{"id":25660,"date":"2017-01-05T09:09:50","date_gmt":"2017-01-05T09:09:50","guid":{"rendered":"http:\/\/154.66.198.29\/?p=1303"},"modified":"2017-01-05T09:09:50","modified_gmt":"2017-01-05T09:09:50","slug":"property-managers-this-is-why-you-need-gsm-access-control","status":"publish","type":"post","link":"https:\/\/www.centsys.com\/fr\/property-managers-this-is-why-you-need-gsm-access-control\/","title":{"rendered":"Property Managers: This is Why You Need GSM Access Control"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;section&#8221; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_row admin_label=&#8221;row&#8221; _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text admin_label=&#8221;Text&#8221; _builder_version=&#8221;4.19.5&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; hover_enabled=&#8221;0&#8243; use_border_color=&#8221;off&#8221; border_color=&#8221;#ffffff&#8221; border_style=&#8221;solid&#8221; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p>Orange is the new black, coffee is the new wine, comedy is the new rock \u2018n roll and, if current security trends are any indication,<a href=\"https:\/\/www.centsys.co.za\/g-remote\/\"> <b>cellphones are the new remote controls<\/b><\/a>.<br \/>Say what?<\/p>\n<p>While<b> remote controls will undoubtedly always have a place in the access control environment<\/b> (and in our sentimental old hearts), there are those who consider them to be anachronistic and pass\u00e9, remnants of a simpler time. Technology, by its very definition, has to keep evolving and nowhere is this truer than in the case of security technology, where a single misstep in the race to stay ahead of the criminal curve could have disastrous and far-reaching consequences.<\/p>\n<p>[\/et_pb_text][et_pb_image src=&#8221;https:\/\/www.centsys.co.za\/\/wp-content\/uploads\/2017\/01\/44203225_l.jpg&#8221; align=&#8221;center&#8221; align_tablet=&#8221;center&#8221; align_phone=&#8221;&#8221; align_last_edited=&#8221;on|desktop&#8221; admin_label=&#8221;Image&#8221; _builder_version=&#8221;4.16&#8243; animation_style=&#8221;slide&#8221; animation_direction=&#8221;left&#8221; animation_duration=&#8221;500ms&#8221; animation_intensity_slide=&#8221;10%&#8221; use_border_color=&#8221;off&#8221; border_color=&#8221;#ffffff&#8221; border_style=&#8221;solid&#8221; animation=&#8221;left&#8221; sticky=&#8221;off&#8221; always_center_on_mobile=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text admin_label=&#8221;Text&#8221; _builder_version=&#8221;4.19.5&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; hover_enabled=&#8221;0&#8243; use_border_color=&#8221;off&#8221; border_color=&#8221;#ffffff&#8221; border_style=&#8221;solid&#8221; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p>Property managers and bodies corporate are switching over to <a href=\"https:\/\/www.centsys.co.za\/gsm\/\">GSM access control<\/a> <i>en masse<\/i>. Is this a passing fad, or is cellphone access control here to stay? What\u2019s all the hype about?<\/p>\n<p><b>Let\u2019s find out.<\/b><\/p>\n<h2><b>Lower stock-holding<\/b><\/h2>\n<p>Is having a box full of remotes in your office cramping your style? Could that spot in the corner better be utilised by your golf clubs? A surprising benefit of using <a href=\"https:\/\/www.centsys.co.za\/g-speak-ultra\/\"><b>GSM access <\/b><\/a>control at the property, or properties, that you manage is that it can actually free up some space as you don\u2019t have to keep any physical devices in stock.\u00a0 <b>The tenants use their own <a href=\"https:\/\/www.centsys.co.za\/g-remote\/\">cellphones for access<\/a><\/b>.<\/p>\n<p>[\/et_pb_text][et_pb_image src=&#8221;https:\/\/www.centsys.co.za\/\/wp-content\/uploads\/2017\/01\/54745321_l.jpg&#8221; align=&#8221;center&#8221; align_tablet=&#8221;center&#8221; align_phone=&#8221;&#8221; align_last_edited=&#8221;on|desktop&#8221; admin_label=&#8221;Image&#8221; _builder_version=&#8221;4.16&#8243; animation_style=&#8221;slide&#8221; animation_direction=&#8221;left&#8221; animation_duration=&#8221;500ms&#8221; animation_intensity_slide=&#8221;10%&#8221; use_border_color=&#8221;off&#8221; border_color=&#8221;#ffffff&#8221; border_style=&#8221;solid&#8221; animation=&#8221;left&#8221; sticky=&#8221;off&#8221; always_center_on_mobile=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text admin_label=&#8221;Text&#8221; _builder_version=&#8221;4.19.5&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; hover_enabled=&#8221;0&#8243; use_border_color=&#8221;off&#8221; border_color=&#8221;#ffffff&#8221; border_style=&#8221;solid&#8221; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<h2><b>More