{"id":1118,"date":"2024-03-12T12:08:27","date_gmt":"2024-03-12T12:08:27","guid":{"rendered":"https:\/\/tmlnet.com\/%e1%83%99%e1%83%9d%e1%83%9b%e1%83%9e%e1%83%98%e1%83%a3%e1%83%a2%e1%83%94%e1%83%a0%e1%83%a3%e1%83%9a%e1%83%98-%e1%83%a5%e1%83%a1%e1%83%94%e1%83%9a%e1%83%94%e1%83%91%e1%83%98-%e1%83%a1%e1%83%90%e1%83%98\/"},"modified":"2024-04-19T15:44:57","modified_gmt":"2024-04-19T15:44:57","slug":"computer-networks-information-technologies","status":"publish","type":"post","link":"https:\/\/tmlnet.com\/en\/computer-networks-information-technologies\/","title":{"rendered":"Computer networks\/information technologies"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"1118\" class=\"elementor elementor-1118 elementor-463\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1f8e547 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"1f8e547\" data-element_type=\"section\" data-settings=\"{&quot;shape_divider_bottom&quot;:&quot;tilt&quot;,&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t<div class=\"elementor-shape elementor-shape-bottom\" aria-hidden=\"true\" data-negative=\"false\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 1000 100\" preserveAspectRatio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M0,6V0h1000v100L0,6z\"\/>\n<\/svg>\t\t<\/div>\n\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7666c3e7\" data-id=\"7666c3e7\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7b5dbbae elementor-widget__width-auto elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"7b5dbbae\" data-element_type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<i aria-hidden=\"true\" class=\"jki jki-user-light\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2278bcd9 elementor-widget__width-auto elementor-widget elementor-widget-jkit_post_author\" data-id=\"2278bcd9\" data-element_type=\"widget\" data-widget_type=\"jkit_post_author.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div  class=\"jeg-elementor-kit jkit-post-author jeg_module___69f19685c2169\" ><p class=\"post-author \">tml<\/p><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fd21f8b elementor-widget__width-auto elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"fd21f8b\" data-element_type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<i aria-hidden=\"true\" class=\"jki jki-calendar3-light\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-630ee793 elementor-widget__width-auto elementor-widget elementor-widget-jkit_post_date\" data-id=\"630ee793\" data-element_type=\"widget\" data-widget_type=\"jkit_post_date.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div  class=\"jeg-elementor-kit jkit-post-date jeg_module__1_69f19685c2ba0\" ><p class=\"post-date \">March 12, 2024<\/p><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2dd67197 elementor-widget elementor-widget-jkit_post_title\" data-id=\"2dd67197\" data-element_type=\"widget\" data-widget_type=\"jkit_post_title.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div  class=\"jeg-elementor-kit jkit-post-title jeg_module__2_69f19685c35a4\" ><h2 class=\"post-title style-color \">Computer networks\/information technologies<\/h2><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3d939ada elementor-reverse-tablet elementor-reverse-mobile elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"3d939ada\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1ffdc3f9\" data-id=\"1ffdc3f9\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-307fd3ed elementor-widget elementor-widget-jkit_post_featured_image\" data-id=\"307fd3ed\" data-element_type=\"widget\" data-widget_type=\"jkit_post_featured_image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div  class=\"jeg-elementor-kit jkit-post-featured-image jeg_module__3_69f19685c4dc7\" ><div class=\"post-featured-image \"><img fetchpriority=\"high\" decoding=\"async\" width=\"1920\" height=\"1080\" src=\"https:\/\/tmlnet.com\/wp-content\/uploads\/2024\/03\/network-cables-wallpaper-high-definition-For-Widescreen-Wallpaper.jpg\" class=\"attachment-full size-full wp-post-image\" alt=\"\" srcset=\"https:\/\/tmlnet.com\/wp-content\/uploads\/2024\/03\/network-cables-wallpaper-high-definition-For-Widescreen-Wallpaper.jpg 1920w, https:\/\/tmlnet.com\/wp-content\/uploads\/2024\/03\/network-cables-wallpaper-high-definition-For-Widescreen-Wallpaper-300x169.jpg 300w, https:\/\/tmlnet.com\/wp-content\/uploads\/2024\/03\/network-cables-wallpaper-high-definition-For-Widescreen-Wallpaper-1024x576.jpg 1024w, https:\/\/tmlnet.com\/wp-content\/uploads\/2024\/03\/network-cables-wallpaper-high-definition-For-Widescreen-Wallpaper-768x432.jpg 768w, https:\/\/tmlnet.com\/wp-content\/uploads\/2024\/03\/network-cables-wallpaper-high-definition-For-Widescreen-Wallpaper-1536x864.jpg 1536w, https:\/\/tmlnet.com\/wp-content\/uploads\/2024\/03\/network-cables-wallpaper-high-definition-For-Widescreen-Wallpaper-1568x882.jpg 1568w\" sizes=\"(max-width: 