{"id":9333,"date":"2012-08-02T16:24:00","date_gmt":"2012-08-02T14:24:00","guid":{"rendered":"http:\/\/www.centsys.co.za\/securing-the-masses-an-exploration-of-modern-access-control-2\/"},"modified":"2012-08-02T16:24:00","modified_gmt":"2012-08-02T14:24:00","slug":"securing-the-masses-an-exploration-of-modern-access-control-2","status":"publish","type":"post","link":"https:\/\/www.centsys.com\/fr\/securing-the-masses-an-exploration-of-modern-access-control-2\/","title":{"rendered":"Securing the Masses:  An Exploration of Modern Access Control"},"content":{"rendered":"<p>With the London Olympics now in full swing, the eyes of the world are once again fixed on the safety of the masses. It is this knowledge that has led us to ask the following pressing questions:<br \/>\n<strong>What new developments have been made in the world of security<\/strong>? What bold innovations are being implemented in a field that warrants such aggressive attention and constant evolution, and what trends are leading the way in terms of <strong>technology, usability, expandability<\/strong> and <strong>functionality<\/strong>?<\/p>\n<p>After all, as the great thinker and innovator da Vinci famously said: \u201cIron rusts from disuse; water loses its purity from stagnation&#8230;even so does inaction sap the vigour of the mind\u201d.<\/p>\n<p>This is an utterly apropos statement considering that security, when employed to its full potential, should be a <strong>mercurial force<\/strong> that is able to adapt to the times. Security as concept should be a <strong>shape-shifter<\/strong>, rearranging its various elements and changing its guise to best suit the socio-economic climate.<\/p>\n<p>Think about it.<\/p>\n<p>Five hundred years ago the biggest threat was that your castle would be attacked by the neighbouring kingdom (that is, of course, assuming that you were a member of nobility) and the need arose for some means of fortification. While weapons such as trebuchets and catapults could pack quite a wallop even from a distance, particular attention was given to securing the entrances and thus drawbridges, portcullises and barbicans became the norm.<\/p>\n<p>Today, intruders do not announce themselves with trumpets, war drums and battle cries \u2013 indeed, you only become aware that they have paid you an unsolicited visit once you arrive home to find your belongings gone. The modern criminal has undoubtedly become wilier, more resourceful, and as such one would like to believe that security has similarly evolved to catch the proverbial curveballs these evildoers like to throw at us.<\/p>\n<p><strong>So what has been making waves in this arena<\/strong>?<\/p>\n<p>The popularity of <strong>biometric authentication<\/strong> has certainly been on the increase, with futuristic-looking fingerprint readers gracing the entrances of many a high-security establishment. Indeed, in a marvellous display of forward thinking, certain banks have started implementing fingerprint identification in the entrance airlocks, requiring patrons to scan a thumb before being granted access. This is a brilliant innovation since it allows banks to have the fingerprints of those entering the premises on record should things go awry, effectively putting them one step ahead of criminals. The advent of biometrics is perhaps a sign that we are slowly transitioning out of an age in which we were separated from technology by virtue of biology, and into an era where our own DNA has become the access card. It was an inevitable \u2013 and necessary &#8211; change, and one which is lauded for its <strong>dependability<\/strong> and <strong>efficiency<\/strong> by those in the know. After all, DNA is something that \u2013 thus far, at least \u2013 is completely unique to the individual. What can be more secure than that?<br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-14628\" src=\"http:\/\/www.securitynewsdesk.com\/wp-content\/uploads\/2012\/08\/SAFLEC-AC-2500-RF-Biometric-Reader-295x300.jpg\" alt=\"CENTURION Biometric Readers\" width=\"295\" height=\"300\" \/><\/p>\n<p>Perhaps not surprisingly given our hectic lifestyles and the ever-present \u201crat race\u201d, <strong>modern security trends seem to favour mobility<\/strong>. People want to <strong>monitor and control<\/strong> what\u2019s going on at home or at the office while they\u2019re on the go. In this age of instant coffee and fast food, there is no time to stop and worry about security. Much like our favourite caffeinated beverage, <strong>security should be something that is instant<\/strong>.<\/p>\n<p><strong>Enter GSM technology<\/strong>.<\/p>\n<p>Ever since mobile phones became a natural extension of our arms, industry players have been looking for ways in which to bring security to the cell-front. This breakthrough came with the advent of <a title=\"CENTURION GSM Solutions\" href=\"http:\/\/www.centsys.com\/?q=ccategory,138,GSM_Devices\">GSM-modules <\/a>\u2013 intelligent devices that can be used for the activation of any number of electrical devices, and can also be configured to provide text message notifications when the unit\u2019s inputs are activated. The security benefits of this innovation are phenomenal. As an example of this, imagine being able to arm the alarm of your house in Cape Town while you\u2019re vacationing in Rome; or receiving a SMS notification that someone is tampering with your gate\u2019s infrared safety beams. GSM technology has made this possible.