
{"id":2717,"date":"2013-11-11T00:00:00","date_gmt":"2013-11-11T00:00:00","guid":{"rendered":"http:\/\/otava.test\/2013-mobile-security-byod-resource-roundup\/"},"modified":"2013-11-11T00:00:00","modified_gmt":"2013-11-11T00:00:00","slug":"2013-mobile-security-byod-resource-roundup","status":"publish","type":"post","link":"https:\/\/www.otava.com\/blog\/2013-mobile-security-byod-resource-roundup\/","title":{"rendered":"2013 Mobile Security: BYOD Resource Roundup"},"content":{"rendered":"<p>Here&#8217;s the best of mobile security from 2013, including articles, white papers, previously recorded webinars and more that explain mobile health IT (mHealth) data security and how to prevent compromised data in your organization.<\/p>\n<p>Online Tech is also headed to the <a href=\"https:\/\/www.onlinetech.com\/events\/mhealth-summit-2013\">2013 mHealth Summit<\/a> this December in Washington, D.C. to exhibit <a href=\"https:\/\/otavawebsite.wpengine.com\/compliance-security\/hipaa-compliant-cloud\/\">encrypted HIPAA hosting<\/a> solutions for mobile software as a service (SaaS) and other health IT companies. Visit us at booth #1112 if you&#8217;re attending, and follow us <a href=\"https:\/\/twitter.com\/OnlineTech\">@OnlineTech<\/a> on Twitter for our updates.<\/p>\n<hr \/>\n<p><strong>Mobile Security Articles:<\/strong><br \/>\n<em><a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/hipaa-encryption-protecting-patient-data-on-tablets-smartphones\/\">HIPAA Encryption: Protecting Patient Data on Tablets &amp; Smartphones<\/a><\/em><br \/>\nA guest blog from HITECHAnswers.net lists security tips from HHS.gov to help ensure that patient data is secure in a BYOD (Bring Your Own Device) environment that includes the use of personal devices such as iPhones and iPads in the \u2026 <a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/hipaa-encryption-protecting-patient-data-on-tablets-smartphones\/\">Continue reading \u2192<\/a><\/p>\n<p><em><a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/mhealth-trends-and-strategies-2013-from-anypresence\/\">mHealth Trends and Strategies 2013 from AnyPresence<\/a><\/em><br \/>\nAnyPresence is proud to announce the availability of a new white paper entitled mHealth Trends and Strategies 2013. The report was authored by Andre\u2019 Guillemin of 43,000 Feet LLC and Kevin Benedict from Cognizant, both of whom are well respected \u2026 <a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/mhealth-trends-and-strategies-2013-from-anypresence\/\">Continue reading \u2192<\/a><\/p>\n<p><em><a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/the-apps-act-addresses-mobile-security-concerns\/\">The APPS Act Addresses Mobile Security Concerns<\/a><\/em><br \/>\nStriving for data security in an emerging mobile world has policy-makers and government agencies doing their best by providing new tools and proposing legislation to keep pace. A few weeks ago, the APPS (Application Privacy, Protection and Security) Act of \u2026 <a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/the-apps-act-addresses-mobile-security-concerns\/\">Continue reading \u2192<\/a><\/p>\n<hr \/>\n<p><strong>Mobile Security White Paper<\/strong><br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"alignleft\" title=\"Mobile Security White Paper\" src=\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/download-mobile.png\" alt=\"Mobile Security White Paper\" width=\"220\" height=\"99\" \/>This white paper explores approaches to mobile security from risk assessment (what data are truly at risk), enterprise architecture (protect the data before the devices), policies and technologies, and concludes with an example of a mobile security architecture designed and implemented within a hospital environment in which both enabling caregivers and protecting privacy, integrity, and confidentiality are paramount. <a href=\"https:\/\/otavawebsite.wpengine.com\/about\/resources\/\">Download\/view the white paper here.<\/a><\/p>\n<hr \/>\n<p><strong>Mobile Industry Perspective &#8211; Video<\/strong><\/p>\n<figure style=\"width: 147px\" class=\"wp-caption alignleft\"><a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/after-the-cloud-what-next-mobile-technology-in-data-centers\/\"><img loading=\"lazy\" decoding=\"async\" class=\" \" title=\"After the Cloud, What Next? Mobile Technology in Data Centers\" src=\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/hqdefault.jpg\" alt=\"After the Cloud, What Next? Mobile Technology in Data Centers\" width=\"147\" height=\"110\" \/><\/a><figcaption class=\"wp-caption-text\">Click to View Video.<\/figcaption><\/figure>\n<p><em><a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/after-the-cloud-what-next-mobile-technology-in-data-centers\/\">After the Cloud, What Next? Mobile Technology in Data Centers<\/a><\/em><br \/>\nYan Ness, Co-CEO of Online Tech, explains how the data center industry will evolve over the next five years and beyond, including cloud computing trends and data center efficiency.<\/p>\n<p>One of the most popular data center industry trends is making data centers more energy efficient. This includes making server equipment more energy efficient, using alternative energy resources, as well as using strategies like free cooling.(<a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/after-the-cloud-what-next-mobile-technology-in-data-centers\/\">continue reading<\/a>)<\/p>\n<hr \/>\n<p><strong>Mobile Security Webinars<\/strong><br \/>\n<em><a href=\"https:\/\/otavawebsite.wpengine.com\/about\/events\/\">It&#8217;s About the Data, Stupid! Real World Mobile Security<\/a><\/em><br \/>\nIn this webinar, \u00a0Marie-Michelle Strah, Ph.D., Founder of Phydian Systems and April Sage, Online Tech Director of Healthcare Vertical discussed\u00a0how shifting the perspective from Mobile Device Management to Master Data Management makes MDM a key pillar of your HIPAA privacy and security planning. While this webinar is focused on healthcare, HITECH and HIPAA compliance, the best practices in BYOD are applicable to all highly-regulated industries managing sensitive data. <a href=\"https:\/\/otavawebsite.wpengine.com\/about\/events\/\">View video and slides here.