{"id":9855,"date":"2025-07-26T12:28:19","date_gmt":"2025-07-26T12:28:19","guid":{"rendered":"https:\/\/hatchutah.org\/blog\/?p=9855"},"modified":"2025-07-26T12:28:22","modified_gmt":"2025-07-26T12:28:22","slug":"beyond-the-lock-how-access-control-is-redefining-the-modern-office","status":"publish","type":"post","link":"https:\/\/hatchutah.org\/blog\/beyond-the-lock-how-access-control-is-redefining-the-modern-office\/","title":{"rendered":"Beyond the Lock: How Access Control is Redefining the Modern Office"},"content":{"rendered":"\n<p>In today\u2019s office, identity is everything.<\/p>\n\n\n\n<p>From the moment an employee approaches the building to the second they log into their device, the system is paying attention. Not just to <em>who<\/em> they are, but to <em>how<\/em>, <em>when<\/em>, and <em>why<\/em> they engage with the space. In this landscape, access control is no longer just about keeping doors locked\u2014it\u2019s about managing presence in a smarter, safer, and more adaptable way.<\/p>\n\n\n\n<p>The modern workplace is shifting fast. Hybrid teams, flexible hours, shared environments, and connected tech have made yesterday\u2019s keycard system feel archaic. In its place? A new model of access control\u2014one that isn\u2019t just physical, but digital and dynamic.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>The Rise of Identity as Infrastructure<\/strong><\/h2>\n\n\n\n<p>At the core of this transformation is a simple truth: identity is the new perimeter.<\/p>\n\n\n\n<p>Traditional offices relied on physical boundaries\u2014locked doors, scheduled guards, monitored exits. But as people move between home and HQ, caf\u00e9 and coworking space, that model dissolves. What matters now is verifying <em>who<\/em> is accessing a space or system, not just <em>where<\/em> they are.<\/p>\n\n\n\n<p>Modern access control uses a range of technologies to make this happen:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Mobile credentials on smartphones<br><\/li>\n\n\n\n<li>Biometric authentication (fingerprint, face recognition)<br><\/li>\n\n\n\n<li>Cloud-based credential management systems<br><\/li>\n\n\n\n<li>Time-restricted, role-based access logic<br><\/li>\n<\/ul>\n\n\n\n<p>These tools don\u2019t just open doors\u2014they help organizations define what access <em>means<\/em>. And they do it at the speed of business.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>The Intersection of Physical and Digital Security<\/strong><\/h2>\n\n\n\n<p>As access control evolves, it blends seamlessly with broader IT ecosystems. Entry logs now feed directly into user activity audits. Door schedules align with calendar integrations. Visitor access is logged alongside Wi-Fi session history.<\/p>\n\n\n\n<p>This fusion of physical and digital access means that managing security isn\u2019t just about a building\u2014it\u2019s about an entire system of interactions.<\/p>\n\n\n\n<p>For example, when an employee badged into a facility after hours, did they also log into the corporate VPN? Was that access authorized? If not, should the building or system issue an alert? These are no longer IT hypotheticals\u2014they\u2019re operational realities.<\/p>\n\n\n\n<p>And this is where structured cabling plays a pivotal but quiet role. Behind every access reader and surveillance camera is a network of high-performance cabling that enables these systems to speak, in real time, without delay or signal degradation.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Flexible Access in a Flexible Workplace<\/strong><\/h2>\n\n\n\n<p>With hybrid models now the norm, access needs are no longer fixed.<\/p>\n\n\n\n<p>Employees work on different schedules, from different locations. Vendors need occasional access. Contractors may need to be granted privileges for a single hour or a single day. Traditional methods simply can\u2019t scale to these fluid demands.<\/p>\n\n\n\n<p>Modern access control enables remote provisioning and deactivation of credentials. It enables administrators to grant access through mobile apps, email links, or QR codes\u2014no need for in-person key handoffs or manual reprogramming.