
{"id":2501,"date":"2013-06-24T00:00:00","date_gmt":"2013-06-24T00:00:00","guid":{"rendered":"http:\/\/otava.test\/tomorrows-webinar-encryption-at-the-hardware-and-storage-level\/"},"modified":"2013-06-24T00:00:00","modified_gmt":"2013-06-24T00:00:00","slug":"tomorrows-webinar-encryption-at-the-hardware-and-storage-level","status":"publish","type":"post","link":"https:\/\/www.otava.com\/blog\/tomorrows-webinar-encryption-at-the-hardware-and-storage-level\/","title":{"rendered":"Tomorrow&#8217;s Webinar: Encryption at the Hardware and Storage Level"},"content":{"rendered":"<p>Closing out the June encryption webinar series, our last webinar is tomorrow &#8211; don&#8217;t miss it! Join Steve Aiello, Systems Support Manager at Online Tech and Mark Stanislav, Security Evangelist at Duo Security, for an informative webinar on encryption at the hardware and storage level.<\/p>\n<p><strong>Title<\/strong>:<em>\u00a0Encryption at the Hardware and Storage Level<\/em><br \/>\n<strong>When<\/strong>: Tuesday, June 25, 2013 @2PM ET<br \/>\n<strong>Register<\/strong>:\u00a0<a href=\"https:\/\/www.onlinetech.com\/events\/encryption-at-the-hardware-and-storage-level\">Visit our website<\/a><br \/>\n<strong>Description<\/strong>: Join Steve Aiello, Systems Support Manager at Online Tech and\u00a0Mark Stanislav, Security Evangelist at Duo Security\u00a0for an informative webinar on encryption at the hardware and storage level.<\/p>\n<p>They will discuss how encryption can be applied at various levels from the hardware and storage perspective. Impacts on performance, backup, security, and available resources may suggest very different encryption implementations.<\/p>\n<p>This webinar explores the variety of places where encryption can be employed to mitigate risk of data loss or breach, and some of the considerations for choosing the most appropriate method to employ.<\/p>\n<hr \/>\n<p><strong>Steve Aiello, Systems Support Manager, Online Tech<\/strong><\/p>\n<p>Steven Aiello is a Systems Support Manager with Online Tech, the Midwest\u2019s premier managed data center operator. His certifications include CISSP (Certified Information System Security Professional), ISACA CISA, VMware VCP ( VMware Certified Professional), Cisco CCNA ( Cisco Certified Network Associate), Comptia Security+, and Certified Incident Responder (New Mexico Tech).<\/p>\n<hr \/>\n<p><strong><img loading=\"lazy\" decoding=\"async\" class=\"alignleft\" src=\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/Mark-Stanislav.jpeg\" alt=\"Mark Stanislav\" width=\"90\" height=\"90\" \/>Mark Stanislav, Security Evangelist, Duo Security<\/strong><br \/>\nMark Stanislav is the Security Evangelist for Duo Security, an Ann Arbor-based startup focused on two-factor authentication and mobile security. With a career spanning over a decade, Mark has worked within small business, academia, startup, and corporate environments, primarily focused on Linux architecture, information security, and web application development.<\/p>\n<p>Mark earned his Bachelor of Science Degree in Networking &amp; IT Administration and his Master of Science Degree in Technology Studies, focused on Information Assurance, both from Eastern Michigan University. Mark also holds his CISSP, Security+, Linux+, and CCSK certifications.<\/p>\n<hr \/>\n<p>Miss our other webinars? Watch the video recordings and view the slides in:<br \/>\n<a href=\"https:\/\/otavawebsite.wpengine.com\/about\/events\/\"><em><strong>Encryption &#8211; Perspective on Privacy, Security &amp; Compliance<\/strong><\/em><\/a><br \/>\nChris Heuman, Practice Leader for RISC Management and Consulting, provides an informative webinar on the value of encryption for\u00a0<a href=\"https:\/\/otavawebsite.wpengine.com\/compliance-security\/hipaa-compliant-cloud\/\">HIPAA<\/a>,\u00a0<a href=\"https:\/\/www.onlinetech.com\/compliant-hosting\/pci-compliant-hosting\/overview\">PCI<\/a>\u00a0and many other regulatory frameworks and the successful components of a data security program that integrates encryption.<\/p>\n<p><em><strong><a href=\"https:\/\/otavawebsite.wpengine.com\/about\/events\/\">Encryption at the Software Level: Linux and Windows<\/a><\/strong><\/em><br \/>\nAn informative\/technical webinar on encryption at the software level in which Mark Stanislav, Security Evangelist at Duo Security discusses encryption for Linux, and Farooq Ahmed, Software Development Manager of Online Tech discusses encryption for Windows.