security<\/b><\/h2>\n<p>Remotes have gotten a bad rap of late as vulnerable to security threats such as copying or cloning and, in the case of<b> code-hopping systems<\/b> such as <a href=\"https:\/\/www.centsys.co.za\/\/nova\/\" target=\"_blank\" rel=\"noopener noreferrer\">CENTURION&#8217;s NOVA<\/a>, there is actually very little risk of this happening. That being said, <a href=\"https:\/\/www.centsys.co.za\/gsm\/\"><b>GSM<\/b><\/a> offers an even more secure solution since <b>only learned-in, authorised phone numbers can access the system<\/b>, which is usually also <b>password-protected<\/b>. In addition, website administration makes it possible to draw detailed <b>transaction logs <\/b>documenting which numbers were used for access, at what times, etc.<\/p>\n<h2><b>Monitoring<\/b><\/h2>\n<p>Whereas remotes can generally only be used for control (it\u2019s right there in the name), the majority of <b><a href=\"https:\/\/www.centsys.co.za\/g-ultra\/\">GSM devices<\/a> offer outputs as well as inputs<\/b>, which can be connected to alarm systems, electric fences and even mains power and set up to send the users SMS notifications of events such as power failures and alarm breaches.<\/p>\n<h2><b>Offsite administration <\/b><\/h2>\n<p>This is another major, time-saving benefit of opting for <a href=\"https:\/\/www.centsys.co.za\/wireless-solution\/\"><b>GSM access control<\/b><\/a>: the fact that users can be added and deleted, device settings edited and bulk communications sent \u2013 all from the comfort of one\u2019s home or office. A number of leading <a href=\"https:\/\/www.centsys.co.za\/gsm\/\"><b>GSM products <\/b><\/a>offer <b>offsite administration<\/b> via a website or online portal. This also makes life easier for tenants since they don\u2019t have to wait for someone to come and program their remote onsite. It can be done remotely in a matter of minutes.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Orange is the new black, coffee is the new wine, comedy is the new rock \u2018n roll and, if current security trends are any indication, cellphones are the new remote controls.Say what? While remote controls will undoubtedly always have a place in the access control environment (and in our sentimental old hearts), there are those [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":7585,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","_joinchat":[],"footnotes":""},"categories":[5,6,7,14,23,89,109,115,116,117,118,119,120],"tags":[],"class_list":["post-25660","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-acces-control","category-access-automation","category-access-control","category-automated-gate-safety","category-blog-posts","category-g-speak","category-gms-access-control","category-gsm","category-gsm-access-control","category-gsm-controller","category-gsm-device","category-gsm-devices","category-gsm-module"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\r\n<title>Property Managers: This is Why You Need GSM Access Control - Centurion Systems French<\/title>\r\n<meta name=\"description\" content=\"Property managers and bodies corporate are switching over to GSM access control...but why GSM? Let&#039;s find out Centurion Systems\" \/>\r\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\r\n<link rel=\"canonical\" href=\"https:\/\/www.centsys.com\/fr\/property-managers-this-is-why-you-need-gsm-access-control\/\" \/>\r\n<meta property=\"og:locale\" content=\"en_US\" \/>\r\n<meta property=\"og:type\" content=\"article\" \/>\r\n<meta property=\"og:title\" content=\"Property Managers: This is Why You Need GSM Access Control - Centurion Systems French\" \/>\r\n<meta property=\"og:description\" content=\"Property managers and bodies corporate are switching over to GSM access control...but why GSM? Let&#039;s find out Centurion Systems\" \/>\r\n<meta property=\"og:url\" content=\"https:\/\/www.centsys.com\/fr\/property-managers-this-is-why-you-need-gsm-access-control\/\" \/>\r\n<meta property=\"og:site_name\" content=\"Centurion Systems French\" \/>\r\n<meta property=\"article:published_time\" content=\"2017-01-05T09:09:50+00:00\" \/>\r\n<meta