<\/p>\n\n\n\n<p>This shift enhances both security and efficiency. No one waits for a physical key. No one forgets to return a badge. And access logs stay current, clean, and complete.<\/p>\n\n\n\n<p>For organizations that support distributed workforces, this kind of flexibility is more than a convenience\u2014it\u2019s critical infrastructure.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Security Cameras as Access Allies<\/strong><\/h2>\n\n\n\n<p>It\u2019s a mistake to view access control and security cameras as separate systems. In an integrated office, they work together\u2014sometimes silently, sometimes visibly, always effectively.<\/p>\n\n\n\n<p>Consider the following workflow:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>A person uses a mobile credential to access a secure area<br><\/li>\n\n\n\n<li>A camera captures the moment of entry<br><\/li>\n\n\n\n<li>Facial recognition verifies that the person matches the credential<br><\/li>\n\n\n\n<li>Any mismatch triggers an alert or secondary verification<br><\/li>\n\n\n\n<li>All of this is logged, time-stamped, and available for review<br><\/li>\n<\/ul>\n\n\n\n<p>This kind of layered access management ensures that no single point of failure leads to vulnerability. If credentials are stolen or spoofed, visual verification can catch it. If footage is unclear, entry logs can clarify.<\/p>\n\n\n\n<p>It\u2019s not about paranoia\u2014it\u2019s about smart redundancy.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>The Role of IT Managed Services<\/strong><\/h2>\n\n\n\n<p>With access control now deeply embedded in company networks and data systems, managing it effectively requires constant oversight.<\/p>\n\n\n\n<p>IT managed services fill this role by:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Monitoring system performance and uptime<br><\/li>\n\n\n\n<li>Managing access credential databases<br><\/li>\n\n\n\n<li>Applying software updates and security patches<br><\/li>\n\n\n\n<li>Auditing logs for anomalies or compliance<br><\/li>\n\n\n\n<li>Troubleshooting hardware integrations<br><\/li>\n<\/ul>\n\n\n\n<p>In essence, they take access control from a set-and-forget system to a living, breathing part of the workplace ecosystem.<\/p>\n\n\n\n<p>And because access controls are only as good as their weakest point, having a dedicated IT partner ensures nothing slips through the cracks\u2014especially in high-volume environments like tech offices, healthcare facilities, and educational campuses.<\/p>\n\n\n\n<p>A professional <a href=\"https:\/\/complexsecuritysolutions.com\/\">security company in Milwaukee<\/a> understands how to bridge that gap between security hardware and digital backbone. Their approach aligns infrastructure and strategy to meet evolving operational needs.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Data-Driven Access Insights<\/strong><\/h2>\n\n\n\n<p>As access control systems become more advanced, they produce a valuable byproduct: data.<\/p>\n\n\n\n<p>That data can answer critical business questions:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Which entrances are used most often?<br><\/li>\n\n\n\n<li>When are peak traffic times?<br><\/li>\n\n\n\n<li>Are restricted zones being accessed appropriately?<br><\/li>\n\n\n\n<li>Can certain entry points be consolidated or reconfigured?<br><\/li>\n<\/ul>\n\n\n\n<p>The result is smarter decision-making not just about security\u2014but about design, staffing, and operations. In other words, access control stops being a cost center and becomes a source of insight.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>What\u2019s Next: Predictive Access Models<\/strong><\/h2>\n\n\n\n<p>The future of access control is predictive.<\/p>\n\n\n\n<p>By layering machine learning onto access patterns, systems may soon anticipate needs before a user makes them. Think doors unlocking when authorized users approach, zones lighting up based on usage trends, or alerts issued for behavior that <em>deviates<\/em> from a normal pattern rather than matching a blacklist.<\/p>\n\n\n\n<p>These innovations rely on a strong foundation\u2014both in terms of hardware (like structured cabling and reliable cameras) and in IT oversight (to manage configurations, privacy, and uptime).