{"id":2673,"date":"2016-03-02T10:36:07","date_gmt":"2016-03-02T09:36:07","guid":{"rendered":"http:\/\/andreas-wolter.com\/vortraege-fuer-die-grossen-konferenzen-2016-eingereicht\/"},"modified":"2017-10-18T10:57:59","modified_gmt":"2017-10-18T09:57:59","slug":"sessions-submitted-for-conferences-2016","status":"publish","type":"post","link":"https:\/\/andreas-wolter.com\/en\/sessions-submitted-for-conferences-2016\/","title":{"rendered":"Sessions submitted for major conferences 2016. Topics: Security \u2013 Performance \u2013 In-Memory"},"content":{"rendered":"\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_heading-2b3a5d9ddd0383189707991e5a6c099d\">\n#top .av-special-heading.av-av_heading-2b3a5d9ddd0383189707991e5a6c099d{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-av_heading-2b3a5d9ddd0383189707991e5a6c099d .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-av_heading-2b3a5d9ddd0383189707991e5a6c099d .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-av_heading-2b3a5d9ddd0383189707991e5a6c099d av-special-heading-h3 blockquote modern-quote  avia-builder-el-0  el_before_av_textblock  avia-builder-el-first '><h3 class='av-special-heading-tag'  itemprop=\"headline\"  >Sessions submitted for major conferences 2016. <\/h3><div class='av-subheading av-subheading_below'><p>Topics: Security \u2013 Performance \u2013 In-Memory<\/p>\n<\/div><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div>\r\n\r\n<section  class='av_textblock_section av-av_textblock-2de302bf1aa3cf4c9157dbe6f50ac7eb '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p>After the great success of the German <a href=\"http:\/\/sqlkonferenz.de\/\" target=\"_blank\" rel=\"noopener\"><strong>SQLKonferenz<\/strong><\/a> in February, where I had the honor of presenting the <strong>new security features of SQL Server 2016<\/strong> together with <strong>Joachim Hammer,<\/strong> the <strong>Program Manager of the security teams<\/strong> of the relational SQL Engines at Microsoft in Redmond (<a href=\"http:\/\/www.insidesql.org\/blogs\/andreaswolter\/2016\/02\/sqlkonferenz-security-features-sql-server-2016-manager-security-teams-redmond\" target=\"_blank\" rel=\"noopener\">more info<\/a>), I finally found time to go about the next big conferences this year.<!--more-->For the <a href=\"http:\/\/www.sqlpass.org\/summit\/2016\" target=\"_blank\" rel=\"noopener\"><strong>PASS Summit 2016<\/strong><\/a><strong><u>,<\/u><\/strong> which is again taking place in Seattle\/USA, as well as for the <a href=\"https:\/\/www.microsoft.com\/en-us\/SDL\/process\/design.aspx\" target=\"_blank\" rel=\"noopener\"><strong>SQLServerGeeks Annual Summit 2016<\/strong><\/a><strong><u>,<\/u><\/strong> which is taking place in Bangalore\/India, I worked out and submitted 6 sessions altogether from the subject areas \u201cSecurity,\u201d \u201cPerformance Analysis\u201d and \u201cIn-Memory.\u201d Added to that 2 full-day PreCons with the topics \u201cSecurity\u201d and \u201cIn-Memory.\u201d Whoever is interested in seeing what I have \u201cup my sleeve\u201d this time, can review the abstracts here.<\/p>\n<\/div><\/section>\r\n\r\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_heading-44ad41eca033ddbd944e559f18b071cc\">\n#top .av-special-heading.av-av_heading-44ad41eca033ddbd944e559f18b071cc{\npadding-bottom:5px;\n}\nbody .av-special-heading.av-av_heading-44ad41eca033ddbd944e559f18b071cc .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-av_heading-44ad41eca033ddbd944e559f18b071cc .av-subheading{\nfont-size:10px;\n}\n<\/style>\n<div  class='av-special-heading av-av_heading-44ad41eca033ddbd944e559f18b071cc av-special-heading-h5 blockquote modern-quote  avia-builder-el-2  el_after_av_textblock  el_before_av_tab_container '><h5 class='av-special-heading-tag'  itemprop=\"headline\"  >Pre-Conferences:<\/h5><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div>\r\n\r\n<div  class='tabcontainer av-av_tab_container-0bacd910096d11a3cec6dfb538798966 top_tab  avia-builder-el-3  el_after_av_heading  el_before_av_heading ' role='tablist'>\r\n<section class='av_tab_section av_tab_section av-av_tab-95dd4334b5115c56ed718827996683ba'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='tab active_tab' role='tab' tabindex='0' data-fake-id='#tab-id-1' aria-controls='tab-id-1-content'  itemprop=\"headline\" >SQL Server Security black belt \u2013 attack, protect and keep secure...