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Closing out the June encryption webinar series, our last webinar is tomorrow &#8211; don&#8217;t miss it! Join Steve Aiello, Systems Support Manager at Online Tech and Mark Stanislav, Security Evangelist at Duo Security, for an informative webinar on encryption at the hardware and storage level. Title:\u00a0Encryption at the Hardware and Storage Level When: Tuesday, June 25, 2013 @2PM ET Register:\u00a0Visit our website Description: Join Steve Aiello, Systems Support Manager at Online Tech and\u00a0Mark Stanislav, Security Evangelist at Duo Security\u00a0for an informative webinar on encryption at the hardware and storage level. They will discuss how encryption can be applied at various levels from the hardware and storage perspective. Impacts on performance, backup, security, and available resources may suggest very different encryption implementations. This webinar explores the variety of places where encryption can be employed to mitigate risk of data loss or breach, and some of the considerations for choosing the most appropriate method to employ. Steve Aiello, Systems Support Manager, Online Tech Steven Aiello is a Systems Support Manager with Online Tech, the Midwest\u2019s premier managed data center operator. His certifications include CISSP (Certified Information System Security Professional), ISACA CISA, VMware VCP ( VMware Certified Professional), Cisco CCNA ( Cisco Certified&#8230;<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"other_category":[],"class_list":["post-2501","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Tomorrow&#039;s Webinar: Encryption at the Hardware and Storage Level | OTAVA<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.otava.com\/blog\/tomorrows-webinar-encryption-at-the-hardware-and-storage-level\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Tomorrow&#039;s Webinar: Encryption at the Hardware and Storage Level\" \/>\n<meta property=\"og:description\" content=\"Closing out the June encryption webinar series, our last webinar is tomorrow &#8211; don&#8217;t miss it! Join Steve Aiello, Systems Support Manager at Online Tech and Mark Stanislav, Security Evangelist at Duo Security, for an informative webinar on encryption at the hardware and storage level. Title:\u00a0Encryption at the Hardware and Storage Level When: Tuesday, June 25, 2013 @2PM ET Register:\u00a0Visit our website Description: Join Steve Aiello, Systems Support Manager at Online Tech and\u00a0Mark Stanislav, Security Evangelist at Duo Security\u00a0for an informative webinar on encryption at the hardware and storage level. They will discuss how encryption can be applied at various levels from the hardware and storage perspective. Impacts on performance, backup, security, and available resources may suggest very different encryption implementations. This webinar explores the variety of places where encryption can be employed to mitigate risk of data loss or breach, and some of the considerations for choosing the most appropriate method to employ. Steve Aiello, Systems Support Manager, Online Tech Steven Aiello is a Systems Support Manager with Online Tech, the Midwest\u2019s premier managed data center operator. His certifications include CISSP (Certified Information System Security Professional), ISACA CISA, VMware VCP ( VMware Certified Professional), Cisco CCNA ( Cisco Certified...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.otava.com\/blog\/tomorrows-webinar-encryption-at-the-hardware-and-storage-level\/\" \/>\n<meta property=\"og:site_name\" content=\"OTAVA\" \/>\n<meta property=\"article:published_time\" content=\"2013-06-24T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/Mark-Stanislav.jpeg\" \/>\n<meta name=\"author\" content=\"Irma Brillantes\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Irma Brillantes\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.otava.com\/blog\/tomorrows-webinar-encryption-at-the-hardware-and-storage-level\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/blog\/tomorrows-webinar-encryption-at-the-hardware-and-storage-level\/\"},\"author\":{\"name\":\"Irma Brillantes\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\"},\"headline\":\"Tomorrow&#8217;s Webinar: Encryption at the Hardware and Storage