{"id":2043,"date":"2023-02-28T11:53:54","date_gmt":"2023-02-28T10:53:54","guid":{"rendered":"https:\/\/thorex.site\/2023\/02\/28\/it-consulting\/"},"modified":"2023-02-28T11:53:54","modified_gmt":"2023-02-28T10:53:54","slug":"it-consulting","status":"publish","type":"post","link":"https:\/\/thorex.site\/en\/it-consulting\/","title":{"rendered":"IT consulting"},"content":{"rendered":"\n<ul class=\"wp-block-list\">\n<li>Determining the vulnerable locations is in the created IT-infrastructure<\/li>\n\n\n\n<li>Selection of server equipment and software<\/li>\n\n\n\n<li>Customization and adaptation of software products<\/li>\n\n\n\n<li>Automation of management processes<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":14,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[253],"tags":[],"class_list":["post-2043","post","type-post","status-publish","format-standard","hentry","category-services"],"acf":[],"_links":{"self":[{"href":"https:\/\/thorex.site\/en\/wp-json\/wp\/v2\/posts\/2043","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thorex.site\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thorex.site\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thorex.site\/en\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/thorex.site\/en\/wp-json\/wp\/v2\/comments?post=2043"}],"version-history":[{"count":0,"href":"https:\/\/thorex.site\/en\/wp-json\/wp\/v2\/posts\/2043\/revisions"}],"wp:attachment":[{"href":"https:\/\/thorex.site\/en\/wp-json\/wp\/v2\/media?parent=2043"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thorex.site\/en\/wp-json\/wp\/v2\/categories?post=2043"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thorex.site\/en\/wp-json\/wp\/v2\/tags?post=2043"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}