<br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-14630\" src=\"http:\/\/www.securitynewsdesk.com\/wp-content\/uploads\/2012\/08\/G-SWITCH-22-300x282.jpg\" alt=\"CEMTURION GSM Solutions\" width=\"300\" height=\"282\" \/><br \/>\nAnd what about the<a title=\"CENTURION Access Automation\" href=\"http:\/\/www.centsys.com\/?q=ccategory\"><strong> access automation<\/strong> <\/a>front, you may ask, how have things progressed since the days of manned booths and punch cards?<br \/>\nIf you are among those concerned that access automation has been stagnating for the last decade or so, you\u2019ll be relieved to know that some remarkable advances have been made in this arena, with everything from<strong> integrated timer technology<\/strong> to <a title=\"CENTURION Trapex Barrier Fence\" href=\"http:\/\/www.centsys.com\/?q=cproduct,49,TRAPEX_Barrier_Fence\"><strong>pedestrian access control<\/strong> <\/a>forming part of the list of available solutions.<\/p>\n<p>But let\u2019s take a moment to discuss the abovementioned timer technology, lest the importance and usefulness of it be ignored.<br \/>\nImagine, if you will, that you are the owner of an engineering firm the employees of which have all been issued with remote controls. At first glance this seems like a convenient access solution that leaves very little room for error. However, this means that workers now have access to the premises not only during working hours, but whenever it suits them. As you can well imagine, this leaves the system vulnerable and open to abuse. Timer functionality, and the feature known as \u201c<strong>time-barring<\/strong>\u201d in particular, addresses this security concern by allowing the user to inhibit certain inputs during pre-configured time periods. In laymen\u2019s terms what this means is that you can set up the system so that the remotes given to staff will only operate during working hours, and will be inhibited during weekends and after work.<\/p>\n<p>The field of security is, at the very least, one that is <strong>brimming with possibility<\/strong>. As much as criminals would like to believe that they are in the lead, the hi-tech innovations discussed above as well as countless others not mentioned in this article seem to indicate the contrary. We are in the midst of an exciting transformation, a <strong>security renaissance<\/strong> as it were, that could see us enter a whole new age; one in which biology might just come into play as the ultimate access control device, as evidenced by the rising popularity of biometrics.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>With the London Olympics now in full swing, the eyes of the world are once again fixed on the safety of the masses. It is this knowledge that has led us to ask the following pressing questions: What new developments have been made in the world of security? What bold innovations are being implemented in [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","_joinchat":[],"footnotes":""},"categories":[7,21,27,29,83,120],"tags":[],"class_list":["post-9333","post","type-post","status-publish","format-standard","hentry","category-access-control","category-biometric-readers","category-centurion","category-centurion-access-control","category-fingerprint-readers","category-gsm-module"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\r\n<title>Securing the Masses: An Exploration of Modern Access Control - Centurion Systems French<\/title>\r\n<meta name=\"description\" content=\"What trends are leading the way in terms of technology, expandability and functionality? This is an exploration of modern access control\" \/>\r\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\r\n<link rel=\"canonical\" href=\"https:\/\/www.centsys.com\/fr\/securing-the-masses-an-exploration-of-modern-access-control-2\/\" \/>\r\n<meta property=\"og:locale\" content=\"en_US\" \/>\r\n<meta property=\"og:type\" content=\"article\" \/>\r\n<meta property=\"og:title\" content=\"Securing the Masses: An Exploration of Modern Access Control - Centurion Systems French\" \/>\r\n<meta property=\"og:description\" content=\"What trends are leading the way in terms of technology, expandability and functionality? This is an exploration of modern access control\" \/>\r\n<meta property=\"og:url\" content=\"https:\/\/www.centsys.com\/fr\/securing-the-masses-an-exploration-of-modern-access-control-2\/\" \/>\r\n<meta property=\"og:site_name\" content=\"Centurion Systems French\" \/>\r\n<meta property=\"article:published_time\" content=\"2012-08-02T14:24:00+00:00\" \/>\r\n<meta property=\"og:image\" content=\"http:\/\/www.securitynewsdesk.com\/wp-content\/uploads\/2012\/08\/SAFLEC-AC-2500-RF-Biometric-Reader-295x300.jpg\" \/>\r\n<meta name=\"author\" content=\"Charl