name=\"author\" content=\"Eddie\" \/>\r\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\r\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Eddie\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\r\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/property-managers-this-is-why-you-need-gsm-access-control\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/property-managers-this-is-why-you-need-gsm-access-control\\\/\"},\"author\":{\"name\":\"Eddie\",\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/#\\\/schema\\\/person\\\/c355edff49bbe36c125a1888a740b883\"},\"headline\":\"Property Managers: This is Why You Need GSM Access Control\",\"datePublished\":\"2017-01-05T09:09:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/property-managers-this-is-why-you-need-gsm-access-control\\\/\"},\"wordCount\":770,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/property-managers-this-is-why-you-need-gsm-access-control\\\/#primaryimage\"},\"thumbnailUrl\":\"\",\"articleSection\":[\"acces control\",\"access automation\",\"access control\",\"automated gate safety\",\"Blog Posts\",\"g-speak\",\"gms access control\",\"gsm\",\"gsm access control\",\"gsm controller\",\"gsm device\",\"gsm devices\",\"gsm module\"],\"inLanguage\":\"en-ZA\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.centsys.com\\\/fr\\\/property-managers-this-is-why-you-need-gsm-access-control\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/property-managers-this-is-why-you-need-gsm-access-control\\\/\",\"url\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/property-managers-this-is-why-you-need-gsm-access-control\\\/\",\"name\":\"Property Managers: This is Why You Need GSM Access Control - Centurion Systems French\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/property-managers-this-is-why-you-need-gsm-access-control\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/property-managers-this-is-why-you-need-gsm-access-control\\\/#primaryimage\"},\"thumbnailUrl\":\"\",\"datePublished\":\"2017-01-05T09:09:50+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/#\\\/schema\\\/person\\\/c355edff49bbe36c125a1888a740b883\"},\"description\":\"Property managers and bodies corporate are switching over to GSM access control...but why GSM? Let's find out Centurion Systems\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/property-managers-this-is-why-you-need-gsm-access-control\\\/#breadcrumb\"},\"inLanguage\":\"en-ZA\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.centsys.com\\\/fr\\\/property-managers-this-is-why-you-need-gsm-access-control\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-ZA\",\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/property-managers-this-is-why-you-need-gsm-access-control\\\/#primaryimage\",\"url\":\"\",\"contentUrl\":\"\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/property-managers-this-is-why-you-need-gsm-access-control\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Property Managers: This is Why You Need GSM Access Control\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/\",\"name\":\"Centurion Systems French\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-ZA\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/#\\\/schema\\\/person\\\/c355edff49bbe36c125a1888a740b883\",\"name\":\"Eddie\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-ZA\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2b90eb89503dcfa752b0858d62f9fcb623a33c76ccbd8f326fe3afee6ce2a912?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2b90eb89503dcfa752b0858d62f9fcb623a33c76ccbd8f326fe3afee6ce2a912?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2b90eb89503dcfa752b0858d62f9fcb623a33c76ccbd8f326fe3afee6ce2a912?s=96&d=mm&r=g\",\"caption\":\"Eddie\"},\"sameAs\":[\"http:\\\/\\\/www.centsys.com\\\/fr\"],\"url\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/author\\\/eddie\\\/\"}]}<\/script>\r\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Property Managers: This is Why You Need GSM Access Control - Centurion Systems French","description":"Property managers and bodies corporate are switching over to GSM access control...but why GSM? Let's find out Centurion Systems","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.centsys.com\/fr\/property-managers-this-is-why-you-need-gsm-access-control\/","og_locale":"en_US","og_type":"article","og_title":"Property Managers: This is Why You Need GSM Access Control - Centurion Systems French","og_description":"Property managers and bodies corporate are switching over to GSM access control...but why GSM? Let's find out Centurion Systems","og_url":"https:\/\/www.centsys.com\/fr\/property-managers-this-is-why-you-need-gsm-access-control\/","og_site_name":"Centurion Systems