<\/p>\n\n\n\n<p>As offices continue to evolve, access control will only become more essential\u2014and more intelligent.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Final Thought: Access Is More Than Entry<\/strong><\/h2>\n\n\n\n<p>In the end, access control isn\u2019t about keeping people out. It\u2019s about letting the right people in, at the right time, under the right conditions.<\/p>\n\n\n\n<p>It\u2019s about making security seamless\u2014something that enhances flow rather than blocking it. It\u2019s about treating entry as part of experience, not just enforcement.<\/p>\n\n\n\n<p>With integrated technologies, strategic IT management, and scalable infrastructure, access control becomes a tool not of limitation\u2014but of liberation.<\/p>\n\n\n\n<p>And that\u2019s how smart businesses stay one step ahead.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In today\u2019s office, identity is everything. From the moment an employee approaches the building to the second they log into &#8230; <\/p>\n<p class=\"read-more-container\"><a title=\"Beyond the Lock: How Access Control is Redefining the Modern Office\" class=\"read-more button\" href=\"https:\/\/hatchutah.org\/blog\/beyond-the-lock-how-access-control-is-redefining-the-modern-office\/#more-9855\" aria-label=\"Read more about Beyond the Lock: How Access Control is Redefining the Modern Office\">Read more<\/a><\/p>\n","protected":false},"author":1,"featured_media":9855,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21],"tags":[],"class_list":["post-9855","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-technology","resize-featured-image"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Beyond the Lock: How Access Control is Redefining the Modern Office - Hatch Utah<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/hatchutah.org\/blog\/beyond-the-lock-how-access-control-is-redefining-the-modern-office\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Beyond the Lock: How Access Control is Redefining the Modern Office - Hatch Utah\" \/>\n<meta property=\"og:description\" content=\"In today\u2019s office, identity is everything. From the moment an employee approaches the building to the second they log into ... Read more\" \/>\n<meta property=\"og:url\" content=\"https:\/\/hatchutah.org\/blog\/beyond-the-lock-how-access-control-is-redefining-the-modern-office\/\" \/>\n<meta property=\"og:site_name\" content=\"Hatch Utah\" \/>\n<meta property=\"article:published_time\" content=\"2025-07-26T12:28:19+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-26T12:28:22+00:00\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/hatchutah.org\\\/blog\\\/beyond-the-lock-how-access-control-is-redefining-the-modern-office\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/hatchutah.org\\\/blog\\\/beyond-the-lock-how-access-control-is-redefining-the-modern-office\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/hatchutah.org\\\/blog\\\/#\\\/schema\\\/person\\\/b70614085676886fdb0287c80b64d3da\"},\"headline\":\"Beyond the Lock: How Access Control is Redefining the Modern Office\",\"datePublished\":\"2025-07-26T12:28:19+00:00\",\"dateModified\":\"2025-07-26T12:28:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/hatchutah.org\\\/blog\\\/beyond-the-lock-how-access-control-is-redefining-the-modern-office\\\/\"},\"wordCount\":1061,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/hatchutah.org\\\/blog\\\/beyond-the-lock-how-access-control-is-redefining-the-modern-office\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/framerusercontent.com\\\/images\\\/MnEoLkXYohI38FtxMphp4yQyR1U.png\",\"articleSection\":[\"Technology\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/hatchutah.org\\\/blog\\\/beyond-the-lock-how-access-control-is-redefining-the-modern-office\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/hatchutah.org\\\/blog\\\/beyond-the-lock-how-access-control-is-redefining-the-modern-office\\\/\",\"url\":\"https:\\\/\\\/hatchutah.org\\\/blog\\\/beyond-the-lock-how-access-control-is-redefining-the-modern-office\\\/\",\"name\":\"Beyond the Lock: How Access Control is Redefining the Modern Office - Hatch Utah\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/hatchutah.