Mijnhardt\" \/>\r\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\r\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Charl Mijnhardt\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\r\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/securing-the-masses-an-exploration-of-modern-access-control-2\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/securing-the-masses-an-exploration-of-modern-access-control-2\\\/\"},\"author\":{\"name\":\"Charl Mijnhardt\",\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/#\\\/schema\\\/person\\\/6afd42940835affc9fea5d60b03bbd23\"},\"headline\":\"Securing the Masses: An Exploration of Modern Access Control\",\"datePublished\":\"2012-08-02T14:24:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/securing-the-masses-an-exploration-of-modern-access-control-2\\\/\"},\"wordCount\":1021,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/securing-the-masses-an-exploration-of-modern-access-control-2\\\/#primaryimage\"},\"thumbnailUrl\":\"http:\\\/\\\/www.securitynewsdesk.com\\\/wp-content\\\/uploads\\\/2012\\\/08\\\/SAFLEC-AC-2500-RF-Biometric-Reader-295x300.jpg\",\"articleSection\":[\"access control\",\"biometric readers\",\"centurion\",\"centurion access control\",\"fingerprint readers\",\"gsm module\"],\"inLanguage\":\"en-ZA\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.centsys.com\\\/fr\\\/securing-the-masses-an-exploration-of-modern-access-control-2\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/securing-the-masses-an-exploration-of-modern-access-control-2\\\/\",\"url\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/securing-the-masses-an-exploration-of-modern-access-control-2\\\/\",\"name\":\"Securing the Masses: An Exploration of Modern Access Control - Centurion Systems French\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/securing-the-masses-an-exploration-of-modern-access-control-2\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/securing-the-masses-an-exploration-of-modern-access-control-2\\\/#primaryimage\"},\"thumbnailUrl\":\"http:\\\/\\\/www.securitynewsdesk.com\\\/wp-content\\\/uploads\\\/2012\\\/08\\\/SAFLEC-AC-2500-RF-Biometric-Reader-295x300.jpg\",\"datePublished\":\"2012-08-02T14:24:00+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/#\\\/schema\\\/person\\\/6afd42940835affc9fea5d60b03bbd23\"},\"description\":\"What trends are leading the way in terms of technology, expandability and functionality? This is an exploration of modern access control\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/securing-the-masses-an-exploration-of-modern-access-control-2\\\/#breadcrumb\"},\"inLanguage\":\"en-ZA\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.centsys.com\\\/fr\\\/securing-the-masses-an-exploration-of-modern-access-control-2\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-ZA\",\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/securing-the-masses-an-exploration-of-modern-access-control-2\\\/#primaryimage\",\"url\":\"http:\\\/\\\/www.securitynewsdesk.com\\\/wp-content\\\/uploads\\\/2012\\\/08\\\/SAFLEC-AC-2500-RF-Biometric-Reader-295x300.jpg\",\"contentUrl\":\"http:\\\/\\\/www.securitynewsdesk.com\\\/wp-content\\\/uploads\\\/2012\\\/08\\\/SAFLEC-AC-2500-RF-Biometric-Reader-295x300.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/securing-the-masses-an-exploration-of-modern-access-control-2\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Securing the Masses: An Exploration of Modern Access Control\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/\",\"name\":\"Centurion Systems French\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-ZA\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/#\\\/schema\\\/person\\\/6afd42940835affc9fea5d60b03bbd23\",\"name\":\"Charl Mijnhardt\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-ZA\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/1f95e3317a72692ac83cadedc1b9a5dfb061967e746c01ba12a6573eac5a9c1b?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/1f95e3317a72692ac83cadedc1b9a5dfb061967e746c01ba12a6573eac5a9c1b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/1f95e3317a72692ac83cadedc1b9a5dfb061967e746c01ba12a6573eac5a9c1b?s=96&d=mm&r=g\",\"caption\":\"Charl Mijnhardt\"},\"url\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/author\\\/charl\\\/\"}]}<\/script>\r\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Securing the Masses: An Exploration of Modern Access Control - Centurion Systems French","description":"What trends are leading the way in terms of technology, expandability and functionality? This is an exploration of modern access control","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.centsys.com\/fr\/securing-the-masses-an-exploration-of-modern-access-control-2\/","og_locale":"en_US","og_type":"article","og_title":"Securing the Masses: An Exploration of Modern Access Control - Centurion Systems French","og_description":"What trends are leading the way in terms of technology, expandability and functionality? This is an exploration of modern access