French","article_published_time":"2017-01-05T09:09:50+00:00","author":"Eddie","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Eddie","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.centsys.com\/fr\/property-managers-this-is-why-you-need-gsm-access-control\/#article","isPartOf":{"@id":"https:\/\/www.centsys.com\/fr\/property-managers-this-is-why-you-need-gsm-access-control\/"},"author":{"name":"Eddie","@id":"https:\/\/www.centsys.com\/fr\/#\/schema\/person\/c355edff49bbe36c125a1888a740b883"},"headline":"Property Managers: This is Why You Need GSM Access Control","datePublished":"2017-01-05T09:09:50+00:00","mainEntityOfPage":{"@id":"https:\/\/www.centsys.com\/fr\/property-managers-this-is-why-you-need-gsm-access-control\/"},"wordCount":770,"commentCount":0,"image":{"@id":"https:\/\/www.centsys.com\/fr\/property-managers-this-is-why-you-need-gsm-access-control\/#primaryimage"},"thumbnailUrl":"","articleSection":["acces control","access automation","access control","automated gate safety","Blog Posts","g-speak","gms access control","gsm","gsm access control","gsm controller","gsm device","gsm devices","gsm module"],"inLanguage":"en-ZA","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.centsys.com\/fr\/property-managers-this-is-why-you-need-gsm-access-control\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.centsys.com\/fr\/property-managers-this-is-why-you-need-gsm-access-control\/","url":"https:\/\/www.centsys.com\/fr\/property-managers-this-is-why-you-need-gsm-access-control\/","name":"Property Managers: This is Why You Need GSM Access Control - Centurion Systems French","isPartOf":{"@id":"https:\/\/www.centsys.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.centsys.com\/fr\/property-managers-this-is-why-you-need-gsm-access-control\/#primaryimage"},"image":{"@id":"https:\/\/www.centsys.com\/fr\/property-managers-this-is-why-you-need-gsm-access-control\/#primaryimage"},"thumbnailUrl":"","datePublished":"2017-01-05T09:09:50+00:00","author":{"@id":"https:\/\/www.centsys.com\/fr\/#\/schema\/person\/c355edff49bbe36c125a1888a740b883"},"description":"Property managers and bodies corporate are switching over to GSM access control...but why GSM? Let's find out Centurion Systems","breadcrumb":{"@id":"https:\/\/www.centsys.com\/fr\/property-managers-this-is-why-you-need-gsm-access-control\/#breadcrumb"},"inLanguage":"en-ZA","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.centsys.com\/fr\/property-managers-this-is-why-you-need-gsm-access-control\/"]}]},{"@type":"ImageObject","inLanguage":"en-ZA","@id":"https:\/\/www.centsys.com\/fr\/property-managers-this-is-why-you-need-gsm-access-control\/#primaryimage","url":"","contentUrl":""},{"@type":"BreadcrumbList","@id":"https:\/\/www.centsys.com\/fr\/property-managers-this-is-why-you-need-gsm-access-control\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.centsys.com\/fr\/"},{"@type":"ListItem","position":2,"name":"Property Managers: This is Why You Need GSM Access Control"}]},{"@type":"WebSite","@id":"https:\/\/www.centsys.com\/fr\/#website","url":"https:\/\/www.centsys.com\/fr\/","name":"Centurion Systems French","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.centsys.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-ZA"},{"@type":"Person","@id":"https:\/\/www.centsys.com\/fr\/#\/schema\/person\/c355edff49bbe36c125a1888a740b883","name":"Eddie","image":{"@type":"ImageObject","inLanguage":"en-ZA","@id":"https:\/\/secure.gravatar.com\/avatar\/2b90eb89503dcfa752b0858d62f9fcb623a33c76ccbd8f326fe3afee6ce2a912?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/2b90eb89503dcfa752b0858d62f9fcb623a33c76ccbd8f326fe3afee6ce2a912?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/2b90eb89503dcfa752b0858d62f9fcb623a33c76ccbd8f326fe3afee6ce2a912?s=96&d=mm&r=g","caption":"Eddie"},"sameAs":["http:\/\/www.centsys.com\/fr"],"url":"https:\/\/www.centsys.com\/fr\/author\/eddie\/"}]}},"_links":{"self":[{"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/posts\/25660","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/comments?post=25660"}],"version-history":[{"count":0,"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/posts\/25660\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.centsys.com\/fr\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/media?parent=25660"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/categories?post=25660"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/tags?post=25660"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}