<\/div><div id='tab-id-1-content' class='tab_content active_tab_content' aria-hidden=\"false\"><div class='tab_inner_content invers-color'  itemprop=\"text\" ><p>Security Hardening is a subject which, sooner or later, every DBA will face. Microsoft SQL Server, according to the NIST vulnerability database the most secure RDBMS for years, contains many features that help keep the data secure on different layers. At the same time, ever-new applications which use databases on your servers, support-personnel, deployment-processes, auditors, and other processes and real people are constantly demanding access to your Server.<!--more--><\/p>\n<p>At this full-day pre-conference you will see how external and internal attackers can gain access to sensitive data. You will then learn how to secure the different attack surfaces of a typical SQL Server, and protect not only Data at Rest but also Data in Use and Data in Transit and learn best practices to prevent common vulnerabilities.<\/p>\n<p>In the second part you will get to know fundamental security principles such as<\/p>\n<ul>\n<li>Least Privilege;<\/li>\n<li>Segregation of Duties;<\/li>\n<li>Reconstruction of Events;<\/li>\n<li>Delegation of Authority;<\/li>\n<\/ul>\n<p>and you will learn how to use built-in functionalities of SQL Server (some limited to v2016) to build your own security frameworks to secure Deployment and Monitoring, separate Job-permissions; how to implement time-based permissions and which techniques can help reconstruct security-relevant events.<\/p>\n<p>If you are in charge of creating or implementing security concepts or need a full picture of attack surface protection and concepts, this session is exactly right for you.<\/p>\n<\/div><\/div><\/section>\r\n<section class='av_tab_section av_tab_section av-av_tab-bf4c3f2364804c74b6e4994ad65dd851'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='tab' role='tab' tabindex='0' data-fake-id='#tab-id-2' aria-controls='tab-id-2-content'  itemprop=\"headline\" >In-Memory in SQL Server 2016 \u2013 from 0 to Operational Analytics Hero...<\/div><div id='tab-id-2-content' class='tab_content' aria-hidden=\"true\"><div class='tab_inner_content invers-color'  itemprop=\"text\" ><p>The Columnstore Index technology came with SQL Server 2012 in the form of Nonclustered Columnstore, and SQL Server 2014 brought us updatable Clustered Columnstore Indexes and a completely new In-Memory Engine for memory optimized table &#038; indexes.<!--more--><\/p>\n<p>SQL Server 2016 is adding the updatable Nonclustered Columnstore Indexes that can both operate on row store as well as on memory-optimized tables, called In-Memory Operational Analytics. With the In-Memory engine being extensively improved in terms of both scalability and T-SQL language support, In-Memory will become a viable option in many projects.<\/p>\n<p>On this training day, attendees will be given a complete picture on the current state of technology and how and where to use either In-Memory OLTP or ColumnStore or both for efficient queries and data store.<\/p>\n<\/div><\/div><\/section>\r\n<\/div>\r\n\r\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_heading-80b40161ad67c55e10c5aa3dbe08baff\">\n#top .av-special-heading.av-av_heading-80b40161ad67c55e10c5aa3dbe08baff{\npadding-bottom:5px;\n}\nbody .av-special-heading.av-av_heading-80b40161ad67c55e10c5aa3dbe08baff .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-av_heading-80b40161ad67c55e10c5aa3dbe08baff .av-subheading{\nfont-size:10px;\n}\n<\/style>\n<div  class='av-special-heading av-av_heading-80b40161ad67c55e10c5aa3dbe08baff av-special-heading-h5 blockquote modern-quote  avia-builder-el-4  el_after_av_tab_container  el_before_av_tab_container '><h5 class='av-special-heading-tag'  itemprop=\"headline\"  >General sessions:<\/h5><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div>\r\n\r\n<div  class='tabcontainer av-av_tab_container-0bacd910096d11a3cec6dfb538798966 top_tab  avia-builder-el-5  el_after_av_heading  el_before_av_textblock ' role='tablist'>\r\n<section class='av_tab_section av_tab_section av-av_tab-ac1e15891f1cd7d2583505b5add31ec5'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='tab active_tab' role='tab' tabindex='0' data-fake-id='#tab-id-3' aria-controls='tab-id-3-content'  itemprop=\"headline\" >Session 1<\/div><div id='tab-id-3-content' class='tab_content active_tab_content' aria-hidden=\"false\"><div class='tab_inner_content invers-color'  itemprop=\"text\" ><p><strong>Extended Events \u2013 The Top Features for efficient