1920px) 100vw, 1920px\" title=\"\"><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-7e218ef elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"7e218ef\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-710e4f06\" data-id=\"710e4f06\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4e81c1e4 elementor-widget elementor-widget-text-editor\" data-id=\"4e81c1e4\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Computer networks and proper information technology (IT) management are essential components of modern business operations. Here is some information about both:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-4c47e811 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"4c47e811\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-5ac40c23\" data-id=\"5ac40c23\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-676c54f4 elementor-widget elementor-widget-heading\" data-id=\"676c54f4\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Computer networks:<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6fcf58e elementor-widget elementor-widget-text-editor\" data-id=\"6fcf58e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>A computer network is a system that allows multiple computers and other devices to communicate and share resources such as files, printers, and Internet access.<\/p><p>Types of computer networks include local area networks (LANs), wide area networks (WANs), and wireless networks (Wi-Fi).<\/p><p>LANs typically cover a small geographic area, such as a single building or campus, while WANs can span large distances, connecting multiple LANs in different locations.<\/p><p>Optical networks are telecommunications networks that use optical fibers to transmit data in the form of light pulses. These networks are widely used for a variety of applications, including telecommunications, the Internet, cable television, and enterprise networking.<\/p><p>Computer network components include hardware devices such as routers, switches, and access points, as well as software protocols such as TCP\/IP that facilitate communication between devices. Computer networks play an important role in collaboration, resource sharing, and information access within organizations.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-34502bbc\" data-id=\"34502bbc\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-484638d elementor-widget elementor-widget-spacer\" data-id=\"484638d\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-39eceb69 elementor-widget elementor-widget-heading\" data-id=\"39eceb69\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Correct management of information technology:<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1fa4ba37 elementor-widget elementor-widget-text-editor\" data-id=\"1fa4ba37\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Good IT management includes various practices and strategies aimed at effectively using, maintaining and protecting technological resources within the organization.<\/p><p>IT management includes tasks such as strategic planning, budgeting, procurement, deployment, and ongoing maintenance of hardware, software, and network infrastructure.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-038181d elementor-widget elementor-widget-heading\" data-id=\"038181d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">The main areas of IT management include:<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-02ab372 elementor-widget elementor-widget-text-editor\" data-id=\"02ab372\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Strategic Planning: Aligning IT initiatives with business goals and objectives.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e34413a elementor-widget elementor-widget-heading\" data-id=\"e34413a\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">IT Governance:<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dd26a9f elementor-widget elementor-widget-text-editor\" data-id=\"dd26a9f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Establishing policies, procedures and controls to ensure appropriate use and security of technology resources.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c271a79 elementor-widget elementor-widget-heading\" data-id=\"c271a79\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Risk management:<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6e7b2eb elementor-widget elementor-widget-text-editor\" data-id=\"6e7b2eb\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Identify and mitigate risks related to cyber security threats, data breaches, system failures and regulatory compliance.