<\/a><\/p>\n<p>Upcoming webinar (tomorrow! @2PM EST):<br \/>\n<em><a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/to-be-byod-or-not-to-be-byod-is-a-bring-your-own-device-policy-right-for-your-organization\/\">To be BYOD or not to be BYOD: Is a \u201cBring Your Own Device\u201d Policy Right for Your Organization?<\/a><\/em><br \/>\nJoin Attorney Tatiana Melnik and Senior Product Architect Steve Aiello as they discuss how to securely implement an effective BYOD (Bring Your Own Device) strategy in your workplace. This presentation will provide an overview of the legal and regulatory framework for mobile devices and will discuss drafting a BYOD policy, best technical practices for implementation, and enforcement. <a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/to-be-byod-or-not-to-be-byod-is-a-bring-your-own-device-policy-right-for-your-organization\/\">Sign up here.<\/a><\/p>\n<hr \/>\n","protected":false},"excerpt":{"rendered":"<p>Here&#8217;s the best of mobile security from 2013, including articles, white papers, previously recorded webinars and more that explain mobile health IT (mHealth) data security and how to prevent compromised data in your organization. Online Tech is also headed to the 2013 mHealth Summit this December in Washington, D.C. to exhibit encrypted HIPAA hosting solutions for mobile software as a service (SaaS) and other health IT companies. Visit us at booth #1112 if you&#8217;re attending, and follow us @OnlineTech on Twitter for our updates. Mobile Security Articles: HIPAA Encryption: Protecting Patient Data on Tablets &amp; Smartphones A guest blog from HITECHAnswers.net lists security tips from HHS.gov to help ensure that patient data is secure in a BYOD (Bring Your Own Device) environment that includes the use of personal devices such as iPhones and iPads in the \u2026 Continue reading \u2192 mHealth Trends and Strategies 2013 from AnyPresence AnyPresence is proud to announce the availability of a new white paper entitled mHealth Trends and Strategies 2013. The report was authored by Andre\u2019 Guillemin of 43,000 Feet LLC and Kevin Benedict from Cognizant, both of whom are well respected \u2026 Continue reading \u2192 The APPS Act Addresses Mobile Security Concerns Striving for&#8230;<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"other_category":[],"class_list":["post-2717","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>2013 Mobile Security: BYOD Resource Roundup | OTAVA<\/title>\n<meta name=\"description\" content=\"The best of mobile security from 2013, including articles, white papers, recorded webinars and more.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.otava.com\/blog\/2013-mobile-security-byod-resource-roundup\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"2013 Mobile Security: BYOD Resource Roundup\" \/>\n<meta property=\"og:description\" content=\"The best of mobile security from 2013, including articles, white papers, recorded webinars and more.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.otava.com\/blog\/2013-mobile-security-byod-resource-roundup\/\" \/>\n<meta property=\"og:site_name\" content=\"OTAVA\" \/>\n<meta property=\"article:published_time\" content=\"2013-11-11T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/download-mobile.png\" \/>\n<meta name=\"author\" content=\"Irma Brillantes\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Irma Brillantes\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.otava.com\/blog\/2013-mobile-security-byod-resource-roundup\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/blog\/2013-mobile-security-byod-resource-roundup\/\"},\"author\":{\"name\":\"Irma Brillantes\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\"},\"headline\":\"2013 Mobile Security: BYOD Resource Roundup\",\"datePublished\":\"2013-11-11T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.otava.com\/blog\/2013-mobile-security-byod-resource-roundup\/\"},\"wordCount\":572,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/blog\/2013-mobile-security-byod-resource-roundup\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/download-mobile.png\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.otava.com\/blog\/2013-mobile-security-byod-resource-roundup\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.otava.com\/blog\/2013-mobile-security-byod-resource-roundup\/\",\"url\":\"https:\/\/www.otava.com\/blog\/2013-mobile-security-byod-resource-roundup\/\",\"name\":\"2013 Mobile Security: BYOD Resource Roundup | OTAVA\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.otava.com\/blog\/2013-mobile-security-byod-resource-roundup\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/blog\/2013-mobile-security-byod-resource-roundup\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/download-mobile.png\",\"datePublished\":\"2013-11-11T00:00:00+00:00\",\"description\":\"The best of mobile security from 2013, including articles, white papers, recorded webinars and more.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.otava.com\/blog\/2013-mobile-security-byod-resource-roundup\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.otava.com\/blog\/2013-mobile-security-byod-resource-roundup\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/blog\/2013-mobile-security-byod-resource-roundup\/#primaryimage\",\"url\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/download-mobile.png\",\"contentUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/download-mobile.