Traces<\/strong><\/p>\n<p>Extended Events, which entered the product in SQL Server 2008, are replacing the old SQL Trace &#038; Profiler &#8211; and there are many good reasons for that. In this session you will see a selection of the most fascinating possibilities using this Tracing Framework. If you want to find out how to trace in a flexible and lightweight way, how to do advanced analysis directly inside the GUI, how to audit Database and Table-access without Auditing, how to analyze deadlocks without old-fashioned TraceFlags based on the built-in system_health session, this session is just for you. You will also learn how to use the GUI in an effective way for top-down-analysis and what is possible with some XQuery scripting.<\/p>\n<\/div><\/div><\/section>\r\n<section class='av_tab_section av_tab_section av-av_tab-bb25b61c2e7b90ddfaacdbcc784003dd'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='tab' role='tab' tabindex='0' data-fake-id='#tab-id-4' aria-controls='tab-id-4-content'  itemprop=\"headline\" >Session 2<\/div><div id='tab-id-4-content' class='tab_content' aria-hidden=\"true\"><div class='tab_inner_content invers-color'  itemprop=\"text\" ><p><strong>Performance Analyzing SQL Server workloads with DMVs and XEvents<\/strong><\/p>\n<p>This session you will be lead you through an example performance-analysis using mainly DMVs and Extended Events. You will see how a top-down analysis using built-in tools can be conducted. This will include wait statistics on different scopes to identify performance problems and bottlenecks up to identifying query plan changes \u2013 with &#038; without using the Query Store of SQL Server 2016. If you are new to performance analyzing this session will give you a practical insight into how to methodically approach performance troubleshooting.<\/p>\n<\/div><\/div><\/section>\r\n<section class='av_tab_section av_tab_section av-av_tab-86eb8449558b664d63ea5844e8707bdf'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='tab' role='tab' tabindex='0' data-fake-id='#tab-id-5' aria-controls='tab-id-5-content'  itemprop=\"headline\" >Session 3<\/div><div id='tab-id-5-content' class='tab_content' aria-hidden=\"true\"><div class='tab_inner_content invers-color'  itemprop=\"text\" ><p><strong>SQL Server 2016 \u2013 the evolution of In-Memory technologies<\/strong><\/p>\n<p>For SQL Server 2014 a completely new In-Memory Engine for memory optimized table &#038; indexes was integrated into SQL Server with in fact very limited functionality.<\/p>\n<p>For SQL Server 2016 the In-Memory engine is being extensively improved in terms of both scalability as well as T-SQL language support. Moreover the ColumnStore index technology has been improved and can now even be combined with memory-optimized tables.<\/p>\n<p>This session will provide an overview of the new possibilities and demonstrate where a particular technology may help \u2013 or where you cannot expect benefits. If you are planning to go on SQL Server 2016 any time soon, this session shows you two of the most important features that SQL Server 2016 brings.<\/p>\n<\/div><\/div><\/section>\r\n<section class='av_tab_section av_tab_section av-av_tab-7c3b40627d6ff961afe54d808af5c5d4'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='tab' role='tab' tabindex='0' data-fake-id='#tab-id-6' aria-controls='tab-id-6-content'  itemprop=\"headline\" >Session 4<\/div><div id='tab-id-6-content' class='tab_content' aria-hidden=\"true\"><div class='tab_inner_content invers-color'  itemprop=\"text\" ><p><strong>SQL Server Security black belt series: Securing Data<\/strong><\/p>\n<p>You have installed SQL Server and have heard about several \u201cbest practices,\u201d maybe renamed the sa account, but now what?<\/p>\n<p>In this session you will see demos of several methods how an attacker can get access to data in Use &#038; in Transit and see which available built-in technologies provide help in mitigating such attacks. You will be given guidance on how to systematically identify possible threats and ne given best practices at hand.<\/p>\n<p>Among the technologies that can be seen are Network sniffing, a Threat Modeling Tool, TDE and the new Always Encrypted technology of SQL Server 2016. This session is mainly targeting Administrators but many concepts and samples should be valuable knowledge for developers as well.