{"id":9326,"date":"2013-01-15T13:54:00","date_gmt":"2013-01-15T11:54:00","guid":{"rendered":"http:\/\/www.centsys.co.za\/your-2013-security-calendar-2\/"},"modified":"2013-01-15T13:54:00","modified_gmt":"2013-01-15T11:54:00","slug":"your-2013-security-calendar-2","status":"publish","type":"post","link":"https:\/\/www.centsys.com\/fr\/your-2013-security-calendar-2\/","title":{"rendered":"Your 2013 Security Calendar"},"content":{"rendered":"<p><span style=\"font-family: Calibri;\">As an avid <strong>security enthusiast<\/strong>, chances are you\u2019ll want to know what new technology is on offer in this arena, what innovations are making waves and which people are exerting influence. Fear not, weary traveller, for the information you seek is contained within these very pages!<\/span><\/p>\n<div style=\"line-height: 150%; margin: 0cm 0cm 10pt; text-align: justify;\"><span style=\"font-family: Calibri;\">I personally feel that a <strong>good security expo<\/strong> brings out the child in all of us; at the risk of succumbing to a tired metaphor, one does almost feel like a kid in a candy store when attending one of the many security-oriented events held throughout the year. The myriad gadgets, technological innovations and space-age intelligence generally on display at security events always leaves one feeling undeniably <strong>inspired<\/strong> by the sheer power of human endeavour, no longer cowed by an uncertain future but rather excited at the prospect of a secure one.<\/span><\/div>\n<p><span style=\"font-family: Calibri;\">CENTURION is fortunate enough to have participated in a number of these prestigious events in the past \u2013 and will certainly continue to do so in the future &#8211; and we hereby submit for your reading pleasure a small sample of what you can look forward to in the year ahead.<\/span><\/p>\n<div style=\"line-height: 150%; margin: 0cm 0cm 10pt 36pt; mso-list: l0 level1 lfo1; text-align: justify; text-indent: -18pt;\"><b style=\"mso-bidi-font-weight: normal;\"><span style=\"mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;\"><span style=\"mso-list: Ignore;\"><span style=\"font-family: Calibri;\">1.<\/span><span style=\"font-size-adjust: none; font-stretch: normal; font: 7pt\/normal 'Times New Roman';\">\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 <\/span><\/span><\/span><\/b><b style=\"mso-bidi-font-weight: normal;\"><u><span style=\"font-family: Calibri;\">SecurExpo 2013<\/span><\/u><\/b><\/div>\n<p><span style=\"font-family: Calibri;\">This relatively new entrant to the world of security conventions was held for the first time in Harare, Zimbabwe in March of 2012. <strong>SecurExpo<\/strong>, which saw a very successful launch at the Royal Harare Golf Club last year, draws participants from all sectors of the economy and focuses on all facets of security including cybercrime, cable theft prevention, computer forensics, etc. If SecurExpo 2012 was anything to go by, this event is sure to become <strong>Zimbabwe\u2019s premier showcase for integrated security solutions<\/strong>.<span style=\"mso-spacerun: yes;\">\u00a0\u00a0 <\/span><span style=\"mso-spacerun: yes;\">\u00a0\u00a0<\/span><\/span><\/p>\n<div style=\"line-height: 150%; margin: 0cm 0cm 10pt; text-align: justify;\"><span style=\"font-family: Calibri;\">The theme for this year is \u201cIntegrated Security, providing Global Protection\u201d<\/span><\/div>\n<p><span style=\"font-family: Calibri;\"><b style=\"mso-bidi-font-weight: normal;\">Venue: <\/b>Harare, Zimbabwe. <span style=\"mso-spacerun: yes;\">\u00a0<\/span>For more information contact Conrad Chibanda, <\/span><a href=\"mailto:cchibanda@secureexpo.org\"><span style=\"color: blue; font-family: Calibri;\">cchibanda@secureexpo.org<\/span><\/a><\/p>\n<div style=\"line-height: 150%; margin: 0cm 0cm 10pt; text-align: justify;\"><span style=\"font-family: Calibri;\"><b style=\"mso-bidi-font-weight: normal;\">Dates: <\/b>13 to 16 March 2013<\/span><\/div>\n<p>&nbsp;<\/p>\n<div style=\"line-height: 150%; margin: 0cm 0cm 10pt 36pt; mso-list: l0 level1 lfo1; text-align: justify; text-indent: -18pt;\"><b style=\"mso-bidi-font-weight: normal;\"><span style=\"mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;\"><span style=\"mso-list: Ignore;\"><span style=\"font-family: Calibri;\">2.<\/span><span style=\"font-size-adjust: none; font-stretch: normal; font: 7pt\/normal 'Times New Roman';\">\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 <\/span><\/span><\/span><\/b><b style=\"mso-bidi-font-weight: normal;\"><span style=\"font-family: Calibri;\"><u>Secutech 2013<\/u><\/span><\/b><\/div>\n<p><span style=\"font-family: Calibri;\">The official <\/span><a href=\"http:\/\/www.secutech.com\/\"><span style=\"color: blue; font-family: Calibri;\">Secutech website<\/span><\/a><span style=\"font-family: Calibri;\"> bills the event as \u201cThe business platform for global security manufacturers to demonstrate corporate values\u201d. Sounds good to me!