{"id":589,"date":"2011-12-25T08:46:44","date_gmt":"2011-12-25T08:46:44","guid":{"rendered":"http:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2011\/08\/logo.jpg"},"modified":"2015-05-02T09:17:24","modified_gmt":"2015-05-02T09:17:24","slug":"logo","status":"inherit","type":"attachment","link":"https:\/\/sapsecurityanalyst.com\/WP\/logo\/","title":{"rendered":"sap security analyst"},"author":1,"comment_status":"closed","ping_status":"open","template":"","meta":[],"description":{"rendered":"<p class=\"attachment\"><a href='https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2011\/08\/logo.jpg'><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"60\" src=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2011\/08\/logo-300x60.jpg\" class=\"attachment-medium size-medium\" alt=\"sap security analyst\" srcset=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2011\/08\/logo-300x60.jpg 300w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2011\/08\/logo-290x58.jpg 290w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2011\/08\/logo-150x30.jpg 150w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2011\/08\/logo.jpg 350w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n"},"caption":{"rendered":""},"alt_text":"sap security analyst","media_type":"image","mime_type":"image\/jpeg","media_details":{"width":"350","height":"70","hwstring_small":"height='25' width='128'","file":"2011\/08\/logo.jpg","sizes":{"thumbnail":{"file":"logo-150x70.jpg","width":"150","height":"70","source_url":"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2011\/08\/logo-150x70.jpg"},"medium":{"file":"logo-300x60.jpg","width":"300","height":"60","source_url":"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2011\/08\/logo-300x60.jpg"},"post-thumbnail":{"file":"logo-75x70.jpg","width":"75","height":"70","source_url":"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2011\/08\/logo-75x70.jpg"},"post-image-size":{"file":"logo-290x58.jpg","width":"290","height":"58","source_url":"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2011\/08\/logo-290x58.jpg"},"archive-image-size":{"file":"logo-150x30.jpg","width":"150","height":"30","source_url":"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2011\/08\/logo-150x30.jpg"},"full":{"file":"logo.jpg","width":350,"height":70,"mime_type":"image\/jpeg","source_url":"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2011\/08\/logo.jpg"}},"image_meta":{"aperture":"0","credit":"","camera":"","caption":"","created_timestamp":"0","copyright":"","focal_length":"0","iso":"0","shutter_speed":"0","title":""}},"post":null,"source_url":"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2011\/08\/logo.jpg","_links":{"self":[{"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/media\/589"}],"collection":[{"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/media"}],"about":[{"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/types\/attachment"}],"author":[{"embeddable":true,"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/comments?post=589"}]}}