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.otava.com\/blog\/2013-mobile-security-byod-resource-roundup\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.otava.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"2013 Mobile Security: BYOD Resource Roundup\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.otava.com\/#website\",\"url\":\"https:\/\/www.otava.com\/\",\"name\":\"OTAVA\u00ae\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.otava.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.otava.com\/#organization\",\"name\":\"OTAVA\u00ae\",\"url\":\"https:\/\/www.otava.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"contentUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"caption\":\"OTAVA\u00ae\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\",\"name\":\"Irma Brillantes\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"caption\":\"Irma Brillantes\"},\"url\":\"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"2013 Mobile Security: BYOD Resource Roundup | OTAVA","description":"The best of mobile security from 2013, including articles, white papers, recorded webinars and more.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.otava.com\/blog\/2013-mobile-security-byod-resource-roundup\/","og_locale":"en_US","og_type":"article","og_title":"2013 Mobile Security: BYOD Resource Roundup","og_description":"The best of mobile security from 2013, including articles, white papers, recorded webinars and more.","og_url":"https:\/\/www.otava.com\/blog\/2013-mobile-security-byod-resource-roundup\/","og_site_name":"OTAVA","article_published_time":"2013-11-11T00:00:00+00:00","og_image":[{"url":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/download-mobile.png","type":"","width":"","height":""}],"author":"Irma Brillantes","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Irma Brillantes","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.otava.com\/blog\/2013-mobile-security-byod-resource-roundup\/#article","isPartOf":{"@id":"https:\/\/www.otava.com\/blog\/2013-mobile-security-byod-resource-roundup\/"},"author":{"name":"Irma Brillantes","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263"},"headline":"2013 Mobile Security: BYOD Resource Roundup","datePublished":"2013-11-11T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.otava.com\/blog\/2013-mobile-security-byod-resource-roundup\/"},"wordCount":572,"commentCount":0,"publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"image":{"@id":"https:\/\/www.otava.com\/blog\/2013-mobile-security-byod-resource-roundup\/#primaryimage"},"thumbnailUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/download-mobile.png","inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.otava.com\/blog\/2013-mobile-security-byod-resource-roundup\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.otava.com\/blog\/2013-mobile-security-byod-resource-roundup\/","url":"https:\/\/www.otava.com\/blog\/2013-mobile-security-byod-resource-roundup\/","name":"2013 Mobile Security: BYOD Resource Roundup | OTAVA","isPartOf":{"@id":"https:\/\/www.otava.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.otava.com\/blog\/2013-mobile-security-byod-resource-roundup\/#primaryimage"},"image":{"@id":"https:\/\/www.otava.com\/blog\/2013-mobile-security-byod-resource-roundup\/#primaryimage"},"thumbnailUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/download-mobile.png","datePublished":"2013-11-11T00:00:00+00:00","description":"The best of mobile security from 2013, including articles, white papers, recorded webinars and more.","breadcrumb":{"@id":"https:\/\/www.otava.com\/blog\/2013-mobile-security-byod-resource-roundup\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.otava.com\/blog\/2013-mobile-security-byod-resource-roundup\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/blog\/2013-mobile-security-byod-resource-roundup\/#primaryimage","url":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/download-mobile.png","contentUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/download-mobile.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.otava.com\/blog\/2013-mobile-security-byod-resource-roundup\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.otava.com\/"},{"@type":"ListItem","position":2,"name":"2013 Mobile Security: BYOD Resource Roundup"}]},{"@type":"WebSite","@id":"https:\/\/www.otava.com\/#website","url":"https:\/\/www.otava.com\/","name":"OTAVA\u00ae","description":"","publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.otava.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.otava.com\/#organization","name":"OTAVA\u00ae","url":"https:\/\/www.otava.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","contentUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","caption":"OTAVA\u00ae"},"image":{"@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263","name":"Irma Brillantes","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","caption":"Irma Brillantes"},"url":"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/"}]}},"_links":{"self":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/2717","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/comments?post=2717"}],"version-history":[{"count":0,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/2717\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/media?parent=2717"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/categories?post=2717"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/tags?post=2717"},{"taxonomy":"other_category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/other_category?post=2717"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}