{"id":9531,"date":"2020-03-12T03:43:55","date_gmt":"2020-03-12T10:43:55","guid":{"rendered":"https:\/\/www.acalvio.com\/?p=9531"},"modified":"2020-03-12T03:43:55","modified_gmt":"2020-03-12T10:43:55","slug":"epri-whitepaper","status":"publish","type":"post","link":"https:\/\/acalvio.p2staging.us\/index.php\/2020\/03\/12\/epri-whitepaper\/","title":{"rendered":"EPRI Whitepaper"},"content":{"rendered":"","protected":false},"excerpt":{"rendered":"<p>DECEPTION TECHNOLOGY b\u0000\u0013 Emerging Cyber Security Technology for Utilities<\/p>\n","protected":false},"author":2,"featured_media":9530,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[2],"tags":[],"_links":{"self":[{"href":"https:\/\/acalvio.p2staging.us\/index.php\/wp-json\/wp\/v2\/posts\/9531"}],"collection":[{"href":"https:\/\/acalvio.p2staging.us\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/acalvio.p2staging.us\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/acalvio.p2staging.us\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/acalvio.p2staging.us\/index.php\/wp-json\/wp\/v2\/comments?post=9531"}],"version-history":[{"count":0,"href":"https:\/\/acalvio.p2staging.us\/index.php\/wp-json\/wp\/v2\/posts\/9531\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/acalvio.p2staging.us\/index.php\/wp-json\/wp\/v2\/media\/9530"}],"wp:attachment":[{"href":"https:\/\/acalvio.p2staging.us\/index.php\/wp-json\/wp\/v2\/media?parent=9531"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/acalvio.p2staging.us\/index.php\/wp-json\/wp\/v2\/categories?post=9531"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/acalvio.p2staging.us\/index.php\/wp-json\/wp\/v2\/tags?post=9531"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}