T00:00:00+00:00\",\"description\":\"We\u2019ve got three webinars lined up for the month of June with IT security professionals to help educate you and take your questions about encryption.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.otava.com\/blog\/encryption-at-the-software-level-linux-and-windows\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.otava.com\/blog\/encryption-at-the-software-level-linux-and-windows\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/blog\/encryption-at-the-software-level-linux-and-windows\/#primaryimage\",\"url\":\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/Mark-Stanislav.jpeg\",\"contentUrl\":\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/Mark-Stanislav.jpeg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.otava.com\/blog\/encryption-at-the-software-level-linux-and-windows\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.otava.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Encryption at the Software Level: Linux and Windows\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.otava.com\/#website\",\"url\":\"https:\/\/www.otava.com\/\",\"name\":\"OTAVA\u00ae\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.otava.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.otava.com\/#organization\",\"name\":\"OTAVA\u00ae\",\"url\":\"https:\/\/www.otava.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"contentUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"caption\":\"OTAVA\u00ae\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\",\"name\":\"Irma Brillantes\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"caption\":\"Irma Brillantes\"},\"url\":\"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Encryption at the Software Level: Linux and Windows | OTAVA","description":"We\u2019ve got three webinars lined up for the month of June with IT security professionals to help educate you and take your questions about encryption.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.otava.com\/blog\/encryption-at-the-software-level-linux-and-windows\/","og_locale":"en_US","og_type":"article","og_title":"Encryption at the Software Level: Linux and Windows","og_description":"We\u2019ve got three webinars lined up for the month of June with IT security professionals to help educate you and take your questions about encryption.","og_url":"https:\/\/www.otava.com\/blog\/encryption-at-the-software-level-linux-and-windows\/","og_site_name":"OTAVA","article_published_time":"2013-05-16T00:00:00+00:00","og_image":[{"url":"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/Mark-Stanislav.jpeg","type":"","width":"","height":""}],"author":"Irma Brillantes","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Irma Brillantes","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.otava.com\/blog\/encryption-at-the-software-level-linux-and-windows\/#article","isPartOf":{"@id":"https:\/\/www.otava.com\/blog\/encryption-at-the-software-level-linux-and-windows\/"},"author":{"name":"Irma Brillantes","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263"},"headline":"Encryption at the Software Level: Linux and Windows","datePublished":"2013-05-16T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.otava.com\/blog\/encryption-at-the-software-level-linux-and-windows\/"},"wordCount":626,"commentCount":0,"publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"image":{"@id":"https:\/\/www.otava.com\/blog\/encryption-at-the-software-level-linux-and-windows\/#primaryimage"},"thumbnailUrl":"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/Mark-Stanislav.jpeg","inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.otava.com\/blog\/encryption-at-the-software-level-linux-and-windows\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.otava.com\/blog\/encryption-at-the-software-level-linux-and-windows\/","url":"https:\/\/www.otava.com\/blog\/encryption-at-the-software-level-linux-and-windows\/","name":"Encryption at the Software Level: Linux and Windows | OTAVA","isPartOf":{"@id":"https:\/\/www.otava.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.otava.com\/blog\/encryption-at-the-software-level-linux-and-windows\/#primaryimage"},"image":{"@id":"https:\/\/www.otava.com\/blog\/encryption-at-the-software-level-linux-and-windows\/#primaryimage"},"thumbnailUrl":"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/Mark-Stanislav.jpeg","datePublished":"2013-05-16T00:00:00+00:00","description":"We\u2019ve got three webinars lined up for the month of June with IT security professionals to help educate you and take your questions about encryption.","breadcrumb":{"@id":"https:\/\/www.otava.com\/blog\/encryption-at-the-software-level-linux-and-windows\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.otava.com\/blog\/encryption-at-the-software-level-linux-and-windows\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/blog\/encryption-at-the-software-level-linux-and-windows\/#primaryimage","url":"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/Mark-Stanislav.jpeg","contentUrl":"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/Mark-Stanislav.jpeg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.otava.com\/blog\/encryption-at-the-software-level-linux-and-windows\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.otava.com\/"},{"@type":"ListItem","position":2,"name":"Encryption at the Software Level: Linux and Windows"}]},{"@type":"WebSite","@id":"https:\/\/www.otava.com\/#website","url":"https:\/\/www.otava.com\/","name":"OTAVA\u00ae","description":"","publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.otava.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.otava.com\/#organization","name":"OTAVA\u00ae","url":"https:\/\/www.otava.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","contentUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","caption":"OTAVA\u00ae"},"image":{"@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263","name":"Irma Brillantes","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","caption":"Irma Brillantes"},"url":"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/"}]}},"_links":{"self":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/2447","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/comments?post=2447"}],"version-history":[{"count":0,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/2447\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/media?parent=2447"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/categories?post=2447"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/tags?post=2447"},{"taxonomy":"other_category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/other_category?post=2447"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}