{"id":126,"date":"2022-11-14T20:35:28","date_gmt":"2022-11-15T01:35:28","guid":{"rendered":"https:\/\/blogs.shu.edu\/policy-government-security\/?page_id=126"},"modified":"2022-11-22T13:49:24","modified_gmt":"2022-11-22T18:49:24","slug":"video-podcast","status":"publish","type":"page","link":"https:\/\/blogs.shu.edu\/policy-government-security\/video-podcast\/","title":{"rendered":"Video &amp; Podcast"},"content":{"rendered":"<h1>Link for Video<\/h1>\n<p><iframe loading=\"lazy\" title=\"DT&amp;L: Policy, Government, &amp; Security - Fall 2022 Disruptions Project at Seton Hall University\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/iX4uA_meOSA?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/p>\n<h1>Link for Podcast<\/h1>\n<p><iframe title=\"Spotify Embed: DT&amp;L: Policy, Government, &amp; Security - Project Podcast\" style=\"border-radius: 12px\" width=\"100%\" height=\"152\" frameborder=\"0\" allowfullscreen allow=\"autoplay; clipboard-write; encrypted-media; fullscreen; picture-in-picture\" loading=\"lazy\" src=\"https:\/\/open.spotify.com\/embed\/show\/5upMaiYXzVvkvF9WHxyzwS?si=d3512ab8852f4bbf&#038;utm_source=oembed\"><\/iframe><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Link for Video Link for Podcast<\/p>\n","protected":false},"author":5455,"featured_media":0,"parent":0,"menu_order":9,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[],"tags":[],"class_list":["post-126","page","type-page","status-publish","hentry","entry"],"_links":{"self":[{"href":"https:\/\/blogs.shu.edu\/policy-government-security\/wp-json\/wp\/v2\/pages\/126","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.shu.edu\/policy-government-security\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/blogs.shu.edu\/policy-government-security\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.shu.edu\/policy-government-security\/wp-json\/wp\/v2\/users\/5455"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.shu.edu\/policy-government-security\/wp-json\/wp\/v2\/comments?post=126"}],"version-history":[{"count":9,"href":"https:\/\/blogs.shu.edu\/policy-government-security\/wp-json\/wp\/v2\/pages\/126\/revisions"}],"predecessor-version":[{"id":212,"href":"https:\/\/blogs.shu.edu\/policy-government-security\/wp-json\/wp\/v2\/pages\/126\/revisions\/212"}],"wp:attachment":[{"href":"https:\/\/blogs.shu.edu\/policy-government-security\/wp-json\/wp\/v2\/media?parent=126"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.shu.edu\/policy-government-security\/wp-json\/wp\/v2\/categories?post=126"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.shu.edu\/policy-government-security\/wp-json\/wp\/v2\/tags?post=126"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}