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/hatchutah.org\\\/blog\\\/beyond-the-lock-how-access-control-is-redefining-the-modern-office\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/hatchutah.org\\\/blog\\\/beyond-the-lock-how-access-control-is-redefining-the-modern-office\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/framerusercontent.com\\\/images\\\/MnEoLkXYohI38FtxMphp4yQyR1U.png\",\"datePublished\":\"2025-07-26T12:28:19+00:00\",\"dateModified\":\"2025-07-26T12:28:22+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/hatchutah.org\\\/blog\\\/#\\\/schema\\\/person\\\/b70614085676886fdb0287c80b64d3da\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/hatchutah.org\\\/blog\\\/beyond-the-lock-how-access-control-is-redefining-the-modern-office\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/hatchutah.org\\\/blog\\\/beyond-the-lock-how-access-control-is-redefining-the-modern-office\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/hatchutah.org\\\/blog\\\/beyond-the-lock-how-access-control-is-redefining-the-modern-office\\\/#primaryimage\",\"url\":\"https:\\\/\\\/framerusercontent.com\\\/images\\\/MnEoLkXYohI38FtxMphp4yQyR1U.png\",\"contentUrl\":\"https:\\\/\\\/framerusercontent.com\\\/images\\\/MnEoLkXYohI38FtxMphp4yQyR1U.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/hatchutah.org\\\/blog\\\/beyond-the-lock-how-access-control-is-redefining-the-modern-office\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/hatchutah.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Beyond the Lock: How Access Control is Redefining the Modern Office\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/hatchutah.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/hatchutah.org\\\/blog\\\/\",\"name\":\"Hatch Utah\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/hatchutah.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/hatchutah.org\\\/blog\\\/#\\\/schema\\\/person\\\/b70614085676886fdb0287c80b64d3da\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/4bd3ee5575057524f760a0b01df3fdf6861bbdc0b55eeb232b714e95ff1e6acc?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/4bd3ee5575057524f760a0b01df3fdf6861bbdc0b55eeb232b714e95ff1e6acc?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/4bd3ee5575057524f760a0b01df3fdf6861bbdc0b55eeb232b714e95ff1e6acc?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\\\/\\\/hatchutah.org\\\/blog\"],\"url\":\"https:\\\/\\\/hatchutah.org\\\/blog\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Beyond the Lock: How Access Control is Redefining the Modern Office - Hatch Utah","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/hatchutah.org\/blog\/beyond-the-lock-how-access-control-is-redefining-the-modern-office\/","og_locale":"en_US","og_type":"article","og_title":"Beyond the Lock: How Access Control is Redefining the Modern Office - Hatch Utah","og_description":"In today\u2019s office, identity is everything. From the moment an employee approaches the building to the second they log into ... Read more","og_url":"https:\/\/hatchutah.org\/blog\/beyond-the-lock-how-access-control-is-redefining-the-modern-office\/","og_site_name":"Hatch Utah","article_published_time":"2025-07-26T12:28:19+00:00","article_modified_time":"2025-07-26T12:28:22+00:00","author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/hatchutah.org\/blog\/beyond-the-lock-how-access-control-is-redefining-the-modern-office\/#article","isPartOf":{"@id":"https:\/\/hatchutah.org\/blog\/beyond-the-lock-how-access-control-is-redefining-the-modern-office\/"},"author":{"name":"admin","@id":"https:\/\/hatchutah.org\/blog\/#\/schema\/person\/b70614085676886fdb0287c80b64d3da"},"headline":"Beyond the Lock: How Access Control is Redefining the Modern