<\/span><\/p>\n<div style=\"line-height: 150%; margin: 0cm 0cm 10pt; text-align: justify;\"><span style=\"font-family: Calibri;\">The 16<sup><span style=\"font-size: x-small;\">th<\/span><\/sup>annual <strong>Secutech<\/strong> international exhibition and conference for electronic and information security, fire and safety will be held in Taiwan and will showcase innovations in areas such as surveillance, access control, personal safety and police equipment.<\/span><\/div>\n<p><span style=\"font-family: Calibri;\"><b style=\"mso-bidi-font-weight: normal;\">Venue: <\/b>Taipei Nangang Exhibition Center in Taiwan<\/span><\/p>\n<div style=\"line-height: 150%; margin: 0cm 0cm 10pt; text-align: justify;\"><span style=\"font-family: Calibri;\"><b style=\"mso-bidi-font-weight: normal;\">Dates: <\/b>24 to 26 April 2013<\/span><\/div>\n<p><b style=\"mso-bidi-font-weight: normal;\"><span style=\"font-family: Calibri;\">Website: <\/span><\/b><a href=\"http:\/\/www.secutech.com\/\"><span style=\"color: blue; font-family: Calibri;\">www.secutech.com<\/span><\/a><\/p>\n<div style=\"line-height: 150%; margin: 0cm 0cm 10pt 36pt; mso-list: l0 level1 lfo1; text-align: justify; text-indent: -18pt;\"><b style=\"mso-bidi-font-weight: normal;\"><span style=\"mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;\"><span style=\"mso-list: Ignore;\"><span style=\"font-family: Calibri;\">3.<\/span><span style=\"font-size-adjust: none; font-stretch: normal; font: 7pt\/normal 'Times New Roman';\">\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 <\/span><\/span><\/span><\/b><b style=\"mso-bidi-font-weight: normal;\"><u><span style=\"font-family: Calibri;\">Mine Site Security Conference<\/span><\/u><\/b><\/div>\n<p><span style=\"font-family: Calibri;\">With Africa holding the <strong>world\u2019s largest producer of platinum and one the largest producers of gold<\/strong>, it is only natural that<strong> integrated security solutions<\/strong> would be such an important factor when it comes to the safeguarding of our valuable subterranean resources. Of course, <strong>access control<\/strong> is also important from a safety perspective as it is imperative that the identities of all employees engaged underground at any given time are known and easily accessible. And so, the <strong>Mine Site Security Conference<\/strong> was born.<\/span><\/p>\n<div style=\"line-height: 150%; margin: 0cm 0cm 10pt; text-align: justify;\"><span style=\"font-family: Calibri;\"><b style=\"mso-bidi-font-weight: normal;\">Venue: <\/b>Park Inn, Sandton<\/span><\/div>\n<p><span style=\"font-family: Calibri;\"><b style=\"mso-bidi-font-weight: normal;\">Dates: <\/b>28 to 29 January 2013<\/span><\/p>\n<div style=\"line-height: 150%; margin: 0cm 0cm 10pt; text-align: justify;\"><b style=\"mso-bidi-font-weight: normal;\"><span style=\"font-family: Calibri;\">Website: <\/span><\/b><a href=\"http:\/\/www.miningsitesecurityafrica.com\/\"><span style=\"color: blue; font-family: Calibri;\">www.miningsitesecurityafrica.com<\/span><\/a><\/div>\n<p>&nbsp;<\/p>\n<div style=\"line-height: 150%; margin: 0cm 0cm 10pt 36pt; mso-list: l0 level1 lfo1; text-align: justify; text-indent: -18pt;\"><b style=\"mso-bidi-font-weight: normal;\"><span style=\"mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;\"><span style=\"mso-list: Ignore;\"><span style=\"font-family: Calibri;\">4.<\/span><span style=\"font-size-adjust: none; font-stretch: normal; font: 7pt\/normal 'Times New Roman';\">\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 <\/span><\/span><\/span><\/b><b style=\"mso-bidi-font-weight: normal;\"><u><span style=\"font-family: Calibri;\">IFSEC 2013<\/span><\/u><\/b><\/div>\n<p><span style=\"font-family: Calibri;\">As far as security expos go, this is the biggie. This writer, for one, cannot help but succumb to almost juvenile excitement when thinking about the row upon row of hi-tech gear. Last year saw the event play host to almost 6000 visitors and some 200 exhibitors \u2013 will these numbers be exceeded at IFSEC 2013? <\/span><\/p>\n<p><span style=\"font-family: Calibri;\">According to IFSEC SA\u2019s website \u201c<strong>IFSEC<\/strong> <strong>South Africa<\/strong> is the leading Commercial Security, Homeland Security and Fire exhibition on the African continent\u201d.