{"id":3076,"date":"2023-05-01T11:56:58","date_gmt":"2023-05-01T09:56:58","guid":{"rendered":"https:\/\/riwers.io\/?post_type=customer&#038;p=3076"},"modified":"2023-07-31T09:19:49","modified_gmt":"2023-07-31T07:19:49","slug":"cyrinas","status":"publish","type":"customer","link":"https:\/\/riwers.io\/en\/blog\/customer\/cyrinas\/","title":{"rendered":"Product Development web application cyber security training"},"excerpt":{"rendered":"","protected":false},"author":3,"featured_media":2215,"menu_order":0,"template":"","industry":[771,767],"tech-stack":[612,598],"value-area":[779],"class_list":["post-3076","customer","type-customer","status-publish","has-post-thumbnail","hentry","industry-cyber-security","industry-training","tech-stack-java","tech-stack-reactjs","value-area-team"],"acf":[],"_links":{"self":[{"href":"https:\/\/riwers.io\/en\/wp-json\/wp\/v2\/customer\/3076","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/riwers.io\/en\/wp-json\/wp\/v2\/customer"}],"about":[{"href":"https:\/\/riwers.io\/en\/wp-json\/wp\/v2\/types\/customer"}],"author":[{"embeddable":true,"href":"https:\/\/riwers.io\/en\/wp-json\/wp\/v2\/users\/3"}],"version-history":[{"count":0,"href":"https:\/\/riwers.io\/en\/wp-json\/wp\/v2\/customer\/3076\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/riwers.io\/en\/wp-json\/wp\/v2\/media\/2215"}],"wp:attachment":[{"href":"https:\/\/riwers.io\/en\/wp-json\/wp\/v2\/media?parent=3076"}],"wp:term":[{"taxonomy":"industry","embeddable":true,"href":"https:\/\/riwers.io\/en\/wp-json\/wp\/v2\/industry?post=3076"},{"taxonomy":"tech-stack","embeddable":true,"href":"https:\/\/riwers.io\/en\/wp-json\/wp\/v2\/tech-stack?post=3076"},{"taxonomy":"value-area","embeddable":true,"href":"https:\/\/riwers.io\/en\/wp-json\/wp\/v2\/value-area?post=3076"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}