Office","datePublished":"2025-07-26T12:28:19+00:00","dateModified":"2025-07-26T12:28:22+00:00","mainEntityOfPage":{"@id":"https:\/\/hatchutah.org\/blog\/beyond-the-lock-how-access-control-is-redefining-the-modern-office\/"},"wordCount":1061,"commentCount":0,"image":{"@id":"https:\/\/hatchutah.org\/blog\/beyond-the-lock-how-access-control-is-redefining-the-modern-office\/#primaryimage"},"thumbnailUrl":"https:\/\/framerusercontent.com\/images\/MnEoLkXYohI38FtxMphp4yQyR1U.png","articleSection":["Technology"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/hatchutah.org\/blog\/beyond-the-lock-how-access-control-is-redefining-the-modern-office\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/hatchutah.org\/blog\/beyond-the-lock-how-access-control-is-redefining-the-modern-office\/","url":"https:\/\/hatchutah.org\/blog\/beyond-the-lock-how-access-control-is-redefining-the-modern-office\/","name":"Beyond the Lock: How Access Control is Redefining the Modern Office - Hatch Utah","isPartOf":{"@id":"https:\/\/hatchutah.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/hatchutah.org\/blog\/beyond-the-lock-how-access-control-is-redefining-the-modern-office\/#primaryimage"},"image":{"@id":"https:\/\/hatchutah.org\/blog\/beyond-the-lock-how-access-control-is-redefining-the-modern-office\/#primaryimage"},"thumbnailUrl":"https:\/\/framerusercontent.com\/images\/MnEoLkXYohI38FtxMphp4yQyR1U.png","datePublished":"2025-07-26T12:28:19+00:00","dateModified":"2025-07-26T12:28:22+00:00","author":{"@id":"https:\/\/hatchutah.org\/blog\/#\/schema\/person\/b70614085676886fdb0287c80b64d3da"},"breadcrumb":{"@id":"https:\/\/hatchutah.org\/blog\/beyond-the-lock-how-access-control-is-redefining-the-modern-office\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/hatchutah.org\/blog\/beyond-the-lock-how-access-control-is-redefining-the-modern-office\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/hatchutah.org\/blog\/beyond-the-lock-how-access-control-is-redefining-the-modern-office\/#primaryimage","url":"https:\/\/framerusercontent.com\/images\/MnEoLkXYohI38FtxMphp4yQyR1U.png","contentUrl":"https:\/\/framerusercontent.com\/images\/MnEoLkXYohI38FtxMphp4yQyR1U.png"},{"@type":"BreadcrumbList","@id":"https:\/\/hatchutah.org\/blog\/beyond-the-lock-how-access-control-is-redefining-the-modern-office\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/hatchutah.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Beyond the Lock: How Access Control is Redefining the Modern Office"}]},{"@type":"WebSite","@id":"https:\/\/hatchutah.org\/blog\/#website","url":"https:\/\/hatchutah.org\/blog\/","name":"Hatch Utah","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/hatchutah.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/hatchutah.org\/blog\/#\/schema\/person\/b70614085676886fdb0287c80b64d3da","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/4bd3ee5575057524f760a0b01df3fdf6861bbdc0b55eeb232b714e95ff1e6acc?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/4bd3ee5575057524f760a0b01df3fdf6861bbdc0b55eeb232b714e95ff1e6acc?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4bd3ee5575057524f760a0b01df3fdf6861bbdc0b55eeb232b714e95ff1e6acc?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/hatchutah.org\/blog"],"url":"https:\/\/hatchutah.org\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/hatchutah.org\/blog\/wp-json\/wp\/v2\/posts\/9855","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hatchutah.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hatchutah.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hatchutah.org\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/hatchutah.org\/blog\/wp-json\/wp\/v2\/comments?post=9855"}],"version-history":[{"count":1,"href":"https:\/\/hatchutah.org\/blog\/wp-json\/wp\/v2\/posts\/9855\/revisions"}],"predecessor-version":[{"id":9856,"href":"https:\/\/hatchutah.org\/blog\/wp-json\/wp\/v2\/posts\/9855\/revisions\/9856"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/hatchutah.org\/blog\/wp-json\/wp\/v2\/posts\/9855"}],"wp:attachment":[{"href":"https:\/\/hatchutah.org\/blog\/wp-json\/wp\/v2\/media?parent=9855"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hatchutah.org\/blog\/wp-json\/wp\/v2\/categories?post=9855"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hatchutah.org\/blog\/wp-json\/wp\/v2\/tags?post=9855"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}