<\/span><\/p>\n<div style=\"line-height: 150%; margin: 0cm 0cm 10pt; text-align: justify;\"><span style=\"font-family: Calibri;\">Note that IFSEC also boasts international legs, including one in the UK and one in Nigeria.<\/span><\/div>\n<p><span style=\"font-family: Calibri;\"><b style=\"mso-bidi-font-weight: normal;\">Venue: <\/b>Gallagher Convention Centre, Midrand<\/span><\/p>\n<div style=\"line-height: 150%; margin: 0cm 0cm 10pt; text-align: justify;\"><span style=\"font-family: Calibri;\"><b style=\"mso-bidi-font-weight: normal;\">Dates: <\/b>18 to 20 June 2013<\/span><\/div>\n<p><b style=\"mso-bidi-font-weight: normal;\"><span style=\"font-family: Calibri;\">Website: <\/span><\/b><a href=\"http:\/\/www.ifsecsa.com\/\"><span style=\"color: blue; font-family: Calibri;\">www.ifsecsa.com<\/span><\/a><span style=\"font-family: Calibri;\"> <span style=\"mso-spacerun: yes;\">\u00a0<\/span><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>As an avid security enthusiast, chances are you\u2019ll want to know what new technology is on offer in this arena, what innovations are making waves and which people are exerting influence. Fear not, weary traveller, for the information you seek is contained within these very pages! I personally feel that a good security expo brings [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","_joinchat":[],"footnotes":""},"categories":[7,50,206],"tags":[],"class_list":["post-9326","post","type-post","status-publish","format-standard","hentry","category-access-control","category-centurion-systems","category-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\r\n<title>Your 2013 Security Calendar - Centurion Systems French<\/title>\r\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\r\n<link rel=\"canonical\" href=\"https:\/\/www.centsys.com\/fr\/your-2013-security-calendar-2\/\" \/>\r\n<meta property=\"og:locale\" content=\"en_US\" \/>\r\n<meta property=\"og:type\" content=\"article\" \/>\r\n<meta property=\"og:title\" content=\"Your 2013 Security Calendar - Centurion Systems French\" \/>\r\n<meta property=\"og:description\" content=\"As an avid security enthusiast, chances are you\u2019ll want to know what new technology is on offer in this arena, what innovations are making waves and which people are exerting influence. Fear not, weary traveller, for the information you seek is contained within these very pages! I personally feel that a good security expo brings [&hellip;]\" \/>\r\n<meta property=\"og:url\" content=\"https:\/\/www.centsys.com\/fr\/your-2013-security-calendar-2\/\" \/>\r\n<meta property=\"og:site_name\" content=\"Centurion Systems French\" \/>\r\n<meta property=\"article:published_time\" content=\"2013-01-15T11:54:00+00:00\" \/>\r\n<meta name=\"author\" content=\"Charl Mijnhardt\" \/>\r\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\r\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Charl Mijnhardt\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\r\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/your-2013-security-calendar-2\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/your-2013-security-calendar-2\\\/\"},\"author\":{\"name\":\"Charl Mijnhardt\",\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/#\\\/schema\\\/person\\\/6afd42940835affc9fea5d60b03bbd23\"},\"headline\":\"Your 2013 Security Calendar\",\"datePublished\":\"2013-01-15T11:54:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/your-2013-security-calendar-2\\\/\"},\"wordCount\":579,\"commentCount\":0,\"articleSection\":[\"access control\",\"centurion systems\",\"security\"],\"inLanguage\":\"en-ZA\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.centsys.com\\\/fr\\\/your-2013-security-calendar-2\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/your-2013-security-calendar-2\\\/\",\"url\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/your-2013-security-calendar-2\\\/\",\"name\":\"Your 2013 Security Calendar - Centurion Systems French\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/#website\"},\"datePublished\":\"2013-01-15T11:54:00+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/#\\\/schema\\\/person\\\/6afd42940835affc9fea5d60b03bbd23\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/your-2013-security-calendar-2\\\/#breadcrumb\"},\"inLanguage\":\"en-ZA\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.centsys.com\\\/fr\\\/your-2013-security-calendar-2\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/your-2013-security-calendar-2\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Your 2013 Security Calendar\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/\",\"name\":\"Centurion Systems French\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-ZA\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/#\\\/schema\\\/person\\\/6afd42940835affc9fea5d60b03bbd23\",\"name\":\"Charl Mijnhardt\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-ZA\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/1f95e3317a72692ac83cadedc1b9a5dfb061967e746c01ba12a6573eac5a9c1b?