<\/p>\n<\/div><\/div><\/section>\r\n<section class='av_tab_section av_tab_section av-av_tab-d24c32c44455241073161ab0809b601f'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='tab' role='tab' tabindex='0' data-fake-id='#tab-id-7' aria-controls='tab-id-7-content'  itemprop=\"headline\" >Session 5<\/div><div id='tab-id-7-content' class='tab_content' aria-hidden=\"true\"><div class='tab_inner_content invers-color'  itemprop=\"text\" ><p><strong>SQL Server Security black belt series: Securing Operations<\/strong><\/p>\n<p>You got SQL Server up and running and thought you could easily secure it by completely denying all access to everybody else except you and your co-admin, but you realize that there are many more individuals demanding access for daily or weekly operations. You have heard about \u201cSegregation of Duties\u201d and \u201cLeast Privilege\u201d and are looking into how you can properly implement it with SQL Server.<\/p>\n<p>In this session you will learn about techniques and approaches on how to implement secure processes in order to ensure both \u201cLeast Privilege\u201d and \u201cSegregation of Duties\u201d and at the same time \u201cReconstruction of Events.\u201d Among the techniques shown are \u201ctime based-permissions\u201d and custom server roles for performance analysis and job-monitoring.<\/p>\n<\/div><\/div><\/section>\r\n<section class='av_tab_section av_tab_section av-av_tab-2a7a06b13b6e40e47c51bc4151eab635'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='tab' role='tab' tabindex='0' data-fake-id='#tab-id-8' aria-controls='tab-id-8-content'  itemprop=\"headline\" >Session 6<\/div><div id='tab-id-8-content' class='tab_content' aria-hidden=\"true\"><div class='tab_inner_content invers-color'  itemprop=\"text\" ><p><strong>\u201cSQL Attack\u2026ed\u201d \u2013 SQL Server under attack via SQL Injection<\/strong><\/p>\n<p>One of the most frequently attacked targets is the data that resides in a database server. SQL Server is considered \u201csecure by default,\u201d but this is only relevant until the first databases and configurations have been changed. This is why most of the exploited weaknesses are due to misconfiguration or weak coding practices as opposed to security bugs in SQL Server itself, of which we had only a few in the last 10 years.<\/p>\n<p>In this purely demo-based session you will see samples of several real-life attacks, from mere reading up to disrupting service availability via various types of manual and automated SQL Injection, including a broadly unknown elevation of privileges attack for a non-sa account.<\/p>\n<p>If you have a database-server which is accessible by processes beyond your direct control or which even can be reached by some kind of frontend applications, and you are unsure what the possible security implications to watch out for, this session is meant for you.<\/p>\n<\/div><\/div><\/section>\r\n<\/div>\r\n\r\n<section  class='av_textblock_section av-av_textblock-2de302bf1aa3cf4c9157dbe6f50ac7eb '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p>Of course I will post when my presentations for 2016 are fixed. Maybe you can meet me at one or another conference. \ud83d\ude42<\/p>\n<p>Andreas<\/p>\n<\/div><\/section>\r\n\r\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_one_full-97c650ae075063b375f558a776c570f8\">\n#top .flex_column.av-av_one_full-97c650ae075063b375f558a776c570f8{\nmargin-top:40px;\nmargin-bottom:40px;\n}\n.flex_column.av-av_one_full-97c650ae075063b375f558a776c570f8{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n.responsive #top #wrap_all .flex_column.av-av_one_full-97c650ae075063b375f558a776c570f8{\nmargin-top:40px;\nmargin-bottom:40px;\n}\n<\/style>\n<div  class='flex_column av-av_one_full-97c650ae075063b375f558a776c570f8 av_one_full  avia-builder-el-7  el_after_av_textblock  el_before_av_hr  first flex_column_div av-zero-column-padding  column-top-margin'     ><section  class='av_textblock_section av-av_textblock-2de302bf1aa3cf4c9157dbe6f50ac7eb '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><div><\/div>\n<div><\/div>\n<\/div><\/section><\/div>\r\n\r\n<div  class='hr av-av_hr-0ff602b3e980a3377077ff3c1c834df6 hr-default  avia-builder-el-9  el_after_av_one_full  el_before_av_social_share '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div>\r\n\r\n<div  class='av-social-sharing-box av-av_social_share-8644d330ffb238fff0cfa858c5295467 av-social-sharing-box-default  avia-builder-el-10  el_after_av_hr  el_before_av_hr  av-social-sharing-box-fullwidth'><div class=\"av-share-box\"><h5 class='av-share-link-description av-no-toc '>Share<\/h5><ul class=\"av-share-box-list noLightbox\"><li class='av-share-link av-social-link-facebook' ><a target=\"_blank\" aria-label=\"Share on Facebook\" href=\"https:\/\/www.facebook.com\/sharer.php?u=https:\/\/andreas-wolter.com\/en\/sessions-submitted-for-conferences-2016\/&#038;t=Sessions%20submitted%20for%20major%20conferences%202016.