{"id":101120,"date":"2022-08-10T04:00:00","date_gmt":"2022-08-10T04:00:00","guid":{"rendered":"https:\/\/omni48.com\/news\/turn-time-into-value"},"modified":"2022-08-10T04:00:00","modified_gmt":"2022-08-10T04:00:00","slug":"turn-time-into-value","status":"publish","type":"post","link":"https:\/\/omni48.com\/news\/turn-time-into-value","title":{"rendered":"TURN Time Into Value"},"content":{"rendered":"","protected":false},"excerpt":{"rendered":"<p>Web2 software engineers have benefitted from design standards, mature programming languages, and vulnerability tools to minimize the risks of an attack. Failure to do so can&#8230;<\/p>\n","protected":false},"author":0,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[303,1],"tags":[154,145,34],"class_list":["post-101120","post","type-post","status-publish","format-standard","hentry","category-computers","category-news","tag-computers","tag-ethereum","tag-technology"],"acf":[],"_links":{"self":[{"href":"https:\/\/omni48.com\/api\/wp\/v2\/posts\/101120","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/omni48.com\/api\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/omni48.com\/api\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/omni48.com\/api\/wp\/v2\/comments?post=101120"}],"version-history":[{"count":0,"href":"https:\/\/omni48.com\/api\/wp\/v2\/posts\/101120\/revisions"}],"wp:attachment":[{"href":"https:\/\/omni48.com\/api\/wp\/v2\/media?parent=101120"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/omni48.com\/api\/wp\/v2\/categories?post=101120"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/omni48.com\/api\/wp\/v2\/tags?post=101120"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}