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/1f95e3317a72692ac83cadedc1b9a5dfb061967e746c01ba12a6573eac5a9c1b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/1f95e3317a72692ac83cadedc1b9a5dfb061967e746c01ba12a6573eac5a9c1b?s=96&d=mm&r=g\",\"caption\":\"Charl Mijnhardt\"},\"url\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/author\\\/charl\\\/\"}]}<\/script>\r\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Your 2013 Security Calendar - Centurion Systems French","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.centsys.com\/fr\/your-2013-security-calendar-2\/","og_locale":"en_US","og_type":"article","og_title":"Your 2013 Security Calendar - Centurion Systems French","og_description":"As an avid security enthusiast, chances are you\u2019ll want to know what new technology is on offer in this arena, what innovations are making waves and which people are exerting influence. Fear not, weary traveller, for the information you seek is contained within these very pages! I personally feel that a good security expo brings [&hellip;]","og_url":"https:\/\/www.centsys.com\/fr\/your-2013-security-calendar-2\/","og_site_name":"Centurion Systems French","article_published_time":"2013-01-15T11:54:00+00:00","author":"Charl Mijnhardt","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Charl Mijnhardt","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.centsys.com\/fr\/your-2013-security-calendar-2\/#article","isPartOf":{"@id":"https:\/\/www.centsys.com\/fr\/your-2013-security-calendar-2\/"},"author":{"name":"Charl Mijnhardt","@id":"https:\/\/www.centsys.com\/fr\/#\/schema\/person\/6afd42940835affc9fea5d60b03bbd23"},"headline":"Your 2013 Security Calendar","datePublished":"2013-01-15T11:54:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.centsys.com\/fr\/your-2013-security-calendar-2\/"},"wordCount":579,"commentCount":0,"articleSection":["access control","centurion systems","security"],"inLanguage":"en-ZA","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.centsys.com\/fr\/your-2013-security-calendar-2\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.centsys.com\/fr\/your-2013-security-calendar-2\/","url":"https:\/\/www.centsys.com\/fr\/your-2013-security-calendar-2\/","name":"Your 2013 Security Calendar - Centurion Systems French","isPartOf":{"@id":"https:\/\/www.centsys.com\/fr\/#website"},"datePublished":"2013-01-15T11:54:00+00:00","author":{"@id":"https:\/\/www.centsys.com\/fr\/#\/schema\/person\/6afd42940835affc9fea5d60b03bbd23"},"breadcrumb":{"@id":"https:\/\/www.centsys.com\/fr\/your-2013-security-calendar-2\/#breadcrumb"},"inLanguage":"en-ZA","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.centsys.com\/fr\/your-2013-security-calendar-2\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.centsys.com\/fr\/your-2013-security-calendar-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.centsys.com\/fr\/"},{"@type":"ListItem","position":2,"name":"Your 2013 Security Calendar"}]},{"@type":"WebSite","@id":"https:\/\/www.centsys.com\/fr\/#website","url":"https:\/\/www.centsys.com\/fr\/","name":"Centurion Systems French","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.centsys.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-ZA"},{"@type":"Person","@id":"https:\/\/www.centsys.com\/fr\/#\/schema\/person\/6afd42940835affc9fea5d60b03bbd23","name":"Charl Mijnhardt","image":{"@type":"ImageObject","inLanguage":"en-ZA","@id":"https:\/\/secure.gravatar.com\/avatar\/1f95e3317a72692ac83cadedc1b9a5dfb061967e746c01ba12a6573eac5a9c1b?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/1f95e3317a72692ac83cadedc1b9a5dfb061967e746c01ba12a6573eac5a9c1b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1f95e3317a72692ac83cadedc1b9a5dfb061967e746c01ba12a6573eac5a9c1b?s=96&d=mm&r=g","caption":"Charl Mijnhardt"},"url":"https:\/\/www.centsys.com\/fr\/author\/charl\/"}]}},"_links":{"self":[{"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/posts\/9326","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/comments?post=9326"}],"version-history":[{"count":0,"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/posts\/9326\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/media?parent=9326"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/categories?post=9326"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/tags?post=9326"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}