control","og_url":"https:\/\/www.centsys.com\/fr\/securing-the-masses-an-exploration-of-modern-access-control-2\/","og_site_name":"Centurion Systems French","article_published_time":"2012-08-02T14:24:00+00:00","og_image":[{"url":"http:\/\/www.securitynewsdesk.com\/wp-content\/uploads\/2012\/08\/SAFLEC-AC-2500-RF-Biometric-Reader-295x300.jpg","type":"","width":"","height":""}],"author":"Charl Mijnhardt","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Charl Mijnhardt","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.centsys.com\/fr\/securing-the-masses-an-exploration-of-modern-access-control-2\/#article","isPartOf":{"@id":"https:\/\/www.centsys.com\/fr\/securing-the-masses-an-exploration-of-modern-access-control-2\/"},"author":{"name":"Charl Mijnhardt","@id":"https:\/\/www.centsys.com\/fr\/#\/schema\/person\/6afd42940835affc9fea5d60b03bbd23"},"headline":"Securing the Masses: An Exploration of Modern Access Control","datePublished":"2012-08-02T14:24:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.centsys.com\/fr\/securing-the-masses-an-exploration-of-modern-access-control-2\/"},"wordCount":1021,"commentCount":0,"image":{"@id":"https:\/\/www.centsys.com\/fr\/securing-the-masses-an-exploration-of-modern-access-control-2\/#primaryimage"},"thumbnailUrl":"http:\/\/www.securitynewsdesk.com\/wp-content\/uploads\/2012\/08\/SAFLEC-AC-2500-RF-Biometric-Reader-295x300.jpg","articleSection":["access control","biometric readers","centurion","centurion access control","fingerprint readers","gsm module"],"inLanguage":"en-ZA","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.centsys.com\/fr\/securing-the-masses-an-exploration-of-modern-access-control-2\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.centsys.com\/fr\/securing-the-masses-an-exploration-of-modern-access-control-2\/","url":"https:\/\/www.centsys.com\/fr\/securing-the-masses-an-exploration-of-modern-access-control-2\/","name":"Securing the Masses: An Exploration of Modern Access Control - Centurion Systems French","isPartOf":{"@id":"https:\/\/www.centsys.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.centsys.com\/fr\/securing-the-masses-an-exploration-of-modern-access-control-2\/#primaryimage"},"image":{"@id":"https:\/\/www.centsys.com\/fr\/securing-the-masses-an-exploration-of-modern-access-control-2\/#primaryimage"},"thumbnailUrl":"http:\/\/www.securitynewsdesk.com\/wp-content\/uploads\/2012\/08\/SAFLEC-AC-2500-RF-Biometric-Reader-295x300.jpg","datePublished":"2012-08-02T14:24:00+00:00","author":{"@id":"https:\/\/www.centsys.com\/fr\/#\/schema\/person\/6afd42940835affc9fea5d60b03bbd23"},"description":"What trends are leading the way in terms of technology, expandability and functionality? This is an exploration of modern access control","breadcrumb":{"@id":"https:\/\/www.centsys.com\/fr\/securing-the-masses-an-exploration-of-modern-access-control-2\/#breadcrumb"},"inLanguage":"en-ZA","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.centsys.com\/fr\/securing-the-masses-an-exploration-of-modern-access-control-2\/"]}]},{"@type":"ImageObject","inLanguage":"en-ZA","@id":"https:\/\/www.centsys.com\/fr\/securing-the-masses-an-exploration-of-modern-access-control-2\/#primaryimage","url":"http:\/\/www.securitynewsdesk.com\/wp-content\/uploads\/2012\/08\/SAFLEC-AC-2500-RF-Biometric-Reader-295x300.jpg","contentUrl":"http:\/\/www.securitynewsdesk.com\/wp-content\/uploads\/2012\/08\/SAFLEC-AC-2500-RF-Biometric-Reader-295x300.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.centsys.com\/fr\/securing-the-masses-an-exploration-of-modern-access-control-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.centsys.com\/fr\/"},{"@type":"ListItem","position":2,"name":"Securing the Masses: An Exploration of Modern Access Control"}]},{"@type":"WebSite","@id":"https:\/\/www.centsys.com\/fr\/#website","url":"https:\/\/www.centsys.com\/fr\/","name":"Centurion Systems French","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.centsys.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-ZA"},{"@type":"Person","@id":"https:\/\/www.centsys.com\/fr\/#\/schema\/person\/6afd42940835affc9fea5d60b03bbd23","name":"Charl Mijnhardt","image":{"@type":"ImageObject","inLanguage":"en-ZA","@id":"https:\/\/secure.gravatar.com\/avatar\/1f95e3317a72692ac83cadedc1b9a5dfb061967e746c01ba12a6573eac5a9c1b?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/1f95e3317a72692ac83cadedc1b9a5dfb061967e746c01ba12a6573eac5a9c1b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1f95e3317a72692ac83cadedc1b9a5dfb061967e746c01ba12a6573eac5a9c1b?s=96&d=mm&r=g","caption":"Charl Mijnhardt"},"url":"https:\/\/www.centsys.com\/fr\/author\/charl\/"}]}},"_links":{"self":[{"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/posts\/9333","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/comments?post=9333"}],"version-history":[{"count":0,"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/posts\/9333\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/media?parent=9333"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/categories?post=9333"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/tags?post=9333"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}