Level\",\"datePublished\":\"2013-06-24T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.otava.com\/blog\/tomorrows-webinar-encryption-at-the-hardware-and-storage-level\/\"},\"wordCount\":421,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/blog\/tomorrows-webinar-encryption-at-the-hardware-and-storage-level\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/Mark-Stanislav.jpeg\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.otava.com\/blog\/tomorrows-webinar-encryption-at-the-hardware-and-storage-level\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.otava.com\/blog\/tomorrows-webinar-encryption-at-the-hardware-and-storage-level\/\",\"url\":\"https:\/\/www.otava.com\/blog\/tomorrows-webinar-encryption-at-the-hardware-and-storage-level\/\",\"name\":\"Tomorrow's Webinar: Encryption at the Hardware and Storage Level | OTAVA\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.otava.com\/blog\/tomorrows-webinar-encryption-at-the-hardware-and-storage-level\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/blog\/tomorrows-webinar-encryption-at-the-hardware-and-storage-level\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/Mark-Stanislav.jpeg\",\"datePublished\":\"2013-06-24T00:00:00+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.otava.com\/blog\/tomorrows-webinar-encryption-at-the-hardware-and-storage-level\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.otava.com\/blog\/tomorrows-webinar-encryption-at-the-hardware-and-storage-level\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/blog\/tomorrows-webinar-encryption-at-the-hardware-and-storage-level\/#primaryimage\",\"url\":\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/Mark-Stanislav.jpeg\",\"contentUrl\":\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/Mark-Stanislav.jpeg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.otava.com\/blog\/tomorrows-webinar-encryption-at-the-hardware-and-storage-level\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.otava.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Tomorrow&#8217;s Webinar: Encryption at the Hardware and Storage Level\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.otava.com\/#website\",\"url\":\"https:\/\/www.otava.com\/\",\"name\":\"OTAVA\u00ae\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.otava.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.otava.com\/#organization\",\"name\":\"OTAVA\u00ae\",\"url\":\"https:\/\/www.otava.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"contentUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"caption\":\"OTAVA\u00ae\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\",\"name\":\"Irma Brillantes\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"caption\":\"Irma Brillantes\"},\"url\":\"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Tomorrow's Webinar: Encryption at the Hardware and Storage Level | OTAVA","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.otava.com\/blog\/tomorrows-webinar-encryption-at-the-hardware-and-storage-level\/","og_locale":"en_US","og_type":"article","og_title":"Tomorrow's Webinar: Encryption at the Hardware and Storage Level","og_description":"Closing out the June encryption webinar series, our last webinar is tomorrow &#8211; don&#8217;t miss it! Join Steve Aiello, Systems Support Manager at Online Tech and Mark Stanislav, Security Evangelist at Duo Security, for an informative webinar on encryption at the hardware and storage level. Title:\u00a0Encryption at the Hardware and Storage Level When: Tuesday, June 25, 2013 @2PM ET Register:\u00a0Visit our website Description: Join Steve Aiello, Systems Support Manager at Online Tech and\u00a0Mark Stanislav, Security Evangelist at Duo Security\u00a0for an informative webinar on encryption at the hardware and storage level. They will discuss how encryption can be applied at various levels from the hardware and storage perspective. Impacts on performance, backup, security, and available resources may suggest very different encryption implementations. This webinar explores the variety of places where encryption can be employed to mitigate risk of data loss or breach, and some of the considerations for choosing the most appropriate method to employ. Steve Aiello, Systems Support Manager, Online Tech Steven Aiello is a Systems Support Manager with Online Tech, the Midwest\u2019s premier managed data center operator. His certifications include CISSP (Certified Information System Security Professional), ISACA CISA, VMware VCP ( VMware Certified Professional), Cisco CCNA ( Cisco