%20Topics%3A%20Security%20%E2%80%93%20Performance%20%E2%80%93%20In-Memory\" aria-hidden=\"false\" data-av_icon=\"\ue8f3\" data-av_iconfont=\"entypo-fontello\" title=\"\" data-avia-related-tooltip=\"Share on Facebook\" rel=\"noopener\"><span class='avia_hidden_link_text'>Share on Facebook<\/span><\/a><\/li><li class='av-share-link av-social-link-twitter' ><a target=\"_blank\" aria-label=\"Share on Twitter\" href=\"https:\/\/twitter.com\/share?text=Sessions%20submitted%20for%20major%20conferences%202016.%20Topics%3A%20Security%20%E2%80%93%20Performance%20%E2%80%93%20In-Memory&#038;url=https:\/\/andreas-wolter.com\/en\/?p=2673\" aria-hidden=\"false\" data-av_icon=\"\ue8f1\" data-av_iconfont=\"entypo-fontello\" title=\"\" data-avia-related-tooltip=\"Share on Twitter\" rel=\"noopener\"><span class='avia_hidden_link_text'>Share on Twitter<\/span><\/a><\/li><li class='av-share-link av-social-link-linkedin' ><a target=\"_blank\" aria-label=\"Share on LinkedIn\" href=\"https:\/\/linkedin.com\/shareArticle?mini=true&#038;title=Sessions%20submitted%20for%20major%20conferences%202016.%20Topics%3A%20Security%20%E2%80%93%20Performance%20%E2%80%93%20In-Memory&#038;url=https:\/\/andreas-wolter.com\/en\/sessions-submitted-for-conferences-2016\/\" aria-hidden=\"false\" data-av_icon=\"\ue8fc\" data-av_iconfont=\"entypo-fontello\" title=\"\" data-avia-related-tooltip=\"Share on LinkedIn\" rel=\"noopener\"><span class='avia_hidden_link_text'>Share on LinkedIn<\/span><\/a><\/li><\/ul><\/div><\/div>\r\n\r\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_hr-4474f20d2389e2e5ecf918a02da5132e\">\n#top .hr.hr-invisible.av-av_hr-4474f20d2389e2e5ecf918a02da5132e{\nheight:50px;\n}\n<\/style>\n<div  class='hr av-av_hr-4474f20d2389e2e5ecf918a02da5132e hr-invisible  avia-builder-el-11  el_after_av_social_share  el_before_av_comments_list '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div>\r\n\r\n<div  class='av-buildercomment av-av_comments_list-88ce68e426f11248fa394058a3de040f  av-blog-meta-author-disabled av-blog-meta-html-info-disabled'><\/div>","protected":false},"excerpt":{"rendered":"After the great success of the German SQLKonferenz in February, where I had the honor of presenting the new security features of SQL Server 2016 together with Joachim Hammer, the Program Manager of the security teams of the relational SQL Engines at Microsoft in Redmond (more info), I finally found time to go about the [&hellip;]","protected":false},"author":4,"featured_media":4330,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[97,55,46,43,57,45,64,56],"tags":[24,93,94,27],"class_list":["post-2673","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-conferences-en","category-extended-events-en","category-in-memory-oltpxtp-htap","category-performance","category-security-en","category-sql-server-2016","category-sqlpass-en","category-tracing-monitoring-en","tag-conference-en","tag-pass-en","tag-pass-summit-en","tag-security-en"],"_links":{"self":[{"href":"https:\/\/andreas-wolter.com\/en\/wp-json\/wp\/v2\/posts\/2673","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/andreas-wolter.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/andreas-wolter.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/andreas-wolter.com\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/andreas-wolter.com\/en\/wp-json\/wp\/v2\/comments?post=2673"}],"version-history":[{"count":9,"href":"https:\/\/andreas-wolter.com\/en\/wp-json\/wp\/v2\/posts\/2673\/revisions"}],"predecessor-version":[{"id":5113,"href":"https:\/\/andreas-wolter.com\/en\/wp-json\/wp\/v2\/posts\/2673\/revisions\/5113"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/andreas-wolter.com\/en\/wp-json\/wp\/v2\/media\/4330"}],"wp:attachment":[{"href":"https:\/\/andreas-wolter.com\/en\/wp-json\/wp\/v2\/media?parent=2673"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/andreas-wolter.com\/en\/wp-json\/wp\/v2\/categories?post=2673"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/andreas-wolter.com\/en\/wp-json\/wp\/v2\/tags?post=2673"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}