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e86114d elementor-widget elementor-widget-heading\" data-id=\"e86114d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Project management:<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-69fa4af elementor-widget elementor-widget-text-editor\" data-id=\"69fa4af\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Oversee IT projects, including software development, system upgrades, and infrastructure deployments to ensure they are completed on time and within budget.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-12601cb elementor-widget elementor-widget-heading\" data-id=\"12601cb\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Asset Management:<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a8ab8cf elementor-widget elementor-widget-text-editor\" data-id=\"a8ab8cf\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Track and manage IT assets such as hardware, software licenses and digital resources to optimize their use and minimize costs.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a5b6013 elementor-widget elementor-widget-heading\" data-id=\"a5b6013\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Security management:<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e08995e elementor-widget elementor-widget-text-editor\" data-id=\"e08995e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Implementing measures to protect against unauthorized access, data loss and other security threats, including the use of firewalls, anti-virus software, encryption and access controls.<\/p><p>Effective IT management requires collaboration between IT professionals, business leaders, and other stakeholders to ensure that technology investments support the organization&#8217;s overall goals and contribute to its success.<\/p><p>In summary, computer networks are essential to facilitate communication and resource sharing within organizations, and the proper management of information technology includes strategic planning, governance, risk management, and security measures to ensure the efficient and secure use of technological resources.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-58941632 elementor-widget elementor-widget-image\" data-id=\"58941632\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"2560\" height=\"1440\" src=\"https:\/\/tmlnet.com\/wp-content\/uploads\/2024\/03\/1f7fe4c59d9bd0a20b111ed60f19df040bd67fe4_3000_1688_c-min-scaled.jpg\" class=\"attachment-full size-full wp-image-413\" alt=\"\" srcset=\"https:\/\/tmlnet.com\/wp-content\/uploads\/2024\/03\/1f7fe4c59d9bd0a20b111ed60f19df040bd67fe4_3000_1688_c-min-scaled.jpg 2560w, https:\/\/tmlnet.com\/wp-content\/uploads\/2024\/03\/1f7fe4c59d9bd0a20b111ed60f19df040bd67fe4_3000_1688_c-min-300x169.jpg 300w, https:\/\/tmlnet.com\/wp-content\/uploads\/2024\/03\/1f7fe4c59d9bd0a20b111ed60f19df040bd67fe4_3000_1688_c-min-1024x576.jpg 1024w, https:\/\/tmlnet.com\/wp-content\/uploads\/2024\/03\/1f7fe4c59d9bd0a20b111ed60f19df040bd67fe4_3000_1688_c-min-768x432.jpg 768w, https:\/\/tmlnet.com\/wp-content\/uploads\/2024\/03\/1f7fe4c59d9bd0a20b111ed60f19df040bd67fe4_3000_1688_c-min-1536x864.jpg 1536w, https:\/\/tmlnet.com\/wp-content\/uploads\/2024\/03\/1f7fe4c59d9bd0a20b111ed60f19df040bd67fe4_3000_1688_c-min-2048x1152.jpg 2048w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" title=\"\">\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>tml \u10db\u10d0\u10e0\u10e2\u10d8 12, 2024 Computer networks\/information technologies Computer networks and proper information technology (IT) management are essential components of modern business operations. Here is some information about both: Computer networks: A computer network is a system that allows multiple computers and other devices to communicate and share resources such as files, printers, and Internet access. [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1878,"comment_status":"open","ping_status":"open","sticky":false,"template":"elementor_header_footer","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[],"class_list":["post-1118","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/tmlnet.com\/en\/wp-json\/wp\/v2\/posts\/1118","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/tmlnet.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/tmlnet.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/tmlnet.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/tmlnet.com\/en\/wp-json\/wp\/v2\/comments?post=1118"}],"version-history":[{"count":7,"href":"https:\/\/tmlnet.com\/en\/wp-json\/wp\/v2\/posts\/1118\/revisions"}],"predecessor-version":[{"id":1654,"href":"https:\/\/tmlnet.com\/en\/wp-json\/wp\/v2\/posts\/1118\/revisions\/1654"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/tmlnet.com\/en\/wp-json\/wp\/v2\/media\/1878"}],"wp:attachment":[{"href":"https:\/\/tmlnet.com\/en\/wp-json\/wp\/v2\/media?parent=1118"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/tmlnet.com\/en\/wp-json\/wp\/v2\/categories?post=1118"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/tmlnet.com\/en\/wp-json\/wp\/v2\/tags?post=1118"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}