Certified...","og_url":"https:\/\/www.otava.com\/blog\/tomorrows-webinar-encryption-at-the-hardware-and-storage-level\/","og_site_name":"OTAVA","article_published_time":"2013-06-24T00:00:00+00:00","og_image":[{"url":"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/Mark-Stanislav.jpeg","type":"","width":"","height":""}],"author":"Irma Brillantes","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Irma Brillantes","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.otava.com\/blog\/tomorrows-webinar-encryption-at-the-hardware-and-storage-level\/#article","isPartOf":{"@id":"https:\/\/www.otava.com\/blog\/tomorrows-webinar-encryption-at-the-hardware-and-storage-level\/"},"author":{"name":"Irma Brillantes","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263"},"headline":"Tomorrow&#8217;s Webinar: Encryption at the Hardware and Storage Level","datePublished":"2013-06-24T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.otava.com\/blog\/tomorrows-webinar-encryption-at-the-hardware-and-storage-level\/"},"wordCount":421,"commentCount":0,"publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"image":{"@id":"https:\/\/www.otava.com\/blog\/tomorrows-webinar-encryption-at-the-hardware-and-storage-level\/#primaryimage"},"thumbnailUrl":"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/Mark-Stanislav.jpeg","inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.otava.com\/blog\/tomorrows-webinar-encryption-at-the-hardware-and-storage-level\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.otava.com\/blog\/tomorrows-webinar-encryption-at-the-hardware-and-storage-level\/","url":"https:\/\/www.otava.com\/blog\/tomorrows-webinar-encryption-at-the-hardware-and-storage-level\/","name":"Tomorrow's Webinar: Encryption at the Hardware and Storage Level | OTAVA","isPartOf":{"@id":"https:\/\/www.otava.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.otava.com\/blog\/tomorrows-webinar-encryption-at-the-hardware-and-storage-level\/#primaryimage"},"image":{"@id":"https:\/\/www.otava.com\/blog\/tomorrows-webinar-encryption-at-the-hardware-and-storage-level\/#primaryimage"},"thumbnailUrl":"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/Mark-Stanislav.jpeg","datePublished":"2013-06-24T00:00:00+00:00","breadcrumb":{"@id":"https:\/\/www.otava.com\/blog\/tomorrows-webinar-encryption-at-the-hardware-and-storage-level\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.otava.com\/blog\/tomorrows-webinar-encryption-at-the-hardware-and-storage-level\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/blog\/tomorrows-webinar-encryption-at-the-hardware-and-storage-level\/#primaryimage","url":"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/Mark-Stanislav.jpeg","contentUrl":"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/Mark-Stanislav.jpeg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.otava.com\/blog\/tomorrows-webinar-encryption-at-the-hardware-and-storage-level\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.otava.com\/"},{"@type":"ListItem","position":2,"name":"Tomorrow&#8217;s Webinar: Encryption at the Hardware and Storage Level"}]},{"@type":"WebSite","@id":"https:\/\/www.otava.com\/#website","url":"https:\/\/www.otava.com\/","name":"OTAVA\u00ae","description":"","publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.otava.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.otava.com\/#organization","name":"OTAVA\u00ae","url":"https:\/\/www.otava.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","contentUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","caption":"OTAVA\u00ae"},"image":{"@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263","name":"Irma Brillantes","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","caption":"Irma Brillantes"},"url":"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/"}]}},"_links":{"self":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/2501","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/comments?post=2501"}],"version-history":[{"count":0,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/2501\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/media?parent=2501"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/categories?post=2501"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/tags?post=2501"},{"taxonomy":"other_category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/other_category?post=2501"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}