{"id":311,"date":"2010-11-25T10:25:07","date_gmt":"2010-11-25T10:25:07","guid":{"rendered":"http:\/\/psyphi.net\/blog\/?p=311"},"modified":"2010-11-25T10:25:07","modified_gmt":"2010-11-25T10:25:07","slug":"bookmarks-for-november-15th-through-november-25th","status":"publish","type":"post","link":"https:\/\/psyphi.net\/blog\/2010\/11\/bookmarks-for-november-15th-through-november-25th\/","title":{"rendered":"Bookmarks for November 15th through November 25th"},"content":{"rendered":"<p>These are my links for November 15th through November 25th:<\/p>\n<ul>\n<li><a href=\"http:\/\/gephi.org\/\">Gephi, an open source graph visualization and manipulation software<\/a> &#8211; <\/li>\n<li><a href=\"http:\/\/openinfosecfoundation.org\/\">The Open Information Security Foundation &#8211; The Open Information Security Foundation<\/a> &#8211; <\/li>\n<li><a href=\"http:\/\/www.mil-oss.org\/\">Mil-OSS<\/a> &#8211; <\/li>\n<li><a href=\"http:\/\/www.sensefly.com\/products\/swinglet-cam\/\">senseFly &#8211; swinglet CAM<\/a> &#8211; <\/li>\n<li><a href=\"http:\/\/www.haiku-os.org\/\">Home | Haiku Project<\/a> &#8211; <\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>These are my links for November 15th through November 25th: Gephi, an open source graph visualization and manipulation software &#8211; The Open Information Security Foundation &#8211; The Open Information Security Foundation &#8211; Mil-OSS &#8211; senseFly &#8211; swinglet CAM &#8211; Home | Haiku Project &#8211;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[1],"tags":[566,563,574,559,572,513,568,561,565,575,139,573,571,463,570,569,562,275,576,59,558,257,557,567,564,159,1090,258,374,310,560,84],"class_list":["post-311","post","type-post","status-publish","format-standard","hentry","category-uncategorized","tag-aerial","tag-aircraft","tag-analysis","tag-beos","tag-cybersec","tag-datamining","tag-drone","tag-flight","tag-gps","tag-graph","tag-hacking","tag-ids","tag-infosec","tag-infoviz","tag-mil","tag-military","tag-model","tag-networking","tag-networks","tag-opensource","tag-operating","tag-os","tag-oss","tag-photography","tag-radiocontrol","tag-robotics","tag-security","tag-software","tag-surveillance","tag-systems","tag-uav","tag-visualisation"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/psyphi.net\/blog\/wp-json\/wp\/v2\/posts\/311","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/psyphi.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/psyphi.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/psyphi.net\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/psyphi.net\/blog\/wp-json\/wp\/v2\/comments?post=311"}],"version-history":[{"count":4,"href":"https:\/\/psyphi.net\/blog\/wp-json\/wp\/v2\/posts\/311\/revisions"}],"predecessor-version":[{"id":315,"href":"https:\/\/psyphi.net\/blog\/wp-json\/wp\/v2\/posts\/311\/revisions\/315"}],"wp:attachment":[{"href":"https:\/\/psyphi.net\/blog\/wp-json\/wp\/v2\/media?parent=311"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/psyphi.net\/blog\/wp-json\/wp\/v2\/categories?post=311"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/psyphi.net\/blog\/wp-json\/wp\/v2\/tags?post=311"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}